/linux-master/drivers/media/platform/verisilicon/ |
H A D | hantro_vp8.c | 52 const struct v4l2_vp8_entropy *entropy = &hdr->entropy; local 69 dst[0] = entropy->y_mode_probs[0]; 70 dst[1] = entropy->y_mode_probs[1]; 71 dst[2] = entropy->y_mode_probs[2]; 72 dst[3] = entropy->y_mode_probs[3]; 73 dst[4] = entropy->uv_mode_probs[0]; 74 dst[5] = entropy->uv_mode_probs[1]; 75 dst[6] = entropy->uv_mode_probs[2]; 80 dst[0] = entropy [all...] |
/linux-master/arch/riscv/include/asm/ |
H A D | archrandom.h | 21 u16 *entropy = (u16 *)v; local 32 entropy[valid_seeds++] = csr_seed & SEED_ENTROPY_MASK; 64 * worth of entropy.
|
/linux-master/tools/testing/selftests/lkdtm/ |
H A D | Makefile | 8 TEST_PROGS := stack-entropy.sh
|
H A D | stack-entropy.sh | 4 # Measure kernel stack entropy by sampling via LKDTM's REPORT_STACK test. 23 log=$(mktemp -t stack-entropy-XXXXXX) 42 echo "Bits of stack entropy: $bits" 47 echo "Stack entropy is low! Booted without 'randomize_kstack_offset=y'?"
|
/linux-master/drivers/media/test-drivers/visl/ |
H A D | visl-trace-vp8.h | 17 "entropy.y_mode_probs %s\n" 18 "entropy.uv_mode_probs %s\n" 19 "entropy.mv_probs {%s}", 21 __entry->f.entropy.coeff_probs, 22 sizeof(__entry->f.entropy.coeff_probs), 24 __print_array(__entry->f.entropy.y_mode_probs, 25 ARRAY_SIZE(__entry->f.entropy.y_mode_probs), 26 sizeof(__entry->f.entropy.y_mode_probs[0])), 27 __print_array(__entry->f.entropy.uv_mode_probs, 28 ARRAY_SIZE(__entry->f.entropy [all...] |
/linux-master/arch/x86/mm/ |
H A D | kaslr.c | 111 /* Calculate entropy available between regions */ 119 unsigned long entropy; local 122 * Select a random virtual address using the extra entropy 125 entropy = remain_entropy / (ARRAY_SIZE(kaslr_regions) - i); 127 entropy = (rand % (entropy + 1)) & PUD_MASK; 128 vaddr += entropy; 137 remain_entropy -= entropy;
|
/linux-master/lib/zstd/decompress/ |
H A D | zstd_ddict.c | 37 ZSTD_entropyDTables_t entropy; member in struct:ZSTD_DDict_s 72 dctx->LLTptr = ddict->entropy.LLTable; 73 dctx->MLTptr = ddict->entropy.MLTable; 74 dctx->OFTptr = ddict->entropy.OFTable; 75 dctx->HUFptr = ddict->entropy.hufTable; 76 dctx->entropy.rep[0] = ddict->entropy.rep[0]; 77 dctx->entropy.rep[1] = ddict->entropy.rep[1]; 78 dctx->entropy [all...] |
H A D | zstd_decompress_internal.h | 131 ZSTD_entropyDTables_t entropy; member in struct:ZSTD_DCtx_s 216 * @return : size of dictionary header (size of magic number + dict ID + entropy tables) */ 217 size_t ZSTD_loadDEntropy(ZSTD_entropyDTables_t* entropy,
|
H A D | zstd_decompress.c | 1285 * @return : size of entropy tables read */ 1287 ZSTD_loadDEntropy(ZSTD_entropyDTables_t* entropy, argument 1297 ZSTD_STATIC_ASSERT(offsetof(ZSTD_entropyDTables_t, OFTable) == offsetof(ZSTD_entropyDTables_t, LLTable) + sizeof(entropy->LLTable)); 1298 ZSTD_STATIC_ASSERT(offsetof(ZSTD_entropyDTables_t, MLTable) == offsetof(ZSTD_entropyDTables_t, OFTable) + sizeof(entropy->OFTable)); 1299 ZSTD_STATIC_ASSERT(sizeof(entropy->LLTable) + sizeof(entropy->OFTable) + sizeof(entropy->MLTable) >= HUF_DECOMPRESS_WORKSPACE_SIZE); 1300 { void* const workspace = &entropy->LLTable; /* use fse tables as temporary workspace; implies fse tables are grouped together */ 1301 size_t const workspaceSize = sizeof(entropy->LLTable) + sizeof(entropy [all...] |
/linux-master/drivers/char/ |
H A D | random.c | 19 * data is then "credited" as having a certain number of bits of entropy. 20 * When enough bits of entropy are available, the hash is finalized and 23 * entropy collectors, described below, add data to the input pool. 70 * being able to wait until the RNG has collected enough entropy and 80 CRNG_EMPTY = 0, /* Little to no entropy collected */ 119 /* Used by wait_for_random_bytes(), and considered an entropy collector, below. */ 176 * These functions expand entropy from the entropy extractor into 471 * Batched entropy returns random integers. The quality of the random 486 type entropy[CHACHA_BLOCK_SIZ 812 unsigned long flags, entropy = random_get_entropy(); local 843 unsigned long entropy[BLAKE2S_BLOCK_SIZE / sizeof(long)]; local 884 unsigned long entropy = random_get_entropy(); local 919 unsigned long entropy = random_get_entropy(); local 934 add_hwgenerator_randomness(const void *buf, size_t len, size_t entropy, bool sleep_after) argument 1091 unsigned long entropy = random_get_entropy(); local 1129 unsigned long entropy = random_get_entropy(), now = jiffies, flags; local 1138 fast_mix(this_cpu_ptr(&irq_randomness)->pool, entropy, num); local 1235 unsigned long entropy; member in struct:entropy_timer_state 1255 unsigned long entropy = random_get_entropy(); local [all...] |
/linux-master/crypto/ |
H A D | algif_rng.c | 63 u8 *entropy; member in struct:rng_parent_ctx 226 kfree_sensitive(pctx->entropy); 266 * Non NULL pctx->entropy means that CAVP test has been initiated on 269 if (IS_ENABLED(CONFIG_CRYPTO_USER_API_RNG_CAVP) && pctx->entropy) 285 static int __maybe_unused rng_setentropy(void *private, sockptr_t entropy, argument 294 if (pctx->entropy) 301 kentropy = memdup_sockptr(entropy, len); 308 * Since rng doesn't perform any memory management for the entropy 311 pctx->entropy = kentropy;
|
H A D | drbg.c | 218 * Note, this function disregards the nonce trailing the entropy data during 224 * @entropy buffer of seed data to be checked 232 const unsigned char *entropy) 249 memcpy(drbg->prev, entropy, entropylen); 254 ret = memcmp(drbg->prev, entropy, entropylen); 257 memcpy(drbg->prev, entropy, entropylen); 1061 unsigned char *entropy, 1067 get_random_bytes(entropy, entropylen); 1068 ret = drbg_fips_continuous_test(drbg, entropy); 1081 unsigned char entropy[3 local 231 drbg_fips_continuous_test(struct drbg_state *drbg, const unsigned char *entropy) argument 1060 drbg_get_random_bytes(struct drbg_state *drbg, unsigned char *entropy, unsigned int entropylen) argument 1136 unsigned char entropy[((32 + 16) * 2)]; local [all...] |
/linux-master/drivers/infiniband/ulp/opa_vnic/ |
H A D | opa_vnic_encap.c | 74 u16 pkey, u16 entropy, u8 sc, u8 rc, 81 h[3] = entropy; 446 /* opa_vnic_calc_entropy - calculate the packet entropy */ 455 /* return lower 8 bits as entropy */ 459 /* opa_vnic_get_def_port - get default port based on entropy */ 461 u8 entropy) 465 /* Add the upper and lower 4-bits of entropy to get the flow id */ 466 flow_id = ((entropy & 0xf) + (entropy >> 4)); 487 u8 def_port, sc, rc, entropy, *hd local 73 opa_vnic_make_header(u8 *hdr, u32 slid, u32 dlid, u16 len, u16 pkey, u16 entropy, u8 sc, u8 rc, u8 l4_type, u16 l4_hdr) argument 460 opa_vnic_get_def_port(struct opa_vnic_adapter *adapter, u8 entropy) argument [all...] |
/linux-master/arch/s390/boot/ |
H A D | kaslr.c | 59 __u64 entropy[4]; local 75 /* add entropy */ 79 (u8 *) entropy, (u8 *) entropy, 80 sizeof(entropy)); 81 memcpy(prng.parm_block, entropy, sizeof(entropy));
|
/linux-master/lib/zstd/compress/ |
H A D | zstd_compress_superblock.c | 18 #include "zstd_compress_internal.h" /* ZSTD_[huf|fse|entropy]CTablesMetadata_t */ 85 DEBUGLOG(5, "Failed to write entropy tables %s", ZSTD_getErrorName(cSize)); 259 static size_t ZSTD_compressSubBlock(const ZSTD_entropyCTables_t* entropy, argument 276 { size_t cLitSize = ZSTD_compressSubBlock_literal((const HUF_CElt*)entropy->huf.CTable, 283 { size_t cSeqSize = ZSTD_compressSubBlock_sequences(&entropy->fse, 393 const ZSTD_entropyCTables_t* entropy, 399 &entropy->huf, &entropyMetadata->hufMetadata, 402 nbSeq, &entropy->fse, &entropyMetadata->fseMetadata, 481 &nextCBlock->entropy, entropyMetadata, 487 const size_t cSize = ZSTD_compressSubBlock(&nextCBlock->entropy, entropyMetadat 388 ZSTD_estimateSubBlockSize(const BYTE* literals, size_t litSize, const BYTE* ofCodeTable, const BYTE* llCodeTable, const BYTE* mlCodeTable, size_t nbSeq, const ZSTD_entropyCTables_t* entropy, const ZSTD_entropyCTablesMetadata_t* entropyMetadata, void* workspace, size_t wkspSize, int writeLitEntropy, int writeSeqEntropy) argument [all...] |
/linux-master/include/rdma/ |
H A D | opa_vnic.h | 57 u8 entropy; member in struct:opa_vnic_skb_mdata
|
/linux-master/drivers/infiniband/hw/hfi1/ |
H A D | trace_ibhdrs.h | 88 u16 *entropy, u16 *len, u16 *pkey, 94 u8 rc, u8 sc, u8 sl, u16 entropy, 138 __field(u16, entropy) 166 &__entry->entropy, 236 __entry->entropy, 297 __field(u16, entropy) 326 &__entry->entropy, 400 __entry->entropy,
|
H A D | trace.c | 88 #define DETH_ENTROPY_PRN "deth qkey:0x%.8x sqpn:0x%.6x entropy:0x%.2x" 171 u16 *entropy, u16 *len, u16 *pkey, 180 *entropy = hfi1_16B_get_entropy(hdr); 190 "rc:%d sc:%d pkey:0x%.4x entropy:0x%.4x" 194 u8 rc, u8 sc, u8 sl, u16 entropy, 203 age, becn, fecn, l4, rc, sc, pkey, entropy); 168 hfi1_trace_parse_16b_hdr(struct hfi1_16b_header *hdr, u8 *age, bool *becn, bool *fecn, u8 *l4, u8 *rc, u8 *sc, u16 *entropy, u16 *len, u16 *pkey, u32 *dlid, u32 *slid) argument 191 hfi1_trace_fmt_lrh(struct trace_seq *p, bool bypass, u8 age, bool becn, bool fecn, u8 l4, u8 lnh, const char *lnh_name, u8 lver, u8 rc, u8 sc, u8 sl, u16 entropy, u16 len, u16 pkey, u32 dlid, u32 slid) argument
|
/linux-master/arch/loongarch/kernel/ |
H A D | relocate.c | 94 unsigned long entropy = random_get_entropy(); local 96 /* Attempt to create a simple but unpredictable starting entropy. */ 99 /* Add in any runtime entropy we can get */ 100 hash = rotate_xor(hash, &entropy, sizeof(entropy));
|
/linux-master/drivers/char/hw_random/ |
H A D | core.c | 50 "current hwrng entropy estimation per 1024 bits of input -- obsolete, use rng_quality instead"); 53 "default maximum entropy content of hwrng per 1024 bits of input"); 75 size_t entropy = bytes_read * 8 * rng->quality / 1024; local 76 add_hwgenerator_randomness(rng_fillbuf, bytes_read, entropy, false); 502 size_t entropy, entropy_credit = 0; /* in 1/1024 of a bit */ local 528 /* If we cannot credit at least one bit of entropy, 531 entropy = rc * quality * 8 + entropy_credit; 532 if ((entropy >> 10) == 0) 533 entropy_credit = entropy; 537 entropy >> 1 [all...] |
/linux-master/drivers/media/platform/st/sti/hva/ |
H A D | hva-debugfs.c | 19 u32 bitrate_mode, aspect, entropy, vui_sar, sei_fp; local 59 entropy = V4L2_CID_MPEG_VIDEO_H264_ENTROPY_MODE; 63 seq_printf(s, " | |- %s entropy mode\n" 72 v4l2_ctrl_get_menu(entropy)[ctrls->entropy_mode],
|
/linux-master/arch/mips/kernel/ |
H A D | relocate.c | 217 unsigned long entropy = random_get_entropy(); local 220 /* Attempt to create a simple but unpredictable starting entropy. */ 223 /* Add in any runtime entropy we can get */ 224 hash = rotate_xor(hash, &entropy, sizeof(entropy)); 227 /* Get any additional entropy passed in device tree */
|
/linux-master/include/linux/ |
H A D | random.h | 19 void add_hwgenerator_randomness(const void *buf, size_t len, size_t entropy, bool sleep_after);
|
/linux-master/include/crypto/ |
H A D | if_alg.h | 47 int (*setentropy)(void *private, sockptr_t entropy, unsigned int len);
|
/linux-master/arch/s390/crypto/ |
H A D | prng.c | 119 * This function fills a given buffer with random bytes. The entropy within 121 * a 64 bytes buffer has at least 64 * 8 / 2 = 256 bits of entropy. 122 * Within the function the entropy generation is done in junks of 64 bytes. 124 * The generation of the entropy is based on the assumption that every stckf() 125 * invocation produces 0.5 bits of entropy. To accumulate 256 bits of entropy 126 * at least 512 stckf() values are needed. The entropy relevant part of the 189 __u64 entropy[4]; local 194 (char *) entropy, (char *) entropy, [all...] |