/Linux-v6.6/drivers/char/hw_random/ |
D | Kconfig | 3 # Hardware Random Number Generator (RNG) configuration 7 tristate "Hardware Random Number Generator Core support" 10 Hardware Random Number Generator Core infrastructure. 15 of possibly several hardware random number generators. 17 These hardware random number generators do feed into the 18 kernel's random number generator entropy pool. 25 tristate "Timer IOMEM HW Random Number Generator support" 28 This driver provides kernel-side support for a generic Random 39 tristate "Intel HW Random Number Generator support" 43 This driver provides kernel-side support for the Random Number [all …]
|
/Linux-v6.6/include/crypto/ |
D | rng.h | 3 * RNG: Random Number Generator algorithms under the crypto API 33 * struct rng_alg - random number generator definition 36 * random number. The random number generator transform 37 * must generate the random number out of the context 40 * @seed: Seed or reseed the random number generator. With the 41 * invocation of this function call, the random number 43 * random number generator requires a seed for setting 50 * @seedsize: The seed size required for a random number generator 52 * random number generators does not require a seed 85 * DOC: Random number generator API [all …]
|
/Linux-v6.6/tools/testing/selftests/powerpc/signal/ |
D | sigfuz.c | 14 * test depends on random numbers, and, based on them, it sets different TM 18 * to the sigreturn system call with random data, in order to make sure that 153 ucp->uc_mcontext.gp_regs[PT_MSR] = random(); in trap_signal_handler() 155 ucp->uc_mcontext.gp_regs[PT_NIP] = random(); in trap_signal_handler() 157 ucp->uc_link->uc_mcontext.gp_regs[PT_MSR] = random(); in trap_signal_handler() 159 ucp->uc_link->uc_mcontext.gp_regs[PT_NIP] = random(); in trap_signal_handler() 161 ucp->uc_mcontext.gp_regs[PT_TRAP] = random(); in trap_signal_handler() 162 ucp->uc_mcontext.gp_regs[PT_DSISR] = random(); in trap_signal_handler() 163 ucp->uc_mcontext.gp_regs[PT_DAR] = random(); in trap_signal_handler() 164 ucp->uc_mcontext.gp_regs[PT_ORIG_R3] = random(); in trap_signal_handler() [all …]
|
/Linux-v6.6/Documentation/admin-guide/ |
D | hw_random.rst | 2 Hardware random number generators 10 a Random Number Generator (RNG). The software has two parts: 24 /dev/random special files. 30 and read() system calls, you can read random data from 36 data before assuming it is truly random. 54 Hardware driver for Intel/AMD/VIA Random Number Generators (RNG) 62 The Firmware Hub integrates a Random Number Generator (RNG) 63 using thermal noise generated from inherently random quantum 64 mechanical properties of silicon. When not generating new random 97 Random Number Generator [all …]
|
/Linux-v6.6/arch/x86/lib/ |
D | kaslr.c | 56 unsigned long raw, random = get_boot_seed(); in kaslr_get_random_long() local 68 random ^= raw; in kaslr_get_random_long() 78 random ^= raw; in kaslr_get_random_long() 85 random ^= i8254(); in kaslr_get_random_long() 90 : "=a" (random), "=d" (raw) in kaslr_get_random_long() 91 : "a" (random), "rm" (mix_const)); in kaslr_get_random_long() 92 random += raw; in kaslr_get_random_long() 97 return random; in kaslr_get_random_long()
|
/Linux-v6.6/tools/testing/selftests/powerpc/stringloops/ |
D | memcmp.c | 105 s1[j] = random(); in testcase() 107 rand_s1 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase() 108 rand_s2 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase() 112 change = random() % comp_size; in testcase() 113 rand_s2[change] = random() & 0xff; in testcase() 131 s1[j] = random(); in testcase() 133 rand_s1 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase() 134 rand_s2 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase() 139 change = random() % comp_size; in testcase() 140 s2[change] = random() & 0xff; in testcase()
|
/Linux-v6.6/arch/s390/boot/ |
D | kaslr.c | 57 unsigned long seed, random; in get_random() local 66 cpacf_trng(NULL, 0, (u8 *) &random, sizeof(random)); in get_random() 71 cpacf_prno(CPACF_PRNO_SHA512_DRNG_GEN, &prno, (u8 *) &random, in get_random() 72 sizeof(random), NULL, 0); in get_random() 83 random = seed; in get_random() 84 cpacf_kmc(CPACF_KMC_PRNG, prng.parm_block, (u8 *) &random, in get_random() 85 (u8 *) &random, sizeof(random)); in get_random() 90 *value = random % limit; in get_random()
|
/Linux-v6.6/tools/testing/selftests/bpf/verifier/ |
D | ld_dw.c | 2 "ld_dw: xor semi-random 64 bit imms, test 1", 11 "ld_dw: xor semi-random 64 bit imms, test 2", 20 "ld_dw: xor semi-random 64 bit imms, test 3", 29 "ld_dw: xor semi-random 64 bit imms, test 4", 38 "ld_dw: xor semi-random 64 bit imms, test 5",
|
/Linux-v6.6/drivers/firmware/efi/libstub/ |
D | random.c | 29 * efi_get_random_bytes() - fill a buffer with random bytes 31 * @out: caller allocated buffer to receive the random bytes 34 * EFI_RNG_PROTOCOL or there are not enough random bytes available to fill 53 * efi_random_get_seed() - provide random seed as configuration table 55 * The EFI_RNG_PROTOCOL is used to read random bytes. These random bytes are 57 * for the initialization of its pseudo random number generator. 59 * If the EFI_RNG_PROTOCOL is not available or there are not enough random bytes
|
/Linux-v6.6/tools/testing/selftests/drivers/net/mlxsw/ |
D | sharedbuffer_configuration.py | 6 import random 16 objects, pool, tcbind and portpool. Provide an interface to get random 19 - random size 22 - random pool number 23 - random threshold 26 - random threshold 49 th = random.randint(3, 16) 67 return arr[random.randint(0, len(arr) - 1)] 223 # For each pool, set random size and static threshold type 296 # Bind each port and unicast TC (TCs < 8) to a random pool and a random [all …]
|
/Linux-v6.6/lib/ |
D | uuid.c | 14 #include <linux/random.h> 25 * generate_random_uuid - generate a random UUID 28 * Random UUID interface 36 /* Set UUID version to 4 --- truly random generation */ in generate_random_uuid() 46 /* Set GUID version to 4 --- truly random generation */ in generate_random_guid() 63 /* version 4 : random generation */ in guid_gen() 71 /* version 4 : random generation */ in uuid_gen()
|
/Linux-v6.6/Documentation/admin-guide/device-mapper/ |
D | dm-zoned.rst | 11 device-side performance degradation due to excessive random writes on 53 zones of the device may be used also for buffering user random writes. 56 reused for buffering incoming random writes. 75 zone used to buffer random modification to the data zone. 95 chunk, resulting in native random write performance similar to a regular 177 0 <size> zoned <nr_zones> zones <nr_unmap_rnd>/<nr_rnd> random <nr_unmap_seq>/<nr_seq> sequential 180 of unmapped (ie free) random zones, <nr_rnd> the total number of zones, 185 percent free random zones. In order to start the reclaim process manually 193 will start the reclaim process and random zones will be moved to sequential
|
/Linux-v6.6/net/netfilter/ipvs/ |
D | ip_vs_twos.c | 12 #include <linux/random.h> 24 * - rweight1 = random number between [0,total_weight] 25 * - rweight2 = random number between [0,total_weight] 39 * The Power of Two Random Choices: A Survey of Techniques and Results 54 /* Generate a random weight between [0,sum of all weights) */ in ip_vs_twos_schedule() 70 /* Add 1 to total_weight so that the random weights are inclusive in ip_vs_twos_schedule()
|
/Linux-v6.6/include/linux/ |
D | hw_random.h | 2 Hardware Random Number Generator 21 * struct hwrng - Hardware Random Number Generator driver 29 * Returns the number of lower random bytes in "data". 58 /** Register a new Hardware Random Number Generator driver. */ 61 /** Unregister a Hardware Random Number Generator driver. */
|
D | kasan-tags.h | 7 #define KASAN_TAG_MAX 0xFD /* maximum value for random tags */ 10 #define KASAN_TAG_MIN 0xF0 /* minimum value for random tags */ 12 #define KASAN_TAG_MIN 0x00 /* minimum value for random tags */
|
/Linux-v6.6/tools/testing/selftests/net/ |
D | test_ingress_egress_chaining.sh | 20 ns="ns$((RANDOM%899+100))" 21 veth1="veth1$((RANDOM%899+100))" 22 veth2="veth2$((RANDOM%899+100))" 23 peer1="peer1$((RANDOM%899+100))" 24 peer2="peer2$((RANDOM%899+100))"
|
/Linux-v6.6/arch/powerpc/mm/nohash/ |
D | kaslr_booke.c | 286 unsigned long offset, random; in kaslr_choose_location() local 295 random = get_boot_seed(dt_ptr); in kaslr_choose_location() 299 random = rotate_xor(random, &seed, sizeof(seed)); in kaslr_choose_location() 306 random = rotate_xor(random, &seed, sizeof(seed)); in kaslr_choose_location() 336 * Only use the low 8 bits of the random seed in kaslr_choose_location() 338 index = random & 0xFF; in kaslr_choose_location() 342 offset = random % (SZ_64M - kernel_sz); in kaslr_choose_location() 349 * To see if we need to relocate the kernel to a random offset
|
/Linux-v6.6/drivers/net/team/ |
D | team_mode_random.c | 3 * drivers/net/team/team_mode_random.c - Random mode for team 42 .kind = "random", 63 MODULE_DESCRIPTION("Random mode for team"); 64 MODULE_ALIAS_TEAM_MODE("random");
|
/Linux-v6.6/drivers/staging/media/atomisp/pci/ |
D | ia_css_prbs.h | 20 * This file contains support for Pseudo Random Bit Sequence (PRBS) inputs 42 * Seed the for the Pseudo Random Bit Sequence. 50 int seed; /** random seed for the 1st 2-pixel-components/clock */ 51 int seed1; /** random seed for the 2nd 2-pixel-components/clock */
|
/Linux-v6.6/arch/x86/tools/ |
D | insn_sanity.c | 23 * Feed random binary to instruction decoder and ensure not to 33 static unsigned int seed; /* Random seed */ 46 fprintf(stderr, "\t-s Give a random seed (and iteration number)\n"); in usage() 148 /* Fills buffer with random binary up to MAX_INSN_SIZE */ in generate_insn() 150 *(unsigned short *)(&insn_buff[i]) = random() & 0xffff; in generate_insn() 153 insn_buff[i++] = random() & 0xff; in generate_insn() 209 usage("Don't use input file (-i) with random seed (-s)"); in parse_args() 211 /* Initialize random seed */ in parse_args() 260 (input_file) ? "given" : "random", in main()
|
/Linux-v6.6/include/uapi/linux/ |
D | random.h | 3 * include/linux/random.h 5 * Include file for the random number generator. 15 /* ioctl()'s for the random number generator */ 52 * GRND_INSECURE Return non-cryptographic random bytes
|
/Linux-v6.6/drivers/char/ |
D | random.c | 35 #include <linux/random.h> 97 MODULE_PARM_DESC(ratelimit_disable, "Disable random ratelimit suppression"); 101 * to supply cryptographically secure random numbers. This applies to: the 124 * cryptographically secure random numbers. This applies to: the /dev/urandom 168 printk_deferred(KERN_NOTICE "random: %s called from %pS with crng_init=%d\n", \ 178 * RNG described at <https://blog.cr.yp.to/20170723-random.html>. 192 * These interfaces will return the requested number of random bytes 195 * functions may be higher performance for one-off random integers, 284 * half of the block containing 32 bytes of random data that may 314 * random data. It also returns up to 32 bytes on its own of random data [all …]
|
/Linux-v6.6/Documentation/devicetree/bindings/rng/ |
D | microchip,pic32-rng.txt | 1 * Microchip PIC32 Random Number Generator 3 The PIC32 RNG provides a pseudo random number generator which can be seeded by 4 another true random number generator.
|
/Linux-v6.6/Documentation/crypto/ |
D | api-rng.rst | 1 Random Number Algorithm Definitions 7 Crypto API Random Number API 11 :doc: Random number generator API
|
/Linux-v6.6/drivers/s390/scsi/ |
D | zfcp_ccw.c | 62 * We want to scan ports here, with some random backoff and without in zfcp_ccw_activate() 64 * but with both random delay and rate limit. Nevertheless we get in zfcp_ccw_activate() 66 * an equivalent random time. in zfcp_ccw_activate() 67 * Let the port scan random delay elapse first. If recovery finishes in zfcp_ccw_activate() 70 * point in waiting a random delay on top of the time consumed by in zfcp_ccw_activate() 181 * We want to scan ports here, always, with some random delay and in zfcp_ccw_set_online() 186 * Since zfcp_ccw_activate() has waited the desired random time, in zfcp_ccw_set_online()
|