Lines Matching +full:0 +full:x01010000

85 	CRNG_EMPTY = 0, /* Little to no entropy collected */
134 * Returns: 0 if the input pool has been seeded.
145 return ret > 0 ? 0 : ret; in wait_for_random_bytes()
147 return 0; in wait_for_random_bytes()
160 int ret = 0; in execute_with_initialized_rng()
164 nb->notifier_call(nb, 0, NULL); in execute_with_initialized_rng()
281 * _vdso_rng_data.generation's invalid value is 0, so add one to the in crng_reseed()
325 memset(&chacha_state[12], 0, sizeof(u32) * 4); in crng_fast_key_erasure()
419 if (unlikely(chacha_state[12] == 0)) in _get_random_bytes()
432 * wait_for_random_bytes() should be called and return 0 at least once
446 size_t ret = 0, copied; in get_random_bytes_user()
449 return 0; in get_random_bytes_user()
469 if (unlikely(chacha_state[12] == 0)) in get_random_bytes_user()
477 BUILD_BUG_ON(PAGE_SIZE % sizeof(block) != 0); in get_random_bytes_user()
478 if (ret % PAGE_SIZE == 0) { in get_random_bytes_user()
495 * should be called and return 0 at least once at any point prior.
539 batch->position = 0; \
544 batch->entropy[batch->position] = 0; \
571 * This function is technically undefined for ceil == 0, and in fact in DEFINE_BATCHED_ENTROPY()
608 return 0; in random_prepare_cpu()
642 .hash.h = { BLAKE2S_IV0 ^ (0x01010000 | BLAKE2S_HASH_SIZE),
682 for (i = 0; i < ARRAY_SIZE(block.rdseed);) { in extract_entropy()
701 /* next_key = HASHPRF(seed, RDSEED || 0) */ in extract_entropy()
702 block.counter = 0; in extract_entropy()
744 atomic_notifier_call_chain(&random_ready_notifier, 0, NULL); in _credit_init_bits()
856 return 0; in random_pm_notification()
875 for (i = 0, arch_bits = sizeof(entropy) * 8; i < ARRAY_SIZE(entropy);) { in random_init_early()
998 blocking_notifier_call_chain(&vmfork_chain, 0, NULL); in add_vmfork_randomness()
1034 .mix = __TIMER_INITIALIZER(mix_interrupt_randomness, 0)
1046 FASTMIX_PERM(s[0], s[1], s[2], s[3]); in fast_mix()
1047 s[0] ^= v1; in fast_mix()
1049 FASTMIX_PERM(s[0], s[1], s[2], s[3]); in fast_mix()
1050 s[0] ^= v2; in fast_mix()
1071 per_cpu_ptr(&irq_randomness, cpu)->count = 0; in random_online_cpu()
1072 return 0; in random_online_cpu()
1102 fast_pool->count = 0; in mix_interrupt_randomness()
1187 if (delta < 0) in add_timer_randomness()
1189 if (delta2 < 0) in add_timer_randomness()
1191 if (delta3 < 0) in add_timer_randomness()
1237 /* First major is 1, so we get >= 0x200 here. */ in add_disk_randomness()
1238 add_timer_randomness(disk->random, 0x100 + disk_devt(disk)); in add_disk_randomness()
1282 if (atomic_inc_return(&state->samples) % state->samples_per_bit == 0) in entropy_timer()
1295 unsigned int i, num_different = 0; in try_to_generate_entropy()
1299 for (i = 0; i < NUM_TRIAL_SAMPLES - 1; ++i) { in try_to_generate_entropy()
1309 atomic_set(&stack->samples, 0); in try_to_generate_entropy()
1310 timer_setup_on_stack(&stack->timer, entropy_timer, 0); in try_to_generate_entropy()
1316 if (!timer_pending(&stack->timer) && try_to_del_timer_sync(&stack->timer) >= 0) { in try_to_generate_entropy()
1330 if (unlikely(num_cpus == 0)) { in try_to_generate_entropy()
1368 * getrandom(2) with flags=0. In earlier versions, however, it had
1426 ssize_t ret = 0; in write_pool_user()
1430 return 0; in write_pool_user()
1439 BUILD_BUG_ON(PAGE_SIZE % sizeof(block) != 0); in write_pool_user()
1440 if (ret % PAGE_SIZE == 0) { in write_pool_user()
1468 if (!ratelimit_disable && maxwarn <= 0) in urandom_read_iter()
1490 if (ret != 0) in random_read_iter()
1505 return 0; in random_ioctl()
1511 if (ent_count < 0) in random_ioctl()
1514 return 0; in random_ioctl()
1524 if (ent_count < 0) in random_ioctl()
1532 if (unlikely(ret < 0)) in random_ioctl()
1538 return 0; in random_ioctl()
1545 return 0; in random_ioctl()
1552 return 0; in random_ioctl()
1658 return proc_dostring(&fake_table, 0, buf, lenp, ppos); in proc_do_uuid()
1665 return write ? 0 : proc_dointvec(table, 0, buf, lenp, ppos); in proc_do_rointvec()
1717 return 0; in random_sysctls_init()