Navigation: Linux Kernel Driver DataBase - web LKDDB: Main index - R index
The Linux kernel configuration item CONFIG_RANDOM_TRUST_BOOTLOADER
has multiple definitions:
drivers/char/Kconfig
The configuration item CONFIG_RANDOM_TRUST_BOOTLOADER:
(none)
Initialize the RNG using a seed supplied by the bootloader or boot environment (e.g. EFI or a bootloader-generated device tree). This seed is not used directly, but is rather hashed into the main input pool, and this happens regardless of whether or not this option is enabled. Instead, this option controls whether the seed is credited and hence can initialize the RNG. Additionally, other sources of randomness are always used, regardless of this setting. Enabling this implies trusting that the bootloader can supply high quality and non-backdoored seeds.
Say Y here unless you have reason to mistrust your bootloader or believe its RNG facilities may be faulty. This may also be configured at boot time with "random.trust_bootloader=on/off".
drivers/char/Kconfig
The configuration item CONFIG_RANDOM_TRUST_BOOTLOADER:
(none)
Some bootloaders can provide entropy to increase the kernel's initial device randomness. Say Y here to assume the entropy provided by the booloader is trustworthy so it will be added to the kernel's entropy pool. Otherwise, say N here so it will be regarded as device input that only mixes the entropy pool. This can also be configured at boot with "random.trust_bootloader=on/off".
Raw data from LKDDb:
(none)
This page is automaticly generated with free (libre, open) software lkddb(see lkddb-sources).
The data is retrived from:
Popular queries:
Navigation: Linux Kernel Driver DataBase - web LKDDB: main index - R index
Automatically generated (in year 2024). See also LKDDb sources on GitLab