/Linux-v5.10/drivers/char/hw_random/ |
D | Kconfig | 3 # Hardware Random Number Generator (RNG) configuration 7 tristate "Hardware Random Number Generator Core support" 10 Hardware Random Number Generator Core infrastructure. 15 of possibly several hardware random number generators. 17 These hardware random number generators do feed into the 18 kernel's random number generator entropy pool. 25 tristate "Timer IOMEM HW Random Number Generator support" 28 This driver provides kernel-side support for a generic Random 39 tristate "Intel HW Random Number Generator support" 43 This driver provides kernel-side support for the Random Number [all …]
|
/Linux-v5.10/include/crypto/ |
D | rng.h | 3 * RNG: Random Number Generator algorithms under the crypto API 17 * struct rng_alg - random number generator definition 20 * random number. The random number generator transform 21 * must generate the random number out of the context 24 * @seed: Seed or reseed the random number generator. With the 25 * invocation of this function call, the random number 27 * random number generator requires a seed for setting 33 * @seedsize: The seed size required for a random number generator 35 * random number generators does not require a seed 64 * DOC: Random number generator API [all …]
|
/Linux-v5.10/tools/testing/selftests/powerpc/signal/ |
D | sigfuz.c | 14 * test depends on random numbers, and, based on them, it sets different TM 18 * to the sigreturn system call with random data, in order to make sure that 153 ucp->uc_mcontext.gp_regs[PT_MSR] = random(); in trap_signal_handler() 155 ucp->uc_mcontext.gp_regs[PT_NIP] = random(); in trap_signal_handler() 157 ucp->uc_link->uc_mcontext.gp_regs[PT_MSR] = random(); in trap_signal_handler() 159 ucp->uc_link->uc_mcontext.gp_regs[PT_NIP] = random(); in trap_signal_handler() 161 ucp->uc_mcontext.gp_regs[PT_TRAP] = random(); in trap_signal_handler() 162 ucp->uc_mcontext.gp_regs[PT_DSISR] = random(); in trap_signal_handler() 163 ucp->uc_mcontext.gp_regs[PT_DAR] = random(); in trap_signal_handler() 164 ucp->uc_mcontext.gp_regs[PT_ORIG_R3] = random(); in trap_signal_handler() [all …]
|
/Linux-v5.10/arch/x86/lib/ |
D | kaslr.c | 56 unsigned long raw, random = get_boot_seed(); in kaslr_get_random_long() local 65 random ^= raw; in kaslr_get_random_long() 74 random ^= raw; in kaslr_get_random_long() 80 random ^= i8254(); in kaslr_get_random_long() 85 : "=a" (random), "=d" (raw) in kaslr_get_random_long() 86 : "a" (random), "rm" (mix_const)); in kaslr_get_random_long() 87 random += raw; in kaslr_get_random_long() 91 return random; in kaslr_get_random_long()
|
/Linux-v5.10/Documentation/admin-guide/ |
D | hw_random.rst | 2 Linux support for random number generator in i8xx chipsets 10 a Random Number Generator (RNG). The software has two parts: 24 /dev/random special files. 30 and read() system calls, you can read random data from 36 data before assuming it is truly random. 54 Hardware driver for Intel/AMD/VIA Random Number Generators (RNG) 62 The Firmware Hub integrates a Random Number Generator (RNG) 63 using thermal noise generated from inherently random quantum 64 mechanical properties of silicon. When not generating new random 97 Random Number Generator [all …]
|
/Linux-v5.10/drivers/firmware/efi/libstub/ |
D | random.c | 29 * efi_get_random_bytes() - fill a buffer with random bytes 31 * @out: caller allocated buffer to receive the random bytes 34 * EFI_RNG_PROTOCOL or there are not enough random bytes available to fill 53 * efi_random_get_seed() - provide random seed as configuration table 55 * The EFI_RNG_PROTOCOL is used to read random bytes. These random bytes are 57 * for the initialization of its pseudo random number generator. 59 * If the EFI_RNG_PROTOCOL is not available or there are not enough random bytes
|
/Linux-v5.10/arch/s390/crypto/ |
D | arch_random.c | 3 * s390 arch random implementation. 8 * The s390_arch_random_generate() function may be called from random.c 10 * fast. There is a buffer of random data which is asynchronously checked 16 * high quality (but slow) true hardware random generator. This entropy 17 * is then spread over the buffer with an pseudo random generator PRNG. 32 #include <linux/random.h> 108 /* alloc arch random working buffer */ in s390_arch_random_init() 113 /* kick worker queue job to fill the random buffer */ in s390_arch_random_init() 117 /* enable arch random to the outside world */ in s390_arch_random_init()
|
/Linux-v5.10/tools/testing/selftests/powerpc/stringloops/ |
D | memcmp.c | 105 s1[j] = random(); in testcase() 107 rand_s1 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase() 108 rand_s2 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase() 112 change = random() % comp_size; in testcase() 113 rand_s2[change] = random() & 0xff; in testcase() 131 s1[j] = random(); in testcase() 133 rand_s1 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase() 134 rand_s2 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase() 139 change = random() % comp_size; in testcase() 140 s2[change] = random() & 0xff; in testcase()
|
/Linux-v5.10/arch/s390/boot/ |
D | kaslr.c | 56 unsigned long seed, random; in get_random() local 65 cpacf_trng(NULL, 0, (u8 *) &random, sizeof(random)); in get_random() 70 cpacf_prno(CPACF_PRNO_SHA512_DRNG_GEN, &prno, (u8 *) &random, in get_random() 71 sizeof(random), NULL, 0); in get_random() 82 random = seed; in get_random() 83 cpacf_kmc(CPACF_KMC_PRNG, prng.parm_block, (u8 *) &random, in get_random() 84 (u8 *) &random, sizeof(random)); in get_random() 89 *value = random % limit; in get_random() 115 * addresses we generate random value just once. For that we need to build a
|
/Linux-v5.10/tools/testing/selftests/bpf/verifier/ |
D | ld_dw.c | 2 "ld_dw: xor semi-random 64 bit imms, test 1", 11 "ld_dw: xor semi-random 64 bit imms, test 2", 20 "ld_dw: xor semi-random 64 bit imms, test 3", 29 "ld_dw: xor semi-random 64 bit imms, test 4", 38 "ld_dw: xor semi-random 64 bit imms, test 5",
|
/Linux-v5.10/include/linux/ |
D | hw_random.h | 2 Hardware Random Number Generator 21 * struct hwrng - Hardware Random Number Generator driver 29 * Returns the number of lower random bytes in "data". 57 /** Register a new Hardware Random Number Generator driver. */ 60 /** Unregister a Hardware Random Number Generator driver. */ 63 /** Feed random bits into the pool. */
|
D | prandom.h | 5 * Include file for the fast pseudo-random 32-bit 83 * prandom_u32_max - returns a pseudo-random number in interval [0, ep_ro) 86 * Returns a pseudo-random number that is in interval [0, ep_ro). Note 90 * random index of an array containing ep_ro elements, for example. 92 * Returns: pseudo-random number in interval [0, ep_ro) 123 /* Pseudo random number generator from numerical recipes. */
|
/Linux-v5.10/tools/testing/selftests/drivers/net/mlxsw/ |
D | sharedbuffer_configuration.py | 6 import random 16 objects, pool, tcbind and portpool. Provide an interface to get random 19 - random size 22 - random pool number 23 - random threshold 26 - random threshold 49 th = random.randint(3, 16) 67 return arr[random.randint(0, len(arr) - 1)] 223 # For each pool, set random size and static threshold type 296 # Bind each port and unicast TC (TCs < 8) to a random pool and a random [all …]
|
/Linux-v5.10/lib/ |
D | uuid.c | 14 #include <linux/random.h> 25 * generate_random_uuid - generate a random UUID 28 * Random UUID interface 36 /* Set UUID version to 4 --- truly random generation */ in generate_random_uuid() 46 /* Set GUID version to 4 --- truly random generation */ in generate_random_guid() 63 /* version 4 : random generation */ in guid_gen() 71 /* version 4 : random generation */ in uuid_gen()
|
D | random32.c | 39 #include <linux/random.h> 43 #include <trace/events/random.h> 46 * prandom_u32_state - seeded pseudo-random number generator. 50 * For more random results, use prandom_u32(). 65 * prandom_bytes_state - get the requested number of pseudo-random bytes 68 * @buf: where to copy the pseudo-random bytes to 72 * For more random results, use prandom_bytes(). 318 * Because of (ab)use in the networking code for choosing random TCP/UDP port 378 * prandom_u32 - pseudo random number generator 380 * A 32 bit pseudo-random number is generated using a fast [all …]
|
/Linux-v5.10/Documentation/admin-guide/device-mapper/ |
D | dm-zoned.rst | 11 device-side performance degradation due to excessive random writes on 53 zones of the device may be used also for buffering user random writes. 56 reused for buffering incoming random writes. 75 zone used to buffer random modification to the data zone. 95 chunk, resulting in native random write performance similar to a regular 177 0 <size> zoned <nr_zones> zones <nr_unmap_rnd>/<nr_rnd> random <nr_unmap_seq>/<nr_seq> sequential 180 of unmapped (ie free) random zones, <nr_rnd> the total number of zones, 185 percent free random zones. In order to start the reclaim process manually 193 will start the reclaim process and random zones will be moved to sequential
|
/Linux-v5.10/drivers/char/ |
D | random.c | 2 * random.c -- A strong random number generator 49 * and returns good random numbers, suitable for cryptographic use. 52 * desirable to have numbers which are not only random, but hard to 59 * to produce truly random numbers on a computer --- as opposed to 60 * pseudo-random numbers, which can easily generated by using a 62 * the sequence of pseudo-random number generators, and for some 66 * generate random numbers. In a Unix environment, this is best done 77 * As random bytes are mixed into the entropy pool, the routines keep 79 * the random number generator's internal state. 81 * When random bytes are desired, they are obtained by taking the SHA [all …]
|
/Linux-v5.10/drivers/staging/media/atomisp/pci/ |
D | ia_css_prbs.h | 20 * This file contains support for Pseudo Random Bit Sequence (PRBS) inputs 42 * Seed the for the Pseudo Random Bit Sequence. 50 int seed; /** random seed for the 1st 2-pixel-components/clock */ 51 int seed1; /** random seed for the 2nd 2-pixel-components/clock */
|
/Linux-v5.10/drivers/net/team/ |
D | team_mode_random.c | 3 * drivers/net/team/team_mode_random.c - Random mode for team 42 .kind = "random", 63 MODULE_DESCRIPTION("Random mode for team"); 64 MODULE_ALIAS_TEAM_MODE("random");
|
/Linux-v5.10/include/uapi/linux/ |
D | random.h | 3 * include/linux/random.h 5 * Include file for the random number generator. 15 /* ioctl()'s for the random number generator */ 52 * GRND_INSECURE Return non-cryptographic random bytes
|
/Linux-v5.10/arch/x86/tools/ |
D | insn_sanity.c | 27 * Feed random binary to instruction decoder and ensure not to 37 static unsigned int seed; /* Random seed */ 50 fprintf(stderr, "\t-s Give a random seed (and iteration number)\n"); in usage() 152 /* Fills buffer with random binary up to MAX_INSN_SIZE */ in generate_insn() 154 *(unsigned short *)(&insn_buff[i]) = random() & 0xffff; in generate_insn() 157 insn_buff[i++] = random() & 0xff; in generate_insn() 213 usage("Don't use input file (-i) with random seed (-s)"); in parse_args() 215 /* Initialize random seed */ in parse_args() 264 (input_file) ? "given" : "random", in main()
|
/Linux-v5.10/arch/powerpc/mm/nohash/ |
D | kaslr_booke.c | 292 unsigned long offset, random; in kaslr_choose_location() local 301 random = get_boot_seed(dt_ptr); in kaslr_choose_location() 305 random = rotate_xor(random, &seed, sizeof(seed)); in kaslr_choose_location() 312 random = rotate_xor(random, &seed, sizeof(seed)); in kaslr_choose_location() 342 * Only use the low 8 bits of the random seed in kaslr_choose_location() 344 index = random & 0xFF; in kaslr_choose_location() 348 offset = random % (SZ_64M - kernel_sz); in kaslr_choose_location() 355 * To see if we need to relocate the kernel to a random offset
|
/Linux-v5.10/Documentation/devicetree/bindings/rng/ |
D | microchip,pic32-rng.txt | 1 * Microchip PIC32 Random Number Generator 3 The PIC32 RNG provides a pseudo random number generator which can be seeded by 4 another true random number generator.
|
/Linux-v5.10/Documentation/crypto/ |
D | api-rng.rst | 1 Random Number Algorithm Definitions 7 Crypto API Random Number API 11 :doc: Random number generator API
|
/Linux-v5.10/samples/pktgen/ |
D | pktgen_sample01_simple.sh | 6 # * flow variation via random UDP source port 37 # Flow variation random source port between min and max 72 # Single destination port or random port range 78 # Setup random UDP port src range
|