Home
last modified time | relevance | path

Searched full:random (Results 1 – 25 of 1281) sorted by relevance

12345678910>>...52

/linux/include/crypto/
H A Drng.h3 * RNG: Random Number Generator algorithms under the crypto API
19 * struct rng_alg - random number generator definition
22 * random number. The random number generator transform
23 * must generate the random number out of the context
26 * @seed: Seed or reseed the random number generator. With the
27 * invocation of this function call, the random number
29 * random number generator requires a seed for setting
35 * @seedsize: The seed size required for a random number generator
37 * random number generators does not require a seed
66 * DOC: Random number generator API
[all …]
/linux/Documentation/admin-guide/
H A Dhw_random.rst2 Hardware random number generators
10 a Random Number Generator (RNG). The software has two parts:
23 /dev/random special files.
29 and read() system calls, you can read random data from
35 data before assuming it is truly random.
53 Hardware driver for Intel/AMD/VIA Random Number Generators (RNG)
61 The Firmware Hub integrates a Random Number Generator (RNG)
62 using thermal noise generated from inherently random quantum
63 mechanical properties of silicon. When not generating new random
96 Random Number Generator
[all …]
/linux/tools/testing/selftests/net/netfilter/
H A Dconntrack_resize.sh63 …if ! conntrack -I -s \$((\$RANDOM%256)).\$((\$RANDOM%256)).\$((\$RANDOM%256)).\$((\$RANDOM%255+1))…
64 -d \$((\$RANDOM%256)).\$((\$RANDOM%256)).\$((\$RANDOM%256)).\$((\$RANDOM%255+1)) \
65 --protonum 17 --timeout 3600 --status ASSURED,SEEN_REPLY --sport \$RANDOM --dport 53; then \
95 sysctl -q net.netfilter.nf_conntrack_buckets=$RANDOM
102 local r=$RANDOM
170 dport=$(((RANDOM%65536)+1))
190 ip netns exec "$ns" timeout 30 ./udpclash 127.0.0.1 $((RANDOM%65536)) > /dev/null 2>&1
222 sleep $((RANDOM%2))
230 local r1=$((RANDOM%2))
231 local r2=$((RANDOM%2))
[all …]
H A Dnft_concat_range.sh1288 [ $((RANDOM%20)) -gt 0 ] && return
1305 [ $((RANDOM%20)) -gt 0 ] && return
1391 printf ". 172.%i.%i.%i " $((RANDOM%256)) $((RANDOM%256)) $((i%256))
1397 printf "%i . " $((RANDOM%256))
1406 local proto=$((RANDOM%256))
1420 printf "%i . 172.%i.%i.%i " $(((RANDOM%65534) + 1)) $((RANDOM%256)) $((RANDOM%256)) $((i%256))
1426 printf "172.%i.%i.%i . " $((RANDOM
[all...]
/linux/tools/testing/selftests/powerpc/stringloops/
H A Dmemcmp.c105 s1[j] = random(); in testcase()
107 rand_s1 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase()
108 rand_s2 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase()
112 change = random() % comp_size; in testcase()
113 rand_s2[change] = random() & 0xff; in testcase()
131 s1[j] = random(); in testcase()
133 rand_s1 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase()
134 rand_s2 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase()
139 change = random() % comp_size; in testcase()
140 s2[change] = random() & 0xff; in testcase()
/linux/arch/s390/boot/
H A Dkaslr.c57 unsigned long seed, random; in get_random() local
66 cpacf_trng(NULL, 0, (u8 *) &random, sizeof(random)); in get_random()
71 cpacf_prno(CPACF_PRNO_SHA512_DRNG_GEN, &prno, (u8 *) &random, in get_random()
72 sizeof(random), NULL, 0); in get_random()
83 random = seed; in get_random()
84 cpacf_kmc(CPACF_KMC_PRNG, prng.parm_block, (u8 *) &random, in get_random()
85 (u8 *) &random, sizeof(random)); in get_random()
90 *value = random % limit; in get_random()
/linux/tools/testing/selftests/bpf/verifier/
H A Dld_dw.c2 "ld_dw: xor semi-random 64 bit imms, test 1",
11 "ld_dw: xor semi-random 64 bit imms, test 2",
20 "ld_dw: xor semi-random 64 bit imms, test 3",
29 "ld_dw: xor semi-random 64 bit imms, test 4",
38 "ld_dw: xor semi-random 64 bit imms, test 5",
/linux/tools/testing/selftests/drivers/net/mlxsw/
H A Dsharedbuffer_configuration.py6 import random
16 objects, pool, tcbind and portpool. Provide an interface to get random
19 - random size
22 - random pool number
23 - random threshold
26 - random threshold
49 th = random.randint(3, 16)
67 return arr[random.randint(0, len(arr) - 1)]
223 # For each pool, set random size and static threshold type
296 # Bind each port and unicast TC (TCs < 8) to a random pool and a random
[all …]
/linux/drivers/firmware/efi/libstub/
H A Drandom.c29 * efi_get_random_bytes() - fill a buffer with random bytes
31 * @out: caller allocated buffer to receive the random bytes
34 * EFI_RNG_PROTOCOL or there are not enough random bytes available to fill
53 * efi_random_get_seed() - provide random seed as configuration table
55 * The EFI_RNG_PROTOCOL is used to read random bytes. These random bytes are
57 * for the initialization of its pseudo random number generator.
59 * If the EFI_RNG_PROTOCOL is not available or there are not enough random bytes
/linux/lib/
H A Duuid.c14 #include <linux/random.h>
25 * generate_random_uuid - generate a random UUID
28 * Random UUID interface
36 /* Set UUID version to 4 --- truly random generation */ in generate_random_uuid()
46 /* Set GUID version to 4 --- truly random generation */ in generate_random_guid()
63 /* version 4 : random generation */ in guid_gen()
71 /* version 4 : random generation */ in uuid_gen()
/linux/Documentation/admin-guide/device-mapper/
H A Ddm-zoned.rst11 device-side performance degradation due to excessive random writes on
53 zones of the device may be used also for buffering user random writes.
56 reused for buffering incoming random writes.
75 zone used to buffer random modification to the data zone.
95 chunk, resulting in native random write performance similar to a regular
177 0 <size> zoned <nr_zones> zones <nr_unmap_rnd>/<nr_rnd> random <nr_unmap_seq>/<nr_seq> sequential
180 of unmapped (ie free) random zones, <nr_rnd> the total number of zones,
185 percent free random zones. In order to start the reclaim process manually
193 will start the reclaim process and random zones will be moved to sequential
H A Ddm-flakey.rst71 During <down interval>, replace random byte in a read bio
72 with a random value. probability is an integer between
76 During <down interval>, replace random byte in a write bio
77 with a random value. probability is an integer between
/linux/net/netfilter/ipvs/
H A Dip_vs_twos.c12 #include <linux/random.h>
24 * - rweight1 = random number between [0,total_weight]
25 * - rweight2 = random number between [0,total_weight]
39 * The Power of Two Random Choices: A Survey of Techniques and Results
54 /* Generate a random weight between [0,sum of all weights) */ in ip_vs_twos_schedule()
70 /* Add 1 to total_weight so that the random weights are inclusive in ip_vs_twos_schedule()
/linux/arch/powerpc/mm/nohash/
H A Dkaslr_booke.c286 unsigned long offset, random; in kaslr_choose_location() local
295 random = get_boot_seed(dt_ptr); in kaslr_choose_location()
299 random = rotate_xor(random, &seed, sizeof(seed)); in kaslr_choose_location()
306 random = rotate_xor(random, &seed, sizeof(seed)); in kaslr_choose_location()
336 * Only use the low 8 bits of the random seed in kaslr_choose_location()
338 index = random & 0xFF; in kaslr_choose_location()
342 offset = random % (SZ_64M - kernel_sz); in kaslr_choose_location()
349 * To see if we need to relocate the kernel to a random offset
/linux/tools/testing/selftests/net/
H A Dtest_ingress_egress_chaining.sh20 ns="ns$((RANDOM%899+100))"
21 veth1="veth1$((RANDOM%899+100))"
22 veth2="veth2$((RANDOM%899+100))"
23 peer1="peer1$((RANDOM%899+100))"
24 peer2="peer2$((RANDOM%899+100))"
H A Dtfo_passive.sh5 NSIM_SV_ID=$((256 + RANDOM % 256))
7 NSIM_CL_ID=$((512 + RANDOM % 256))
65 NSIM_SV_FD=$((256 + RANDOM % 256))
69 NSIM_CL_FD=$((256 + RANDOM % 256))
/linux/include/linux/
H A Dhw_random.h2 Hardware Random Number Generator
20 * struct hwrng - Hardware Random Number Generator driver
28 * Returns the number of lower random bytes in "data".
57 /** Register a new Hardware Random Number Generator driver. */
60 /** Unregister a Hardware Random Number Generator driver. */
H A Dkasan-tags.h7 #define KASAN_TAG_MAX 0xFD /* maximum value for random tags */
10 #define KASAN_TAG_MIN 0xF0 /* minimum value for random tags */
12 #define KASAN_TAG_MIN 0x00 /* minimum value for random tags */
/linux/arch/x86/tools/
H A Dinsn_sanity.c23 * Feed random binary to instruction decoder and ensure not to
33 static unsigned int seed; /* Random seed */
46 fprintf(stderr, "\t-s Give a random seed (and iteration number)\n"); in usage()
148 /* Fills buffer with random binary up to MAX_INSN_SIZE */ in generate_insn()
150 *(unsigned short *)(&insn_buff[i]) = random() & 0xffff; in generate_insn()
153 insn_buff[i++] = random() & 0xff; in generate_insn()
209 usage("Don't use input file (-i) with random seed (-s)"); in parse_args()
211 /* Initialize random seed */ in parse_args()
260 (input_file) ? "given" : "random", in main()
/linux/drivers/net/team/
H A Dteam_mode_random.c3 * drivers/net/team/team_mode_random.c - Random mode for team
42 .kind = "random",
63 MODULE_DESCRIPTION("Random mode for team");
64 MODULE_ALIAS_TEAM_MODE("random");
/linux/drivers/crypto/
H A DKconfig205 tristate "Pseudo random number generator device driver"
209 Select this option if you want to use the s390 pseudo random number
211 and uses triple-DES to generate secure random numbers like the
213 pseudo-random-number device through the char device /dev/prandom.
249 bool "HIFN 795x random number generator"
252 Select this option if you want to enable the random number generator
309 bool "PowerPC 4xx generic true random number generator support"
378 tristate "Exynos HW pseudo random number generator support"
384 cryptographic API for the pseudo random number generator hardware
509 module as a random number generator. (Other functions of the
[all …]
/linux/drivers/char/
H A Drandom.c35 #include <linux/random.h>
102 MODULE_PARM_DESC(ratelimit_disable, "Disable random ratelimit suppression");
106 * to supply cryptographically secure random numbers. This applies to: the
129 * cryptographically secure random numbers. This applies to: the /dev/urandom
173 printk_deferred(KERN_NOTICE "random: %s called from %pS with crng_init=%d\n", \
183 * RNG described at <https://blog.cr.yp.to/20170723-random.html>.
197 * These interfaces will return the requested number of random bytes
200 * functions may be higher performance for one-off random integers,
305 * half of the block containing 32 bytes of random data that may
335 * random data. It also returns up to 32 bytes on its own of random data
[all …]
/linux/include/uapi/linux/
H A Drandom.h3 * include/linux/random.h
5 * Include file for the random number generator.
15 /* ioctl()'s for the random number generator */
52 * GRND_INSECURE Return non-cryptographic random bytes
/linux/Documentation/devicetree/bindings/rng/
H A Dmicrochip,pic32-rng.yaml7 title: Microchip PIC32 Random Number Generator
10 The PIC32 RNG provides a pseudo random number generator which can be seeded
11 by another true random number generator.
/linux/samples/pktgen/
H A Dpktgen_sample01_simple.sh6 # * flow variation via random UDP source port
38 # Flow variation random source port between min and max
73 # Single destination port or random port range
81 # Setup random UDP port src range

12345678910>>...52