• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/char/

Lines Matching refs:random

2  * random.c -- A strong random number generator
46 * and returns good random numbers, suitable for cryptographic use.
49 * desirable to have numbers which are not only random, but hard to
56 * to produce truly random numbers on a computer --- as opposed to
57 * pseudo-random numbers, which can easily generated by using a
59 * the sequence of pseudo-random number generators, and for some
63 * generate random numbers. In a Unix environment, this is best done
74 * As random bytes are mixed into the entropy pool, the routines keep
76 * the random number generator's internal state.
78 * When random bytes are desired, they are obtained by taking the SHA
88 * outputs random numbers.
91 * random numbers; however, an attacker may (at least in theory) be
106 * This interface will return the requested number of random bytes,
109 * The two other interfaces are two character devices /dev/random and
110 * /dev/urandom. /dev/random is suitable for use when very high
113 * bits of randomness (as estimated by the random number generator)
117 * as many bytes as are requested. As more and more random bytes are
119 * this will result in random numbers that are merely cryptographically
135 * add_interrupt_randomness() uses the inter-interrupt timing as random
160 * echo "Initializing random number generator..."
161 * random_seed=/var/run/random-seed
162 * # Carry a random seed from start-up to start-up
175 * # Carry a random seed from shut-down to start-up
177 * echo "Saving random seed..."
178 * random_seed=/var/run/random-seed
185 * /etc/rc.d/init.d/random. On older Linux systems, the correct script
191 * make sure that /etc/random-seed is different for every start-up,
197 * Configuring the /dev/random driver under Linux
200 * The /dev/random driver under Linux uses minor numbers 8 and 9 of
202 * /dev/random and /dev/urandom created already, they can be created
205 * mknod /dev/random c 1 8
211 * Ideas for constructing this random number generator were derived
212 * from Pretty Good Privacy's random number generator, and from private
213 * discussions with Phil Karn. Colin Plumb provided a faster random
233 #include <linux/random.h>
264 * /dev/random. Should be enough to do a significant reseed.
271 * access to /dev/random.
318 * of a random large-degree polynomial over GF(2) are more than large enough
323 * i.e. it not produce collisions when fed "random" data of the sort
338 * modulo the generator polymnomial. Now, for random primitive polynomials,
341 * polynomail, so if it is chosen at random, an attacker can never force
668 if (!disk || !disk->random)
674 add_timer_randomness(disk->random, 0x100 + disk_devt(disk));
883 * number of good random numbers, suitable for seeding TCP sequence
953 disk->random = state;
1145 * Generate random UUID
1150 /* Set UUID version to 4 --- truly random generation */
1173 * These functions is used to return both the bootid UUID, and random
1261 * TCP initial sequence number picking. This uses the random number
1390 * The ISN generation runs lockless - it's just a hash over random data.
1391 * State changes happen every 5 minutes when the random key is replaced.
1467 * which is then hashed with random data.
1490 * then mixed with a partial MD4 over random data.
1522 * (saddr, daddr, dport) and 48bits of random data.
1580 * Get a random word for internal kernel use only. Similar to urandom but
1581 * with the goal of minimal entropy pool depletion. As a result, the random