Home
last modified time | relevance | path

Searched refs:randomness (Results 1 – 12 of 12) sorted by relevance

/OK3568_Linux_fs/kernel/drivers/soc/tegra/fuse/
H A Dfuse-tegra30.c70 u32 randomness[12]; in tegra30_fuse_add_randomness() local
72 randomness[0] = tegra_sku_info.sku_id; in tegra30_fuse_add_randomness()
73 randomness[1] = tegra_read_straps(); in tegra30_fuse_add_randomness()
74 randomness[2] = tegra_read_chipid(); in tegra30_fuse_add_randomness()
75 randomness[3] = tegra_sku_info.cpu_process_id << 16; in tegra30_fuse_add_randomness()
76 randomness[3] |= tegra_sku_info.soc_process_id; in tegra30_fuse_add_randomness()
77 randomness[4] = tegra_sku_info.cpu_speedo_id << 16; in tegra30_fuse_add_randomness()
78 randomness[4] |= tegra_sku_info.soc_speedo_id; in tegra30_fuse_add_randomness()
79 randomness[5] = tegra_fuse_read_early(FUSE_VENDOR_CODE); in tegra30_fuse_add_randomness()
80 randomness[6] = tegra_fuse_read_early(FUSE_FAB_CODE); in tegra30_fuse_add_randomness()
[all …]
H A Dfuse-tegra20.c138 u32 randomness[7]; in tegra20_fuse_add_randomness() local
140 randomness[0] = tegra_sku_info.sku_id; in tegra20_fuse_add_randomness()
141 randomness[1] = tegra_read_straps(); in tegra20_fuse_add_randomness()
142 randomness[2] = tegra_read_chipid(); in tegra20_fuse_add_randomness()
143 randomness[3] = tegra_sku_info.cpu_process_id << 16; in tegra20_fuse_add_randomness()
144 randomness[3] |= tegra_sku_info.soc_process_id; in tegra20_fuse_add_randomness()
145 randomness[4] = tegra_sku_info.cpu_speedo_id << 16; in tegra20_fuse_add_randomness()
146 randomness[4] |= tegra_sku_info.soc_speedo_id; in tegra20_fuse_add_randomness()
147 randomness[5] = tegra_fuse_read_early(FUSE_UID_LOW); in tegra20_fuse_add_randomness()
148 randomness[6] = tegra_fuse_read_early(FUSE_UID_HIGH); in tegra20_fuse_add_randomness()
[all …]
/OK3568_Linux_fs/kernel/drivers/nvmem/
H A Dsunxi_sid.c120 char *randomness; in sunxi_sid_probe() local
159 randomness = kzalloc(size, GFP_KERNEL); in sunxi_sid_probe()
160 if (!randomness) in sunxi_sid_probe()
163 nvmem_cfg->reg_read(sid, 0, randomness, size); in sunxi_sid_probe()
164 add_device_randomness(randomness, size); in sunxi_sid_probe()
165 kfree(randomness); in sunxi_sid_probe()
/OK3568_Linux_fs/kernel/drivers/net/wireless/ath/ath9k/
H A DKconfig203 randomness into Linux entropy pool (/dev/urandom and /dev/random)
/OK3568_Linux_fs/kernel/drivers/char/tpm/
H A DKconfig36 device. This allows the kernel to collect randomness from the TPM at
/OK3568_Linux_fs/kernel/drivers/char/
H A DKconfig485 other sources of randomness are always used, regardless of this
503 randomness are always used, regardless of this setting. Enabling
/OK3568_Linux_fs/kernel/lib/
H A DKconfig.debug1469 bool "Warn for all uses of unseeded randomness"
1490 unseeded randomness. This will be of use primarily for
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/share/info/
H A Dlibc.info-133691 a cryptographic randomness source, if one is provided by the operating
3976 from a "randomness source" supplied by the operating system. The
3977 randomness source is a CRNG at heart, but it also continually “re-seeds”
3978 itself from physical sources of randomness, such as electronic noise and
4003 The operating system does not implement a randomness source,
4017 booted and the randomness source has not yet been initialized.
4038 ‘/dev/urandom’ (non-blocking) source to obtain randomness.
4041 quite some time, even after the randomness source has been
4043 when the system has just booted and the randomness source has
4062 The operating system does not implement a randomness source,
[all …]
H A Dlibc.info-156700 * randomness source: Unpredictable Bytes. (line 6)
/OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/share/info/
H A Dlibc.info-133691 a cryptographic randomness source, if one is provided by the operating
3976 from a "randomness source" supplied by the operating system. The
3977 randomness source is a CRNG at heart, but it also continually “re-seeds”
3978 itself from physical sources of randomness, such as electronic noise and
4003 The operating system does not implement a randomness source,
4017 booted and the randomness source has not yet been initialized.
4038 ‘/dev/urandom’ (non-blocking) source to obtain randomness.
4041 quite some time, even after the randomness source has been
4043 when the system has just booted and the randomness source has
4062 The operating system does not implement a randomness source,
[all …]
H A Dlibc.info-156700 * randomness source: Unpredictable Bytes. (line 6)
/OK3568_Linux_fs/recovery/
HDrootfs.cpio.gz107070100A8AEB0000041ED0000000000000000000000116841B48100000000000000FD0000000200000000000000000000000200000000.�07070100A8B07C000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000900000000.gitkeep��07070100A8B07D000081A40000000000000000000000016841263500000000000000FD0000000200000000000000000000000B00000000.skip_fsck����07070100A8AEB10000A1FF0000000000000000000000016841B0B600000007000000FD0000000200000000000000000000000400000000bin���usr/bin�07070100A8B07E000081A400000000000000000000000168412635000001CC000000FD0000000200000000000000000000001100000000busybox. ...