summaryrefslogtreecommitdiffstats
path: root/drivers/char/random.c
Commit message (Expand)AuthorAgeFilesLines
* drivers/char/random: Replace __get_cpu_var usesChristoph Lameter2014-08-261-1/+1
* Merge tag 'random_for_linus' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2014-08-061-128/+187
|\
| * random: limit the contribution of the hw rng to at most halfTheodore Ts'o2014-08-051-39/+4
| * random: introduce getrandom(2) system callTheodore Ts'o2014-08-051-3/+37
| * random: use registers from interrupted code for CPU's w/o a cycle counterTheodore Ts'o2014-07-151-25/+22
| * random: add_hwgenerator_randomness() for feeding entropy from devicesTorsten Duwe2014-07-151-0/+21
| * random: use an improved fast_mix() functionTheodore Ts'o2014-07-151-24/+68
| * random: clean up interrupt entropy accounting for archs w/o cycle countersTheodore Ts'o2014-07-151-19/+23
| * random: only update the last_pulled time if we actually transferred entropyTheodore Ts'o2014-07-151-4/+7
| * random: remove unneeded hash of a portion of the entropy poolTheodore Ts'o2014-07-151-31/+20
| * random: always update the entropy pool under the spinlockTheodore Ts'o2014-07-151-21/+23
* | random: check for increase of entropy_count because of signed conversionHannes Frederic Sowa2014-07-191-3/+14
|/
* Merge tag 'random_for_linus' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2014-06-171-8/+9
|\
| * random: fix nasty entropy accounting bugTheodore Ts'o2014-06-151-8/+9
* | random: convert use of typedef ctl_table to struct ctl_tableJoe Perches2014-06-061-2/+2
* | Merge branch 'for-3.16/core' of git://git.kernel.dk/linux-block into nextLinus Torvalds2014-06-021-0/+1
|\ \ | |/ |/|
| * random: export add_disk_randomnessChristoph Hellwig2014-04-281-0/+1
* | random: fix BUG_ON caused by accounting simplificationTheodore Ts'o2014-05-161-2/+5
|/
* random: Add arch_has_random[_seed]()H. Peter Anvin2014-03-191-0/+3
* random: If we have arch_get_random_seed*(), try it before blockingH. Peter Anvin2014-03-191-0/+33
* random: Use arch_get_random_seed*() at init time and once a secondH. Peter Anvin2014-03-191-4/+20
* random: use the architectural HWRNG for the SHA's IV in extract_buf()Theodore Ts'o2014-03-191-8/+8
* random: clarify bits/bytes in wakeup thresholdsGreg Price2014-03-191-17/+17
* random: entropy_bytes is actually bitsGreg Price2014-03-191-3/+3
* random: simplify accounting codeGreg Price2014-03-191-17/+10
* random: tighten bound on random_read_wakeup_threshGreg Price2014-03-191-1/+1
* random: forget lock in lockless accountingGreg Price2014-03-191-4/+0
* random: simplify accounting logicGreg Price2014-03-191-8/+4
* random: fix comment on "account"Greg Price2014-03-191-10/+21
* random: simplify loop in random_readGreg Price2014-03-191-39/+18
* random: fix description of get_random_bytesGreg Price2014-03-191-2/+3
* random: fix comment on proc_do_uuidGreg Price2014-03-191-4/+4
* random: fix typos / spelling errors in commentsGreg Price2014-03-191-3/+3
* Merge tag 'random_for_linus' of git://git.kernel.org/pub/scm/linux/kernel/git...Linus Torvalds2013-11-161-242/+405
|\
| * random: add debugging code to detect early use of get_random_bytes()Theodore Ts'o2013-11-031-0/+9
| * random: initialize the last_time field in struct timer_rand_stateTheodore Ts'o2013-11-031-2/+6
| * random: don't zap entropy count in rand_initialize()Theodore Ts'o2013-11-031-7/+9
| * random: printk notifications for urandom pool initializationTheodore Ts'o2013-11-031-1/+11
| * random: make add_timer_randomness() fill the nonblocking pool firstTheodore Ts'o2013-11-031-3/+4
| * random: convert DEBUG_ENT to tracepointsTheodore Ts'o2013-10-101-36/+16
| * random: push extra entropy to the output poolsTheodore Ts'o2013-10-101-32/+86
| * random: drop trickle modeTheodore Ts'o2013-10-101-17/+2
| * random: adjust the generator polynomials in the mixing function slightlyTheodore Ts'o2013-10-101-54/+49
| * random: speed up the fast_mix function by a factor of fourTheodore Ts'o2013-10-101-22/+28
| * random: cap the rate which the /dev/urandom pool gets reseededTheodore Ts'o2013-10-101-0/+24
| * random: optimize the entropy_store structureTheodore Ts'o2013-10-101-8/+8
| * random: optimize spinlock use in add_device_randomness()Theodore Ts'o2013-10-101-4/+10
| * random: fix the tracepoint for get_random_bytes(_arch)Theodore Ts'o2013-10-101-1/+3
| * random: account for entropy loss due to overwritesH. Peter Anvin2013-10-101-8/+52
| * random: allow fractional bits to be trackedH. Peter Anvin2013-10-101-46/+92