| /OK3568_Linux_fs/external/mpp/mpp/hal/vpu/vp8e/ |
| H A D | hal_vp8e_entropy.c | 66 Vp8eHalEntropy *entropy = &ctx->entropy; in vp8e_init_entropy() local 68 entropy->update_coeff_prob_flag = 0; in vp8e_init_entropy() 70 if (!entropy->default_coeff_prob_flag) { in vp8e_init_entropy() 71 memcpy(entropy->coeff_prob, default_prob_coeff_tbl, sizeof(default_prob_coeff_tbl)); in vp8e_init_entropy() 72 entropy->update_coeff_prob_flag = 1; in vp8e_init_entropy() 74 memcpy(entropy->mv_prob, default_prob_mv_tbl, sizeof(default_prob_mv_tbl)); in vp8e_init_entropy() 75 entropy->default_coeff_prob_flag = 1; in vp8e_init_entropy() 78 memcpy(entropy->old_coeff_prob, entropy->coeff_prob, sizeof(entropy->coeff_prob)); in vp8e_init_entropy() 80 memcpy(entropy->old_mv_prob, entropy->mv_prob, sizeof(entropy->mv_prob)); in vp8e_init_entropy() 82 entropy->skip_false_prob = default_skip_false_prob_tbl[ctx->rc->qp_hdr]; in vp8e_init_entropy() [all …]
|
| H A D | hal_vp8e_base.c | 222 Vp8eHalEntropy *entropy) in set_hdr_segmentation() argument 266 entropy->segment_prob[0] = MPP_CLIP3(1, 255, tmp); in set_hdr_segmentation() 269 entropy->segment_prob[1] = MPP_CLIP3(1, 255, tmp); in set_hdr_segmentation() 272 entropy->segment_prob[2] = MPP_CLIP3(1, 255, tmp); in set_hdr_segmentation() 277 vp8e_put_lit(bitbuf, entropy->segment_prob[i], 8); in set_hdr_segmentation() 340 Vp8eHalEntropy *entropy = &ctx->entropy; in set_frame_header() local 350 set_hdr_segmentation(bitbuf, &ctx->ppss, entropy); in set_frame_header() 412 vp8e_calc_coeff_prob(bitbuf, &entropy->coeff_prob, &entropy->old_coeff_prob); in set_frame_header() 414 vp8e_put_lit(bitbuf, entropy->skip_false_prob, 8); in set_frame_header() 419 vp8e_put_lit(bitbuf, entropy->intra_prob, 8); in set_frame_header() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/staging/media/hantro/ |
| H A D | hantro_vp8.c | 52 const struct v4l2_vp8_entropy_header *entropy = &hdr->entropy_header; in hantro_vp8_prob_update() local 69 dst[0] = entropy->y_mode_probs[0]; in hantro_vp8_prob_update() 70 dst[1] = entropy->y_mode_probs[1]; in hantro_vp8_prob_update() 71 dst[2] = entropy->y_mode_probs[2]; in hantro_vp8_prob_update() 72 dst[3] = entropy->y_mode_probs[3]; in hantro_vp8_prob_update() 73 dst[4] = entropy->uv_mode_probs[0]; in hantro_vp8_prob_update() 74 dst[5] = entropy->uv_mode_probs[1]; in hantro_vp8_prob_update() 75 dst[6] = entropy->uv_mode_probs[2]; in hantro_vp8_prob_update() 80 dst[0] = entropy->mv_probs[0][0]; /* is short */ in hantro_vp8_prob_update() 81 dst[1] = entropy->mv_probs[1][0]; in hantro_vp8_prob_update() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/char/ |
| H A D | random.c | 516 type entropy[CHACHA_BLOCK_SIZE * 3 / (2 * sizeof(type))]; \ 545 if (batch->position >= ARRAY_SIZE(batch->entropy) || \ 547 _get_random_bytes(batch->entropy, sizeof(batch->entropy)); \ 552 ret = batch->entropy[batch->position]; \ 553 batch->entropy[batch->position] = 0; \ 824 unsigned long entropy; in random_init() local 832 i < BLAKE2S_BLOCK_SIZE; i += sizeof(entropy)) { in random_init() 833 if (!arch_get_random_seed_long_early(&entropy) && in random_init() 834 !arch_get_random_long_early(&entropy)) { in random_init() 835 entropy = random_get_entropy(); in random_init() [all …]
|
| /OK3568_Linux_fs/kernel/arch/x86/mm/ |
| H A D | kaslr.c | 119 unsigned long entropy; in kernel_randomize_memory() local 125 entropy = remain_entropy / (ARRAY_SIZE(kaslr_regions) - i); in kernel_randomize_memory() 127 entropy = (rand % (entropy + 1)) & PUD_MASK; in kernel_randomize_memory() 128 vaddr += entropy; in kernel_randomize_memory() 137 remain_entropy -= entropy; in kernel_randomize_memory()
|
| /OK3568_Linux_fs/kernel/lib/zstd/ |
| H A D | decompress.c | 82 ZSTD_entropyTables_t entropy; member 114 …dctx->entropy.hufTable[0] = (HUF_DTable)((HufLog)*0x1000001); /* cover both little and big endian … in ZSTD_decompressBegin() 117 ZSTD_STATIC_ASSERT(sizeof(dctx->entropy.rep) == sizeof(repStartValue)); in ZSTD_decompressBegin() 118 memcpy(dctx->entropy.rep, repStartValue, sizeof(repStartValue)); /* initial repcodes */ in ZSTD_decompressBegin() 119 dctx->LLTptr = dctx->entropy.LLTable; in ZSTD_decompressBegin() 120 dctx->MLTptr = dctx->entropy.MLTable; in ZSTD_decompressBegin() 121 dctx->OFTptr = dctx->entropy.OFTable; in ZSTD_decompressBegin() 122 dctx->HUFptr = dctx->entropy.hufTable; in ZSTD_decompressBegin() 487 …? HUF_decompress1X2_DCtx_wksp(dctx->entropy.hufTable, dctx->litBuffer, litSize, istart + lhSize, l… in ZSTD_decodeLiteralsBlock() 488 dctx->entropy.workspace, sizeof(dctx->entropy.workspace)) in ZSTD_decodeLiteralsBlock() [all …]
|
| /OK3568_Linux_fs/buildroot/package/mongrel2/ |
| H A D | 0004-Support-urandom-inside-chroot.patch | 6 This adds a new default entropy function that uses a /dev/urandom stream 64 - mbedtls_entropy_init( &srv->entropy ); 67 - // test the entropy source 68 - rc = mbedtls_entropy_func(&srv->entropy, buf, MBEDTLS_ENTROPY_BLOCK_SIZE); 76 - mbedtls_entropy_func, &srv->entropy, NULL, 0); 83 - log_warn("entropy source unavailable. falling back to havege rng"); 86 + log_warn("entropy source unavailable. falling back to havege rng"); 93 + log_err("Unable to initialize urandom entropy source, and mbedTLS compiled without HAVEGE"…
|
| /OK3568_Linux_fs/kernel/arch/s390/boot/ |
| H A D | kaslr.c | 58 __u64 entropy[4]; in get_random() local 78 (u8 *) entropy, (u8 *) entropy, in get_random() 79 sizeof(entropy)); in get_random() 80 memcpy(prng.parm_block, entropy, sizeof(entropy)); in get_random()
|
| /OK3568_Linux_fs/kernel/drivers/infiniband/ulp/opa_vnic/ |
| H A D | opa_vnic_encap.c | 74 u16 pkey, u16 entropy, u8 sc, u8 rc, in opa_vnic_make_header() argument 81 h[3] = entropy; in opa_vnic_make_header() 461 u8 entropy) in opa_vnic_get_def_port() argument 466 flow_id = ((entropy & 0xf) + (entropy >> 4)); in opa_vnic_get_def_port() 487 u8 def_port, sc, rc, entropy, *hdr; in opa_vnic_encap_skb() local 493 entropy = opa_vnic_calc_entropy(skb); in opa_vnic_encap_skb() 494 def_port = opa_vnic_get_def_port(adapter, entropy); in opa_vnic_encap_skb() 503 mdata->entropy = entropy; in opa_vnic_encap_skb() 511 info->vesw.pkey, entropy, sc, rc, in opa_vnic_encap_skb()
|
| /OK3568_Linux_fs/kernel/crypto/ |
| H A D | algif_rng.c | 63 u8 *entropy; member 228 kfree_sensitive(pctx->entropy); in rng_release() 271 if (IS_ENABLED(CONFIG_CRYPTO_USER_API_RNG_CAVP) && pctx->entropy) in rng_accept_parent() 287 static int __maybe_unused rng_setentropy(void *private, sockptr_t entropy, in rng_setentropy() argument 296 if (pctx->entropy) in rng_setentropy() 303 kentropy = memdup_sockptr(entropy, len); in rng_setentropy() 313 pctx->entropy = kentropy; in rng_setentropy()
|
| H A D | drbg.c | 243 const unsigned char *entropy) in drbg_fips_continuous_test() argument 260 memcpy(drbg->prev, entropy, entropylen); in drbg_fips_continuous_test() 265 ret = memcmp(drbg->prev, entropy, entropylen); in drbg_fips_continuous_test() 268 memcpy(drbg->prev, entropy, entropylen); in drbg_fips_continuous_test() 1075 unsigned char *entropy, in drbg_get_random_bytes() argument 1081 get_random_bytes(entropy, entropylen); in drbg_get_random_bytes() 1082 ret = drbg_fips_continuous_test(drbg, entropy); in drbg_get_random_bytes() 1095 unsigned char entropy[32]; in drbg_seed_from_random() local 1099 BUG_ON(entropylen > sizeof(entropy)); in drbg_seed_from_random() 1101 drbg_string_fill(&data, entropy, entropylen); in drbg_seed_from_random() [all …]
|
| /OK3568_Linux_fs/external/mpp/mpp/codec/dec/vp8/ |
| H A D | vp8d_parser.c | 538 memcpy(pic_param->vp8_coef_update_probs, p->entropy.probCoeffs, in vp8d_convert_to_syntx() 540 memcpy(pic_param->vp8_mv_update_probs, p->entropy.probMvContext, in vp8d_convert_to_syntx() 544 pic_param->intra_chroma_prob[i] = p->entropy.probChromaPredMode[i]; in vp8d_convert_to_syntx() 558 pic_param->intra_16x16_prob[i] = p->entropy.probLuma16x16PredMode[i]; in vp8d_convert_to_syntx() 754 p->entropy.probLuma16x16PredMode[0] = 112; in vp8hwdResetProbs() 755 p->entropy.probLuma16x16PredMode[1] = 86; in vp8hwdResetProbs() 756 p->entropy.probLuma16x16PredMode[2] = 140; in vp8hwdResetProbs() 757 p->entropy.probLuma16x16PredMode[3] = 37; in vp8hwdResetProbs() 758 p->entropy.probChromaPredMode[0] = 162; in vp8hwdResetProbs() 759 p->entropy.probChromaPredMode[1] = 101; in vp8hwdResetProbs() [all …]
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/wireguard/qemu/ |
| H A D | init.c | 64 } entropy = { in seed_rng() local 65 .entropy_count = sizeof(entropy.buffer) * 8, in seed_rng() 66 .buffer_size = sizeof(entropy.buffer), in seed_rng() 76 if (ioctl(fd, RNDADDENTROPY, &entropy) < 0) in seed_rng()
|
| /OK3568_Linux_fs/kernel/drivers/infiniband/hw/hfi1/ |
| H A D | trace_ibhdrs.h | 129 u16 *entropy, u16 *len, u16 *pkey, 135 u8 rc, u8 sc, u8 sl, u16 entropy, 179 __field(u16, entropy) 207 &__entry->entropy, 277 __entry->entropy, 338 __field(u16, entropy) 367 &__entry->entropy, 441 __entry->entropy,
|
| /OK3568_Linux_fs/buildroot/package/linux-pam/ |
| H A D | 0002-Remove-support-for-legacy-xcrypt.patch | 113 - char entropy[17]; 114 - crypt_make_salt(entropy, sizeof(entropy) - 1); 116 - entropy, sizeof(entropy),
|
| /OK3568_Linux_fs/buildroot/package/mkpasswd/ |
| H A D | mkpasswd.c | 285 void *entropy = get_random_bytes(64); in main() 287 salt = crypt_gensalt(salt_prefix, rounds, entropy, 64); in main() 292 free(entropy); in main() 390 unsigned char *entropy = get_random_bytes(len * sizeof(unsigned char)); in generate_salt() local 392 buf[i] = valid_salts[entropy[i] % (sizeof valid_salts - 1)]; in generate_salt()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/ |
| H A D | rand.h | 74 OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy); 92 void (*add) (const void *buf, int num, double entropy);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/ |
| H A D | rand.h | 74 OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy); 92 void (*add) (const void *buf, int num, double entropy);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/ |
| H A D | rand.h | 88 OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy); 106 void (*add) (const void *buf, int num, double entropy);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/ |
| H A D | rand.h | 88 OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy); 106 void (*add) (const void *buf, int num, double entropy);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/ |
| H A D | rand.h | 74 OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy); 92 void (*add) (const void *buf, int num, double entropy);
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/ |
| H A D | rand.h | 74 OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy); 92 void (*add) (const void *buf, int num, double entropy);
|
| /OK3568_Linux_fs/kernel/lib/ |
| H A D | random32.c | 432 void prandom_seed(u32 entropy) in prandom_seed() argument 436 add_device_randomness(&entropy, sizeof(entropy)); in prandom_seed() 444 v3 ^= entropy; in prandom_seed() 447 v0 ^= entropy; in prandom_seed()
|
| /OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/ |
| H A D | rand.h | 85 void (*add) (const void *buf, int num, double entropy); 104 void RAND_add(const void *buf, int num, double entropy);
|
| /OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/rng/ |
| H A D | timeriomem_rng.txt | 9 - quality : estimated number of bits of true entropy per 1024 bits read from the 13 entropy pool.
|