Lines Matching defs:on
150 * `rng_is_initialized()` on demand, or make use of `get_random_bytes_wait()`.
314 * random data. It also returns up to 32 bytes on its own of random data
353 * erasure on the base_crng, and use its output as the new key
552 * on that. But for the non-constant case, it's convenient to have that
770 * and device tree, and credits its input depending on whether or not the
786 * layer request events, on a per-disk_devt basis, as input to the
830 pr_notice("crng reseeded on system resumption\n");
950 * on the command line option 'random.trust_bootloader'.
1016 * and therefore this has no security on its own. s represents the
1040 * be scheduled on a different CPU during this period, that
1059 * supposed to be sufficiently dispersed between bits so on average
1065 /* Check to see if we're running on the wrong CPU due to hotplug. */
1176 * on general principles, and limit entropy estimate to 11 bits.
1243 * the cycle counter. Even if the timer is running on another CPU, the timer
1298 * and to avoid scheduling a timer on a dead CPU.
1302 /* Only schedule callbacks on timer CPUs that are online. */
1355 * Polling on /dev/random indicates when the RNG is initialized, on
1356 * the read side, and when it wants new entropy, on the write side.
1437 * Opportunistically attempt to initialize the RNG on platforms that
1534 static int random_fasync(int fd, struct file *filp, int on)
1536 return fasync_helper(fd, filp, on, &fasync);