Lines Matching full:random

35 #include <linux/random.h>
102 MODULE_PARM_DESC(ratelimit_disable, "Disable random ratelimit suppression");
106 * to supply cryptographically secure random numbers. This applies to: the
129 * cryptographically secure random numbers. This applies to: the /dev/urandom
173 printk_deferred(KERN_NOTICE "random: %s called from %pS with crng_init=%d\n", \
183 * RNG described at <https://blog.cr.yp.to/20170723-random.html>.
197 * These interfaces will return the requested number of random bytes
200 * functions may be higher performance for one-off random integers,
305 * half of the block containing 32 bytes of random data that may
335 * random data. It also returns up to 32 bytes on its own of random data
388 * some random data and a ChaCha state for the caller. All other in crng_make_state()
429 * This returns random bytes in arbitrary quantities. The quality of the
430 * random bytes is good as /dev/urandom. In order to ensure that the
452 * Immediately overwrite the ChaCha key at index 4 with random in get_random_bytes_user()
493 * Batched entropy returns random integers. The quality of the random
797 * command line option 'random.trust_bootloader'.
803 * add_interrupt_randomness() uses the interrupt timing as random
833 early_param("random.trust_cpu", parse_trust_cpu);
834 early_param("random.trust_bootloader", parse_trust_bootloader);
957 * may produce endless random bits, so this function will sleep for
975 * Handle random seed passed by bootloader, and credit it depending
976 * on the command line option 'random.trust_bootloader'.
1237 if (!disk || !disk->random) in add_disk_randomness()
1240 add_timer_randomness(disk->random, 0x100 + disk_devt(disk)); in add_disk_randomness()
1255 disk->random = state; in rand_initialize_disk()
1369 * Reading from /dev/random has the same functionality as calling
1378 * Writing to either /dev/random or /dev/urandom adds entropy to
1381 * Polling on /dev/random indicates when the RNG is initialized, on
1384 * Both /dev/random and /dev/urandom have the same set of ioctls for
1595 * in /proc/sys/kernel/random/ and are as follows:
1599 * - uuid - a random UUID, different each time the file is read.
1608 * below which write polls to /dev/random will unblock, requesting
1629 * This function is used to return both the bootid UUID, and random
1718 register_sysctl_init("kernel/random", random_table); in random_sysctls_init()