Searched refs:entropy (Results 1 - 25 of 38) sorted by relevance

12

/linux-master/drivers/media/platform/verisilicon/
H A Dhantro_vp8.c52 const struct v4l2_vp8_entropy *entropy = &hdr->entropy; local
69 dst[0] = entropy->y_mode_probs[0];
70 dst[1] = entropy->y_mode_probs[1];
71 dst[2] = entropy->y_mode_probs[2];
72 dst[3] = entropy->y_mode_probs[3];
73 dst[4] = entropy->uv_mode_probs[0];
74 dst[5] = entropy->uv_mode_probs[1];
75 dst[6] = entropy->uv_mode_probs[2];
80 dst[0] = entropy
[all...]
/linux-master/arch/riscv/include/asm/
H A Darchrandom.h21 u16 *entropy = (u16 *)v; local
32 entropy[valid_seeds++] = csr_seed & SEED_ENTROPY_MASK;
64 * worth of entropy.
/linux-master/tools/testing/selftests/lkdtm/
H A DMakefile8 TEST_PROGS := stack-entropy.sh
H A Dstack-entropy.sh4 # Measure kernel stack entropy by sampling via LKDTM's REPORT_STACK test.
23 log=$(mktemp -t stack-entropy-XXXXXX)
42 echo "Bits of stack entropy: $bits"
47 echo "Stack entropy is low! Booted without 'randomize_kstack_offset=y'?"
/linux-master/drivers/media/test-drivers/visl/
H A Dvisl-trace-vp8.h17 "entropy.y_mode_probs %s\n"
18 "entropy.uv_mode_probs %s\n"
19 "entropy.mv_probs {%s}",
21 __entry->f.entropy.coeff_probs,
22 sizeof(__entry->f.entropy.coeff_probs),
24 __print_array(__entry->f.entropy.y_mode_probs,
25 ARRAY_SIZE(__entry->f.entropy.y_mode_probs),
26 sizeof(__entry->f.entropy.y_mode_probs[0])),
27 __print_array(__entry->f.entropy.uv_mode_probs,
28 ARRAY_SIZE(__entry->f.entropy
[all...]
/linux-master/arch/x86/mm/
H A Dkaslr.c111 /* Calculate entropy available between regions */
119 unsigned long entropy; local
122 * Select a random virtual address using the extra entropy
125 entropy = remain_entropy / (ARRAY_SIZE(kaslr_regions) - i);
127 entropy = (rand % (entropy + 1)) & PUD_MASK;
128 vaddr += entropy;
137 remain_entropy -= entropy;
/linux-master/lib/zstd/decompress/
H A Dzstd_ddict.c37 ZSTD_entropyDTables_t entropy; member in struct:ZSTD_DDict_s
72 dctx->LLTptr = ddict->entropy.LLTable;
73 dctx->MLTptr = ddict->entropy.MLTable;
74 dctx->OFTptr = ddict->entropy.OFTable;
75 dctx->HUFptr = ddict->entropy.hufTable;
76 dctx->entropy.rep[0] = ddict->entropy.rep[0];
77 dctx->entropy.rep[1] = ddict->entropy.rep[1];
78 dctx->entropy
[all...]
H A Dzstd_decompress_internal.h131 ZSTD_entropyDTables_t entropy; member in struct:ZSTD_DCtx_s
216 * @return : size of dictionary header (size of magic number + dict ID + entropy tables) */
217 size_t ZSTD_loadDEntropy(ZSTD_entropyDTables_t* entropy,
H A Dzstd_decompress.c1285 * @return : size of entropy tables read */
1287 ZSTD_loadDEntropy(ZSTD_entropyDTables_t* entropy, argument
1297 ZSTD_STATIC_ASSERT(offsetof(ZSTD_entropyDTables_t, OFTable) == offsetof(ZSTD_entropyDTables_t, LLTable) + sizeof(entropy->LLTable));
1298 ZSTD_STATIC_ASSERT(offsetof(ZSTD_entropyDTables_t, MLTable) == offsetof(ZSTD_entropyDTables_t, OFTable) + sizeof(entropy->OFTable));
1299 ZSTD_STATIC_ASSERT(sizeof(entropy->LLTable) + sizeof(entropy->OFTable) + sizeof(entropy->MLTable) >= HUF_DECOMPRESS_WORKSPACE_SIZE);
1300 { void* const workspace = &entropy->LLTable; /* use fse tables as temporary workspace; implies fse tables are grouped together */
1301 size_t const workspaceSize = sizeof(entropy->LLTable) + sizeof(entropy
[all...]
/linux-master/drivers/char/
H A Drandom.c19 * data is then "credited" as having a certain number of bits of entropy.
20 * When enough bits of entropy are available, the hash is finalized and
23 * entropy collectors, described below, add data to the input pool.
70 * being able to wait until the RNG has collected enough entropy and
80 CRNG_EMPTY = 0, /* Little to no entropy collected */
119 /* Used by wait_for_random_bytes(), and considered an entropy collector, below. */
176 * These functions expand entropy from the entropy extractor into
471 * Batched entropy returns random integers. The quality of the random
486 type entropy[CHACHA_BLOCK_SIZ
812 unsigned long flags, entropy = random_get_entropy(); local
843 unsigned long entropy[BLAKE2S_BLOCK_SIZE / sizeof(long)]; local
884 unsigned long entropy = random_get_entropy(); local
919 unsigned long entropy = random_get_entropy(); local
934 add_hwgenerator_randomness(const void *buf, size_t len, size_t entropy, bool sleep_after) argument
1091 unsigned long entropy = random_get_entropy(); local
1129 unsigned long entropy = random_get_entropy(), now = jiffies, flags; local
1138 fast_mix(this_cpu_ptr(&irq_randomness)->pool, entropy, num); local
1235 unsigned long entropy; member in struct:entropy_timer_state
1255 unsigned long entropy = random_get_entropy(); local
[all...]
/linux-master/crypto/
H A Dalgif_rng.c63 u8 *entropy; member in struct:rng_parent_ctx
226 kfree_sensitive(pctx->entropy);
266 * Non NULL pctx->entropy means that CAVP test has been initiated on
269 if (IS_ENABLED(CONFIG_CRYPTO_USER_API_RNG_CAVP) && pctx->entropy)
285 static int __maybe_unused rng_setentropy(void *private, sockptr_t entropy, argument
294 if (pctx->entropy)
301 kentropy = memdup_sockptr(entropy, len);
308 * Since rng doesn't perform any memory management for the entropy
311 pctx->entropy = kentropy;
H A Ddrbg.c218 * Note, this function disregards the nonce trailing the entropy data during
224 * @entropy buffer of seed data to be checked
232 const unsigned char *entropy)
249 memcpy(drbg->prev, entropy, entropylen);
254 ret = memcmp(drbg->prev, entropy, entropylen);
257 memcpy(drbg->prev, entropy, entropylen);
1061 unsigned char *entropy,
1067 get_random_bytes(entropy, entropylen);
1068 ret = drbg_fips_continuous_test(drbg, entropy);
1081 unsigned char entropy[3 local
231 drbg_fips_continuous_test(struct drbg_state *drbg, const unsigned char *entropy) argument
1060 drbg_get_random_bytes(struct drbg_state *drbg, unsigned char *entropy, unsigned int entropylen) argument
1136 unsigned char entropy[((32 + 16) * 2)]; local
[all...]
/linux-master/drivers/infiniband/ulp/opa_vnic/
H A Dopa_vnic_encap.c74 u16 pkey, u16 entropy, u8 sc, u8 rc,
81 h[3] = entropy;
446 /* opa_vnic_calc_entropy - calculate the packet entropy */
455 /* return lower 8 bits as entropy */
459 /* opa_vnic_get_def_port - get default port based on entropy */
461 u8 entropy)
465 /* Add the upper and lower 4-bits of entropy to get the flow id */
466 flow_id = ((entropy & 0xf) + (entropy >> 4));
487 u8 def_port, sc, rc, entropy, *hd local
73 opa_vnic_make_header(u8 *hdr, u32 slid, u32 dlid, u16 len, u16 pkey, u16 entropy, u8 sc, u8 rc, u8 l4_type, u16 l4_hdr) argument
460 opa_vnic_get_def_port(struct opa_vnic_adapter *adapter, u8 entropy) argument
[all...]
/linux-master/arch/s390/boot/
H A Dkaslr.c59 __u64 entropy[4]; local
75 /* add entropy */
79 (u8 *) entropy, (u8 *) entropy,
80 sizeof(entropy));
81 memcpy(prng.parm_block, entropy, sizeof(entropy));
/linux-master/lib/zstd/compress/
H A Dzstd_compress_superblock.c18 #include "zstd_compress_internal.h" /* ZSTD_[huf|fse|entropy]CTablesMetadata_t */
85 DEBUGLOG(5, "Failed to write entropy tables %s", ZSTD_getErrorName(cSize));
259 static size_t ZSTD_compressSubBlock(const ZSTD_entropyCTables_t* entropy, argument
276 { size_t cLitSize = ZSTD_compressSubBlock_literal((const HUF_CElt*)entropy->huf.CTable,
283 { size_t cSeqSize = ZSTD_compressSubBlock_sequences(&entropy->fse,
393 const ZSTD_entropyCTables_t* entropy,
399 &entropy->huf, &entropyMetadata->hufMetadata,
402 nbSeq, &entropy->fse, &entropyMetadata->fseMetadata,
481 &nextCBlock->entropy, entropyMetadata,
487 const size_t cSize = ZSTD_compressSubBlock(&nextCBlock->entropy, entropyMetadat
388 ZSTD_estimateSubBlockSize(const BYTE* literals, size_t litSize, const BYTE* ofCodeTable, const BYTE* llCodeTable, const BYTE* mlCodeTable, size_t nbSeq, const ZSTD_entropyCTables_t* entropy, const ZSTD_entropyCTablesMetadata_t* entropyMetadata, void* workspace, size_t wkspSize, int writeLitEntropy, int writeSeqEntropy) argument
[all...]
/linux-master/include/rdma/
H A Dopa_vnic.h57 u8 entropy; member in struct:opa_vnic_skb_mdata
/linux-master/drivers/infiniband/hw/hfi1/
H A Dtrace_ibhdrs.h88 u16 *entropy, u16 *len, u16 *pkey,
94 u8 rc, u8 sc, u8 sl, u16 entropy,
138 __field(u16, entropy)
166 &__entry->entropy,
236 __entry->entropy,
297 __field(u16, entropy)
326 &__entry->entropy,
400 __entry->entropy,
H A Dtrace.c88 #define DETH_ENTROPY_PRN "deth qkey:0x%.8x sqpn:0x%.6x entropy:0x%.2x"
171 u16 *entropy, u16 *len, u16 *pkey,
180 *entropy = hfi1_16B_get_entropy(hdr);
190 "rc:%d sc:%d pkey:0x%.4x entropy:0x%.4x"
194 u8 rc, u8 sc, u8 sl, u16 entropy,
203 age, becn, fecn, l4, rc, sc, pkey, entropy);
168 hfi1_trace_parse_16b_hdr(struct hfi1_16b_header *hdr, u8 *age, bool *becn, bool *fecn, u8 *l4, u8 *rc, u8 *sc, u16 *entropy, u16 *len, u16 *pkey, u32 *dlid, u32 *slid) argument
191 hfi1_trace_fmt_lrh(struct trace_seq *p, bool bypass, u8 age, bool becn, bool fecn, u8 l4, u8 lnh, const char *lnh_name, u8 lver, u8 rc, u8 sc, u8 sl, u16 entropy, u16 len, u16 pkey, u32 dlid, u32 slid) argument
/linux-master/arch/loongarch/kernel/
H A Drelocate.c94 unsigned long entropy = random_get_entropy(); local
96 /* Attempt to create a simple but unpredictable starting entropy. */
99 /* Add in any runtime entropy we can get */
100 hash = rotate_xor(hash, &entropy, sizeof(entropy));
/linux-master/drivers/char/hw_random/
H A Dcore.c50 "current hwrng entropy estimation per 1024 bits of input -- obsolete, use rng_quality instead");
53 "default maximum entropy content of hwrng per 1024 bits of input");
75 size_t entropy = bytes_read * 8 * rng->quality / 1024; local
76 add_hwgenerator_randomness(rng_fillbuf, bytes_read, entropy, false);
502 size_t entropy, entropy_credit = 0; /* in 1/1024 of a bit */ local
528 /* If we cannot credit at least one bit of entropy,
531 entropy = rc * quality * 8 + entropy_credit;
532 if ((entropy >> 10) == 0)
533 entropy_credit = entropy;
537 entropy >> 1
[all...]
/linux-master/drivers/media/platform/st/sti/hva/
H A Dhva-debugfs.c19 u32 bitrate_mode, aspect, entropy, vui_sar, sei_fp; local
59 entropy = V4L2_CID_MPEG_VIDEO_H264_ENTROPY_MODE;
63 seq_printf(s, " | |- %s entropy mode\n"
72 v4l2_ctrl_get_menu(entropy)[ctrls->entropy_mode],
/linux-master/arch/mips/kernel/
H A Drelocate.c217 unsigned long entropy = random_get_entropy(); local
220 /* Attempt to create a simple but unpredictable starting entropy. */
223 /* Add in any runtime entropy we can get */
224 hash = rotate_xor(hash, &entropy, sizeof(entropy));
227 /* Get any additional entropy passed in device tree */
/linux-master/include/linux/
H A Drandom.h19 void add_hwgenerator_randomness(const void *buf, size_t len, size_t entropy, bool sleep_after);
/linux-master/include/crypto/
H A Dif_alg.h47 int (*setentropy)(void *private, sockptr_t entropy, unsigned int len);
/linux-master/arch/s390/crypto/
H A Dprng.c119 * This function fills a given buffer with random bytes. The entropy within
121 * a 64 bytes buffer has at least 64 * 8 / 2 = 256 bits of entropy.
122 * Within the function the entropy generation is done in junks of 64 bytes.
124 * The generation of the entropy is based on the assumption that every stckf()
125 * invocation produces 0.5 bits of entropy. To accumulate 256 bits of entropy
126 * at least 512 stckf() values are needed. The entropy relevant part of the
189 __u64 entropy[4]; local
194 (char *) entropy, (char *) entropy,
[all...]

Completed in 400 milliseconds

12