/kernel/linux/linux-6.6/drivers/media/platform/verisilicon/ |
H A D | hantro_vp8.c | 52 const struct v4l2_vp8_entropy *entropy = &hdr->entropy; in hantro_vp8_prob_update() local 69 dst[0] = entropy->y_mode_probs[0]; in hantro_vp8_prob_update() 70 dst[1] = entropy->y_mode_probs[1]; in hantro_vp8_prob_update() 71 dst[2] = entropy->y_mode_probs[2]; in hantro_vp8_prob_update() 72 dst[3] = entropy->y_mode_probs[3]; in hantro_vp8_prob_update() 73 dst[4] = entropy->uv_mode_probs[0]; in hantro_vp8_prob_update() 74 dst[5] = entropy->uv_mode_probs[1]; in hantro_vp8_prob_update() 75 dst[6] = entropy->uv_mode_probs[2]; in hantro_vp8_prob_update() 80 dst[0] = entropy in hantro_vp8_prob_update() [all...] |
/kernel/linux/linux-5.10/drivers/staging/media/hantro/ |
H A D | hantro_vp8.c | 52 const struct v4l2_vp8_entropy_header *entropy = &hdr->entropy_header; in hantro_vp8_prob_update() local 69 dst[0] = entropy->y_mode_probs[0]; in hantro_vp8_prob_update() 70 dst[1] = entropy->y_mode_probs[1]; in hantro_vp8_prob_update() 71 dst[2] = entropy->y_mode_probs[2]; in hantro_vp8_prob_update() 72 dst[3] = entropy->y_mode_probs[3]; in hantro_vp8_prob_update() 73 dst[4] = entropy->uv_mode_probs[0]; in hantro_vp8_prob_update() 74 dst[5] = entropy->uv_mode_probs[1]; in hantro_vp8_prob_update() 75 dst[6] = entropy->uv_mode_probs[2]; in hantro_vp8_prob_update() 80 dst[0] = entropy->mv_probs[0][0]; /* is short */ in hantro_vp8_prob_update() 81 dst[1] = entropy in hantro_vp8_prob_update() [all...] |
/kernel/linux/linux-6.6/lib/zstd/decompress/ |
H A D | zstd_ddict.c | 37 ZSTD_entropyDTables_t entropy; member 72 dctx->LLTptr = ddict->entropy.LLTable; in ZSTD_copyDDictParameters() 73 dctx->MLTptr = ddict->entropy.MLTable; in ZSTD_copyDDictParameters() 74 dctx->OFTptr = ddict->entropy.OFTable; in ZSTD_copyDDictParameters() 75 dctx->HUFptr = ddict->entropy.hufTable; in ZSTD_copyDDictParameters() 76 dctx->entropy.rep[0] = ddict->entropy.rep[0]; in ZSTD_copyDDictParameters() 77 dctx->entropy.rep[1] = ddict->entropy.rep[1]; in ZSTD_copyDDictParameters() 78 dctx->entropy in ZSTD_copyDDictParameters() [all...] |
H A D | zstd_decompress.c | 1285 * @return : size of entropy tables read */ 1287 ZSTD_loadDEntropy(ZSTD_entropyDTables_t* entropy, in ZSTD_loadDEntropy() argument 1297 ZSTD_STATIC_ASSERT(offsetof(ZSTD_entropyDTables_t, OFTable) == offsetof(ZSTD_entropyDTables_t, LLTable) + sizeof(entropy->LLTable)); in ZSTD_loadDEntropy() 1298 ZSTD_STATIC_ASSERT(offsetof(ZSTD_entropyDTables_t, MLTable) == offsetof(ZSTD_entropyDTables_t, OFTable) + sizeof(entropy->OFTable)); in ZSTD_loadDEntropy() 1299 ZSTD_STATIC_ASSERT(sizeof(entropy->LLTable) + sizeof(entropy->OFTable) + sizeof(entropy->MLTable) >= HUF_DECOMPRESS_WORKSPACE_SIZE); in ZSTD_loadDEntropy() 1300 { void* const workspace = &entropy->LLTable; /* use fse tables as temporary workspace; implies fse tables are grouped together */ in ZSTD_loadDEntropy() 1301 size_t const workspaceSize = sizeof(entropy->LLTable) + sizeof(entropy in ZSTD_loadDEntropy() [all...] |
/kernel/linux/linux-6.6/drivers/char/ |
H A D | random.c | 19 * data is then "credited" as having a certain number of bits of entropy. 20 * When enough bits of entropy are available, the hash is finalized and 23 * entropy collectors, described below, add data to the input pool. 70 * being able to wait until the RNG has collected enough entropy and 80 CRNG_EMPTY = 0, /* Little to no entropy collected */ 119 /* Used by wait_for_random_bytes(), and considered an entropy collector, below. */ 176 * These functions expand entropy from the entropy extractor into 471 * Batched entropy returns random integers. The quality of the random 486 type entropy[CHACHA_BLOCK_SIZ 812 unsigned long flags, entropy = random_get_entropy(); random_pm_notification() local 843 unsigned long entropy[BLAKE2S_BLOCK_SIZE / sizeof(long)]; random_init_early() local 884 unsigned long entropy = random_get_entropy(); random_init() local 919 unsigned long entropy = random_get_entropy(); add_device_randomness() local 934 add_hwgenerator_randomness(const void *buf, size_t len, size_t entropy, bool sleep_after) add_hwgenerator_randomness() argument 1091 unsigned long entropy = random_get_entropy(); add_interrupt_randomness() local 1129 unsigned long entropy = random_get_entropy(), now = jiffies, flags; add_timer_randomness() local 1138 fast_mix(this_cpu_ptr(&irq_randomness)->pool, entropy, num); add_timer_randomness() local 1235 unsigned long entropy; global() member 1255 unsigned long entropy = random_get_entropy(); entropy_timer() local [all...] |
/kernel/linux/linux-6.6/drivers/media/test-drivers/visl/ |
H A D | visl-trace-vp8.h | 17 "entropy.y_mode_probs %s\n" 18 "entropy.uv_mode_probs %s\n" 19 "entropy.mv_probs {%s}", 21 __entry->f.entropy.coeff_probs, 22 sizeof(__entry->f.entropy.coeff_probs), 24 __print_array(__entry->f.entropy.y_mode_probs, 25 ARRAY_SIZE(__entry->f.entropy.y_mode_probs), 26 sizeof(__entry->f.entropy.y_mode_probs[0])), 27 __print_array(__entry->f.entropy.uv_mode_probs, 28 ARRAY_SIZE(__entry->f.entropy [all...] |
/kernel/linux/linux-5.10/arch/x86/mm/ |
H A D | kaslr.c | 111 /* Calculate entropy available between regions */ in kernel_randomize_memory() 119 unsigned long entropy; in kernel_randomize_memory() local 122 * Select a random virtual address using the extra entropy in kernel_randomize_memory() 125 entropy = remain_entropy / (ARRAY_SIZE(kaslr_regions) - i); in kernel_randomize_memory() 127 entropy = (rand % (entropy + 1)) & PUD_MASK; in kernel_randomize_memory() 128 vaddr += entropy; in kernel_randomize_memory() 137 remain_entropy -= entropy; in kernel_randomize_memory()
|
/kernel/linux/linux-6.6/arch/x86/mm/ |
H A D | kaslr.c | 111 /* Calculate entropy available between regions */ in kernel_randomize_memory() 119 unsigned long entropy; in kernel_randomize_memory() local 122 * Select a random virtual address using the extra entropy in kernel_randomize_memory() 125 entropy = remain_entropy / (ARRAY_SIZE(kaslr_regions) - i); in kernel_randomize_memory() 127 entropy = (rand % (entropy + 1)) & PUD_MASK; in kernel_randomize_memory() 128 vaddr += entropy; in kernel_randomize_memory() 137 remain_entropy -= entropy; in kernel_randomize_memory()
|
/kernel/linux/linux-5.10/drivers/char/ |
H A D | random.c | 19 * data is then "credited" as having a certain number of bits of entropy. 20 * When enough bits of entropy are available, the hash is finalized and 23 * entropy collectors, described below, add data to the input pool. 68 * being able to wait until the RNG has collected enough entropy and 78 CRNG_EMPTY = 0, /* Little to no entropy collected */ 112 /* Used by wait_for_random_bytes(), and considered an entropy collector, below. */ 194 * These functions expand entropy from the entropy extractor into 494 * Batched entropy returns random integers. The quality of the random 509 type entropy[CHACHA_BLOCK_SIZ 817 unsigned long entropy; random_init() local 856 unsigned long entropy = random_get_entropy(); add_device_randomness() local 871 add_hwgenerator_randomness(const void *buf, size_t len, size_t entropy) add_hwgenerator_randomness() argument 995 unsigned long entropy = random_get_entropy(); add_interrupt_randomness() local 1033 unsigned long entropy = random_get_entropy(), now = jiffies, flags; add_timer_randomness() local 1042 fast_mix(this_cpu_ptr(&irq_randomness)->pool, entropy, num); add_timer_randomness() local 1163 unsigned long entropy; try_to_generate_entropy() member [all...] |
/kernel/linux/linux-5.10/lib/zstd/ |
H A D | decompress.c | 82 ZSTD_entropyTables_t entropy; member 114 dctx->entropy.hufTable[0] = (HUF_DTable)((HufLog)*0x1000001); /* cover both little and big endian */ in ZSTD_decompressBegin() 117 ZSTD_STATIC_ASSERT(sizeof(dctx->entropy.rep) == sizeof(repStartValue)); in ZSTD_decompressBegin() 118 memcpy(dctx->entropy.rep, repStartValue, sizeof(repStartValue)); /* initial repcodes */ in ZSTD_decompressBegin() 119 dctx->LLTptr = dctx->entropy.LLTable; in ZSTD_decompressBegin() 120 dctx->MLTptr = dctx->entropy.MLTable; in ZSTD_decompressBegin() 121 dctx->OFTptr = dctx->entropy.OFTable; in ZSTD_decompressBegin() 122 dctx->HUFptr = dctx->entropy.hufTable; in ZSTD_decompressBegin() 487 ? HUF_decompress1X2_DCtx_wksp(dctx->entropy.hufTable, dctx->litBuffer, litSize, istart + lhSize, litCSize, in ZSTD_decodeLiteralsBlock() 488 dctx->entropy in ZSTD_decodeLiteralsBlock() 1874 ZSTD_loadEntropy(ZSTD_entropyTables_t *entropy, const void *const dict, size_t const dictSize) ZSTD_loadEntropy() argument 1983 ZSTD_entropyTables_t entropy; global() member [all...] |
/kernel/linux/linux-5.10/arch/s390/boot/ |
H A D | kaslr.c | 58 __u64 entropy[4]; in get_random() local 74 /* add entropy */ in get_random() 78 (u8 *) entropy, (u8 *) entropy, in get_random() 79 sizeof(entropy)); in get_random() 80 memcpy(prng.parm_block, entropy, sizeof(entropy)); in get_random()
|
/kernel/linux/linux-6.6/arch/s390/boot/ |
H A D | kaslr.c | 59 __u64 entropy[4]; in get_random() local 75 /* add entropy */ in get_random() 79 (u8 *) entropy, (u8 *) entropy, in get_random() 80 sizeof(entropy)); in get_random() 81 memcpy(prng.parm_block, entropy, sizeof(entropy)); in get_random()
|
/kernel/linux/linux-5.10/drivers/infiniband/ulp/opa_vnic/ |
H A D | opa_vnic_encap.c | 74 u16 pkey, u16 entropy, u8 sc, u8 rc, in opa_vnic_make_header() 81 h[3] = entropy; in opa_vnic_make_header() 446 /* opa_vnic_calc_entropy - calculate the packet entropy */ 455 /* return lower 8 bits as entropy */ in opa_vnic_calc_entropy() 459 /* opa_vnic_get_def_port - get default port based on entropy */ 461 u8 entropy) in opa_vnic_get_def_port() 465 /* Add the upper and lower 4-bits of entropy to get the flow id */ in opa_vnic_get_def_port() 466 flow_id = ((entropy & 0xf) + (entropy >> 4)); in opa_vnic_get_def_port() 487 u8 def_port, sc, rc, entropy, *hd in opa_vnic_encap_skb() local 73 opa_vnic_make_header(u8 *hdr, u32 slid, u32 dlid, u16 len, u16 pkey, u16 entropy, u8 sc, u8 rc, u8 l4_type, u16 l4_hdr) opa_vnic_make_header() argument 460 opa_vnic_get_def_port(struct opa_vnic_adapter *adapter, u8 entropy) opa_vnic_get_def_port() argument [all...] |
/kernel/linux/linux-6.6/drivers/infiniband/ulp/opa_vnic/ |
H A D | opa_vnic_encap.c | 74 u16 pkey, u16 entropy, u8 sc, u8 rc, in opa_vnic_make_header() 81 h[3] = entropy; in opa_vnic_make_header() 446 /* opa_vnic_calc_entropy - calculate the packet entropy */ 455 /* return lower 8 bits as entropy */ in opa_vnic_calc_entropy() 459 /* opa_vnic_get_def_port - get default port based on entropy */ 461 u8 entropy) in opa_vnic_get_def_port() 465 /* Add the upper and lower 4-bits of entropy to get the flow id */ in opa_vnic_get_def_port() 466 flow_id = ((entropy & 0xf) + (entropy >> 4)); in opa_vnic_get_def_port() 487 u8 def_port, sc, rc, entropy, *hd in opa_vnic_encap_skb() local 73 opa_vnic_make_header(u8 *hdr, u32 slid, u32 dlid, u16 len, u16 pkey, u16 entropy, u8 sc, u8 rc, u8 l4_type, u16 l4_hdr) opa_vnic_make_header() argument 460 opa_vnic_get_def_port(struct opa_vnic_adapter *adapter, u8 entropy) opa_vnic_get_def_port() argument [all...] |
/kernel/linux/linux-6.6/lib/zstd/compress/ |
H A D | zstd_compress_superblock.c | 18 #include "zstd_compress_internal.h" /* ZSTD_[huf|fse|entropy]CTablesMetadata_t */ 85 DEBUGLOG(5, "Failed to write entropy tables %s", ZSTD_getErrorName(cSize)); in ZSTD_compressSubBlock_literal() 259 static size_t ZSTD_compressSubBlock(const ZSTD_entropyCTables_t* entropy, in ZSTD_compressSubBlock() argument 276 { size_t cLitSize = ZSTD_compressSubBlock_literal((const HUF_CElt*)entropy->huf.CTable, in ZSTD_compressSubBlock() 283 { size_t cSeqSize = ZSTD_compressSubBlock_sequences(&entropy->fse, in ZSTD_compressSubBlock() 393 const ZSTD_entropyCTables_t* entropy, in ZSTD_estimateSubBlockSize() 399 &entropy->huf, &entropyMetadata->hufMetadata, in ZSTD_estimateSubBlockSize() 402 nbSeq, &entropy->fse, &entropyMetadata->fseMetadata, in ZSTD_estimateSubBlockSize() 481 &nextCBlock->entropy, entropyMetadata, in ZSTD_compressSubBlock_multi() 487 const size_t cSize = ZSTD_compressSubBlock(&nextCBlock->entropy, entropyMetadat in ZSTD_compressSubBlock_multi() 388 ZSTD_estimateSubBlockSize(const BYTE* literals, size_t litSize, const BYTE* ofCodeTable, const BYTE* llCodeTable, const BYTE* mlCodeTable, size_t nbSeq, const ZSTD_entropyCTables_t* entropy, const ZSTD_entropyCTablesMetadata_t* entropyMetadata, void* workspace, size_t wkspSize, int writeLitEntropy, int writeSeqEntropy) ZSTD_estimateSubBlockSize() argument [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | algif_rng.c | 63 u8 *entropy; member 228 kfree_sensitive(pctx->entropy); in rng_release() 268 * Non NULL pctx->entropy means that CAVP test has been initiated on in rng_accept_parent() 271 if (IS_ENABLED(CONFIG_CRYPTO_USER_API_RNG_CAVP) && pctx->entropy) in rng_accept_parent() 287 static int __maybe_unused rng_setentropy(void *private, sockptr_t entropy, in rng_setentropy() argument 296 if (pctx->entropy) in rng_setentropy() 303 kentropy = memdup_sockptr(entropy, len); in rng_setentropy() 310 * Since rng doesn't perform any memory management for the entropy in rng_setentropy() 313 pctx->entropy = kentropy; in rng_setentropy()
|
H A D | drbg.c | 228 * Note, this function disregards the nonce trailing the entropy data during 234 * @entropy buffer of seed data to be checked 242 const unsigned char *entropy) in drbg_fips_continuous_test() 259 memcpy(drbg->prev, entropy, entropylen); in drbg_fips_continuous_test() 264 ret = memcmp(drbg->prev, entropy, entropylen); in drbg_fips_continuous_test() 267 memcpy(drbg->prev, entropy, entropylen); in drbg_fips_continuous_test() 1074 unsigned char *entropy, in drbg_get_random_bytes() 1080 get_random_bytes(entropy, entropylen); in drbg_get_random_bytes() 1081 ret = drbg_fips_continuous_test(drbg, entropy); in drbg_get_random_bytes() 1094 unsigned char entropy[3 in drbg_seed_from_random() local 241 drbg_fips_continuous_test(struct drbg_state *drbg, const unsigned char *entropy) drbg_fips_continuous_test() argument 1073 drbg_get_random_bytes(struct drbg_state *drbg, unsigned char *entropy, unsigned int entropylen) drbg_get_random_bytes() argument 1129 unsigned char entropy[((32 + 16) * 2)]; drbg_seed() local [all...] |
/kernel/linux/linux-6.6/crypto/ |
H A D | algif_rng.c | 63 u8 *entropy; member 226 kfree_sensitive(pctx->entropy); in rng_release() 266 * Non NULL pctx->entropy means that CAVP test has been initiated on in rng_accept_parent() 269 if (IS_ENABLED(CONFIG_CRYPTO_USER_API_RNG_CAVP) && pctx->entropy) in rng_accept_parent() 285 static int __maybe_unused rng_setentropy(void *private, sockptr_t entropy, in rng_setentropy() argument 294 if (pctx->entropy) in rng_setentropy() 301 kentropy = memdup_sockptr(entropy, len); in rng_setentropy() 308 * Since rng doesn't perform any memory management for the entropy in rng_setentropy() 311 pctx->entropy = kentropy; in rng_setentropy()
|
H A D | drbg.c | 230 * Note, this function disregards the nonce trailing the entropy data during 236 * @entropy buffer of seed data to be checked 244 const unsigned char *entropy) in drbg_fips_continuous_test() 261 memcpy(drbg->prev, entropy, entropylen); in drbg_fips_continuous_test() 266 ret = memcmp(drbg->prev, entropy, entropylen); in drbg_fips_continuous_test() 269 memcpy(drbg->prev, entropy, entropylen); in drbg_fips_continuous_test() 1077 unsigned char *entropy, in drbg_get_random_bytes() 1083 get_random_bytes(entropy, entropylen); in drbg_get_random_bytes() 1084 ret = drbg_fips_continuous_test(drbg, entropy); in drbg_get_random_bytes() 1097 unsigned char entropy[3 in drbg_seed_from_random() local 243 drbg_fips_continuous_test(struct drbg_state *drbg, const unsigned char *entropy) drbg_fips_continuous_test() argument 1076 drbg_get_random_bytes(struct drbg_state *drbg, unsigned char *entropy, unsigned int entropylen) drbg_get_random_bytes() argument 1152 unsigned char entropy[((32 + 16) * 2)]; drbg_seed() local [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/wireguard/qemu/ |
H A D | init.c | 64 } entropy = { in seed_rng() local 65 .entropy_count = sizeof(entropy.buffer) * 8, in seed_rng() 66 .buffer_size = sizeof(entropy.buffer), in seed_rng() 67 .buffer = "Adding real entropy is not actually important for these tests. Don't try this at home, kids!" in seed_rng() 76 if (ioctl(fd, RNDADDENTROPY, &entropy) < 0) in seed_rng()
|
/kernel/linux/linux-6.6/drivers/char/hw_random/ |
H A D | core.c | 50 "current hwrng entropy estimation per 1024 bits of input -- obsolete, use rng_quality instead"); 53 "default maximum entropy content of hwrng per 1024 bits of input"); 75 size_t entropy = bytes_read * 8 * rng->quality / 1024; in add_early_randomness() local 76 add_hwgenerator_randomness(rng_fillbuf, bytes_read, entropy, false); in add_early_randomness() 502 size_t entropy, entropy_credit = 0; /* in 1/1024 of a bit */ in hwrng_fillfn() local 528 /* If we cannot credit at least one bit of entropy, in hwrng_fillfn() 531 entropy = rc * quality * 8 + entropy_credit; in hwrng_fillfn() 532 if ((entropy >> 10) == 0) in hwrng_fillfn() 533 entropy_credit = entropy; in hwrng_fillfn() 537 entropy >> 1 in hwrng_fillfn() [all...] |
/kernel/linux/linux-6.6/arch/loongarch/kernel/ |
H A D | relocate.c | 94 unsigned long entropy = random_get_entropy(); in get_random_boot() local 96 /* Attempt to create a simple but unpredictable starting entropy. */ in get_random_boot() 99 /* Add in any runtime entropy we can get */ in get_random_boot() 100 hash = rotate_xor(hash, &entropy, sizeof(entropy)); in get_random_boot()
|
/kernel/linux/linux-5.10/drivers/infiniband/hw/hfi1/ |
H A D | trace_ibhdrs.h | 129 u16 *entropy, u16 *len, u16 *pkey, 135 u8 rc, u8 sc, u8 sl, u16 entropy, 179 __field(u16, entropy) 207 &__entry->entropy, 277 __entry->entropy, 338 __field(u16, entropy) 367 &__entry->entropy, 441 __entry->entropy,
|
/kernel/linux/linux-6.6/drivers/infiniband/hw/hfi1/ |
H A D | trace_ibhdrs.h | 88 u16 *entropy, u16 *len, u16 *pkey, 94 u8 rc, u8 sc, u8 sl, u16 entropy, 138 __field(u16, entropy) 166 &__entry->entropy, 236 __entry->entropy, 297 __field(u16, entropy) 326 &__entry->entropy, 400 __entry->entropy,
|
/kernel/linux/linux-5.10/arch/loongarch/kernel/ |
H A D | relocate.c | 126 unsigned long entropy = random_get_entropy(); in get_random_boot() local 128 /* Attempt to create a simple but unpredictable starting entropy. */ in get_random_boot() 131 /* Add in any runtime entropy we can get */ in get_random_boot() 132 hash = rotate_xor(hash, &entropy, sizeof(entropy)); in get_random_boot()
|