Home
last modified time | relevance | path

Searched full:random (Results 1 – 25 of 1648) sorted by relevance

12345678910>>...66

/Linux-v6.6/drivers/char/hw_random/
DKconfig3 # Hardware Random Number Generator (RNG) configuration
7 tristate "Hardware Random Number Generator Core support"
10 Hardware Random Number Generator Core infrastructure.
15 of possibly several hardware random number generators.
17 These hardware random number generators do feed into the
18 kernel's random number generator entropy pool.
25 tristate "Timer IOMEM HW Random Number Generator support"
28 This driver provides kernel-side support for a generic Random
39 tristate "Intel HW Random Number Generator support"
43 This driver provides kernel-side support for the Random Number
[all …]
/Linux-v6.6/include/crypto/
Drng.h3 * RNG: Random Number Generator algorithms under the crypto API
33 * struct rng_alg - random number generator definition
36 * random number. The random number generator transform
37 * must generate the random number out of the context
40 * @seed: Seed or reseed the random number generator. With the
41 * invocation of this function call, the random number
43 * random number generator requires a seed for setting
50 * @seedsize: The seed size required for a random number generator
52 * random number generators does not require a seed
85 * DOC: Random number generator API
[all …]
/Linux-v6.6/tools/testing/selftests/powerpc/signal/
Dsigfuz.c14 * test depends on random numbers, and, based on them, it sets different TM
18 * to the sigreturn system call with random data, in order to make sure that
153 ucp->uc_mcontext.gp_regs[PT_MSR] = random(); in trap_signal_handler()
155 ucp->uc_mcontext.gp_regs[PT_NIP] = random(); in trap_signal_handler()
157 ucp->uc_link->uc_mcontext.gp_regs[PT_MSR] = random(); in trap_signal_handler()
159 ucp->uc_link->uc_mcontext.gp_regs[PT_NIP] = random(); in trap_signal_handler()
161 ucp->uc_mcontext.gp_regs[PT_TRAP] = random(); in trap_signal_handler()
162 ucp->uc_mcontext.gp_regs[PT_DSISR] = random(); in trap_signal_handler()
163 ucp->uc_mcontext.gp_regs[PT_DAR] = random(); in trap_signal_handler()
164 ucp->uc_mcontext.gp_regs[PT_ORIG_R3] = random(); in trap_signal_handler()
[all …]
/Linux-v6.6/Documentation/admin-guide/
Dhw_random.rst2 Hardware random number generators
10 a Random Number Generator (RNG). The software has two parts:
24 /dev/random special files.
30 and read() system calls, you can read random data from
36 data before assuming it is truly random.
54 Hardware driver for Intel/AMD/VIA Random Number Generators (RNG)
62 The Firmware Hub integrates a Random Number Generator (RNG)
63 using thermal noise generated from inherently random quantum
64 mechanical properties of silicon. When not generating new random
97 Random Number Generator
[all …]
/Linux-v6.6/arch/x86/lib/
Dkaslr.c56 unsigned long raw, random = get_boot_seed(); in kaslr_get_random_long() local
68 random ^= raw; in kaslr_get_random_long()
78 random ^= raw; in kaslr_get_random_long()
85 random ^= i8254(); in kaslr_get_random_long()
90 : "=a" (random), "=d" (raw) in kaslr_get_random_long()
91 : "a" (random), "rm" (mix_const)); in kaslr_get_random_long()
92 random += raw; in kaslr_get_random_long()
97 return random; in kaslr_get_random_long()
/Linux-v6.6/tools/testing/selftests/powerpc/stringloops/
Dmemcmp.c105 s1[j] = random(); in testcase()
107 rand_s1 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase()
108 rand_s2 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase()
112 change = random() % comp_size; in testcase()
113 rand_s2[change] = random() & 0xff; in testcase()
131 s1[j] = random(); in testcase()
133 rand_s1 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase()
134 rand_s2 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase()
139 change = random() % comp_size; in testcase()
140 s2[change] = random() & 0xff; in testcase()
/Linux-v6.6/arch/s390/boot/
Dkaslr.c57 unsigned long seed, random; in get_random() local
66 cpacf_trng(NULL, 0, (u8 *) &random, sizeof(random)); in get_random()
71 cpacf_prno(CPACF_PRNO_SHA512_DRNG_GEN, &prno, (u8 *) &random, in get_random()
72 sizeof(random), NULL, 0); in get_random()
83 random = seed; in get_random()
84 cpacf_kmc(CPACF_KMC_PRNG, prng.parm_block, (u8 *) &random, in get_random()
85 (u8 *) &random, sizeof(random)); in get_random()
90 *value = random % limit; in get_random()
/Linux-v6.6/tools/testing/selftests/bpf/verifier/
Dld_dw.c2 "ld_dw: xor semi-random 64 bit imms, test 1",
11 "ld_dw: xor semi-random 64 bit imms, test 2",
20 "ld_dw: xor semi-random 64 bit imms, test 3",
29 "ld_dw: xor semi-random 64 bit imms, test 4",
38 "ld_dw: xor semi-random 64 bit imms, test 5",
/Linux-v6.6/drivers/firmware/efi/libstub/
Drandom.c29 * efi_get_random_bytes() - fill a buffer with random bytes
31 * @out: caller allocated buffer to receive the random bytes
34 * EFI_RNG_PROTOCOL or there are not enough random bytes available to fill
53 * efi_random_get_seed() - provide random seed as configuration table
55 * The EFI_RNG_PROTOCOL is used to read random bytes. These random bytes are
57 * for the initialization of its pseudo random number generator.
59 * If the EFI_RNG_PROTOCOL is not available or there are not enough random bytes
/Linux-v6.6/tools/testing/selftests/drivers/net/mlxsw/
Dsharedbuffer_configuration.py6 import random
16 objects, pool, tcbind and portpool. Provide an interface to get random
19 - random size
22 - random pool number
23 - random threshold
26 - random threshold
49 th = random.randint(3, 16)
67 return arr[random.randint(0, len(arr) - 1)]
223 # For each pool, set random size and static threshold type
296 # Bind each port and unicast TC (TCs < 8) to a random pool and a random
[all …]
/Linux-v6.6/lib/
Duuid.c14 #include <linux/random.h>
25 * generate_random_uuid - generate a random UUID
28 * Random UUID interface
36 /* Set UUID version to 4 --- truly random generation */ in generate_random_uuid()
46 /* Set GUID version to 4 --- truly random generation */ in generate_random_guid()
63 /* version 4 : random generation */ in guid_gen()
71 /* version 4 : random generation */ in uuid_gen()
/Linux-v6.6/Documentation/admin-guide/device-mapper/
Ddm-zoned.rst11 device-side performance degradation due to excessive random writes on
53 zones of the device may be used also for buffering user random writes.
56 reused for buffering incoming random writes.
75 zone used to buffer random modification to the data zone.
95 chunk, resulting in native random write performance similar to a regular
177 0 <size> zoned <nr_zones> zones <nr_unmap_rnd>/<nr_rnd> random <nr_unmap_seq>/<nr_seq> sequential
180 of unmapped (ie free) random zones, <nr_rnd> the total number of zones,
185 percent free random zones. In order to start the reclaim process manually
193 will start the reclaim process and random zones will be moved to sequential
/Linux-v6.6/net/netfilter/ipvs/
Dip_vs_twos.c12 #include <linux/random.h>
24 * - rweight1 = random number between [0,total_weight]
25 * - rweight2 = random number between [0,total_weight]
39 * The Power of Two Random Choices: A Survey of Techniques and Results
54 /* Generate a random weight between [0,sum of all weights) */ in ip_vs_twos_schedule()
70 /* Add 1 to total_weight so that the random weights are inclusive in ip_vs_twos_schedule()
/Linux-v6.6/include/linux/
Dhw_random.h2 Hardware Random Number Generator
21 * struct hwrng - Hardware Random Number Generator driver
29 * Returns the number of lower random bytes in "data".
58 /** Register a new Hardware Random Number Generator driver. */
61 /** Unregister a Hardware Random Number Generator driver. */
Dkasan-tags.h7 #define KASAN_TAG_MAX 0xFD /* maximum value for random tags */
10 #define KASAN_TAG_MIN 0xF0 /* minimum value for random tags */
12 #define KASAN_TAG_MIN 0x00 /* minimum value for random tags */
/Linux-v6.6/tools/testing/selftests/net/
Dtest_ingress_egress_chaining.sh20 ns="ns$((RANDOM%899+100))"
21 veth1="veth1$((RANDOM%899+100))"
22 veth2="veth2$((RANDOM%899+100))"
23 peer1="peer1$((RANDOM%899+100))"
24 peer2="peer2$((RANDOM%899+100))"
/Linux-v6.6/arch/powerpc/mm/nohash/
Dkaslr_booke.c286 unsigned long offset, random; in kaslr_choose_location() local
295 random = get_boot_seed(dt_ptr); in kaslr_choose_location()
299 random = rotate_xor(random, &seed, sizeof(seed)); in kaslr_choose_location()
306 random = rotate_xor(random, &seed, sizeof(seed)); in kaslr_choose_location()
336 * Only use the low 8 bits of the random seed in kaslr_choose_location()
338 index = random & 0xFF; in kaslr_choose_location()
342 offset = random % (SZ_64M - kernel_sz); in kaslr_choose_location()
349 * To see if we need to relocate the kernel to a random offset
/Linux-v6.6/drivers/net/team/
Dteam_mode_random.c3 * drivers/net/team/team_mode_random.c - Random mode for team
42 .kind = "random",
63 MODULE_DESCRIPTION("Random mode for team");
64 MODULE_ALIAS_TEAM_MODE("random");
/Linux-v6.6/drivers/staging/media/atomisp/pci/
Dia_css_prbs.h20 * This file contains support for Pseudo Random Bit Sequence (PRBS) inputs
42 * Seed the for the Pseudo Random Bit Sequence.
50 int seed; /** random seed for the 1st 2-pixel-components/clock */
51 int seed1; /** random seed for the 2nd 2-pixel-components/clock */
/Linux-v6.6/arch/x86/tools/
Dinsn_sanity.c23 * Feed random binary to instruction decoder and ensure not to
33 static unsigned int seed; /* Random seed */
46 fprintf(stderr, "\t-s Give a random seed (and iteration number)\n"); in usage()
148 /* Fills buffer with random binary up to MAX_INSN_SIZE */ in generate_insn()
150 *(unsigned short *)(&insn_buff[i]) = random() & 0xffff; in generate_insn()
153 insn_buff[i++] = random() & 0xff; in generate_insn()
209 usage("Don't use input file (-i) with random seed (-s)"); in parse_args()
211 /* Initialize random seed */ in parse_args()
260 (input_file) ? "given" : "random", in main()
/Linux-v6.6/include/uapi/linux/
Drandom.h3 * include/linux/random.h
5 * Include file for the random number generator.
15 /* ioctl()'s for the random number generator */
52 * GRND_INSECURE Return non-cryptographic random bytes
/Linux-v6.6/drivers/char/
Drandom.c35 #include <linux/random.h>
97 MODULE_PARM_DESC(ratelimit_disable, "Disable random ratelimit suppression");
101 * to supply cryptographically secure random numbers. This applies to: the
124 * cryptographically secure random numbers. This applies to: the /dev/urandom
168 printk_deferred(KERN_NOTICE "random: %s called from %pS with crng_init=%d\n", \
178 * RNG described at <https://blog.cr.yp.to/20170723-random.html>.
192 * These interfaces will return the requested number of random bytes
195 * functions may be higher performance for one-off random integers,
284 * half of the block containing 32 bytes of random data that may
314 * random data. It also returns up to 32 bytes on its own of random data
[all …]
/Linux-v6.6/Documentation/devicetree/bindings/rng/
Dmicrochip,pic32-rng.txt1 * Microchip PIC32 Random Number Generator
3 The PIC32 RNG provides a pseudo random number generator which can be seeded by
4 another true random number generator.
/Linux-v6.6/Documentation/crypto/
Dapi-rng.rst1 Random Number Algorithm Definitions
7 Crypto API Random Number API
11 :doc: Random number generator API
/Linux-v6.6/drivers/s390/scsi/
Dzfcp_ccw.c62 * We want to scan ports here, with some random backoff and without in zfcp_ccw_activate()
64 * but with both random delay and rate limit. Nevertheless we get in zfcp_ccw_activate()
66 * an equivalent random time. in zfcp_ccw_activate()
67 * Let the port scan random delay elapse first. If recovery finishes in zfcp_ccw_activate()
70 * point in waiting a random delay on top of the time consumed by in zfcp_ccw_activate()
181 * We want to scan ports here, always, with some random delay and in zfcp_ccw_set_online()
186 * Since zfcp_ccw_activate() has waited the desired random time, in zfcp_ccw_set_online()

12345678910>>...66