Home
last modified time | relevance | path

Searched refs:entropy (Results 1 – 25 of 103) sorted by relevance

12345

/OK3568_Linux_fs/external/mpp/mpp/hal/vpu/vp8e/
H A Dhal_vp8e_entropy.c66 Vp8eHalEntropy *entropy = &ctx->entropy; in vp8e_init_entropy() local
68 entropy->update_coeff_prob_flag = 0; in vp8e_init_entropy()
70 if (!entropy->default_coeff_prob_flag) { in vp8e_init_entropy()
71 memcpy(entropy->coeff_prob, default_prob_coeff_tbl, sizeof(default_prob_coeff_tbl)); in vp8e_init_entropy()
72 entropy->update_coeff_prob_flag = 1; in vp8e_init_entropy()
74 memcpy(entropy->mv_prob, default_prob_mv_tbl, sizeof(default_prob_mv_tbl)); in vp8e_init_entropy()
75 entropy->default_coeff_prob_flag = 1; in vp8e_init_entropy()
78 memcpy(entropy->old_coeff_prob, entropy->coeff_prob, sizeof(entropy->coeff_prob)); in vp8e_init_entropy()
80 memcpy(entropy->old_mv_prob, entropy->mv_prob, sizeof(entropy->mv_prob)); in vp8e_init_entropy()
82 entropy->skip_false_prob = default_skip_false_prob_tbl[ctx->rc->qp_hdr]; in vp8e_init_entropy()
[all …]
H A Dhal_vp8e_base.c222 Vp8eHalEntropy *entropy) in set_hdr_segmentation() argument
266 entropy->segment_prob[0] = MPP_CLIP3(1, 255, tmp); in set_hdr_segmentation()
269 entropy->segment_prob[1] = MPP_CLIP3(1, 255, tmp); in set_hdr_segmentation()
272 entropy->segment_prob[2] = MPP_CLIP3(1, 255, tmp); in set_hdr_segmentation()
277 vp8e_put_lit(bitbuf, entropy->segment_prob[i], 8); in set_hdr_segmentation()
340 Vp8eHalEntropy *entropy = &ctx->entropy; in set_frame_header() local
350 set_hdr_segmentation(bitbuf, &ctx->ppss, entropy); in set_frame_header()
412 vp8e_calc_coeff_prob(bitbuf, &entropy->coeff_prob, &entropy->old_coeff_prob); in set_frame_header()
414 vp8e_put_lit(bitbuf, entropy->skip_false_prob, 8); in set_frame_header()
419 vp8e_put_lit(bitbuf, entropy->intra_prob, 8); in set_frame_header()
[all …]
/OK3568_Linux_fs/kernel/drivers/staging/media/hantro/
H A Dhantro_vp8.c52 const struct v4l2_vp8_entropy_header *entropy = &hdr->entropy_header; in hantro_vp8_prob_update() local
69 dst[0] = entropy->y_mode_probs[0]; in hantro_vp8_prob_update()
70 dst[1] = entropy->y_mode_probs[1]; in hantro_vp8_prob_update()
71 dst[2] = entropy->y_mode_probs[2]; in hantro_vp8_prob_update()
72 dst[3] = entropy->y_mode_probs[3]; in hantro_vp8_prob_update()
73 dst[4] = entropy->uv_mode_probs[0]; in hantro_vp8_prob_update()
74 dst[5] = entropy->uv_mode_probs[1]; in hantro_vp8_prob_update()
75 dst[6] = entropy->uv_mode_probs[2]; in hantro_vp8_prob_update()
80 dst[0] = entropy->mv_probs[0][0]; /* is short */ in hantro_vp8_prob_update()
81 dst[1] = entropy->mv_probs[1][0]; in hantro_vp8_prob_update()
[all …]
/OK3568_Linux_fs/kernel/drivers/char/
H A Drandom.c516 type entropy[CHACHA_BLOCK_SIZE * 3 / (2 * sizeof(type))]; \
545 if (batch->position >= ARRAY_SIZE(batch->entropy) || \
547 _get_random_bytes(batch->entropy, sizeof(batch->entropy)); \
552 ret = batch->entropy[batch->position]; \
553 batch->entropy[batch->position] = 0; \
824 unsigned long entropy; in random_init() local
832 i < BLAKE2S_BLOCK_SIZE; i += sizeof(entropy)) { in random_init()
833 if (!arch_get_random_seed_long_early(&entropy) && in random_init()
834 !arch_get_random_long_early(&entropy)) { in random_init()
835 entropy = random_get_entropy(); in random_init()
[all …]
/OK3568_Linux_fs/kernel/arch/x86/mm/
H A Dkaslr.c119 unsigned long entropy; in kernel_randomize_memory() local
125 entropy = remain_entropy / (ARRAY_SIZE(kaslr_regions) - i); in kernel_randomize_memory()
127 entropy = (rand % (entropy + 1)) & PUD_MASK; in kernel_randomize_memory()
128 vaddr += entropy; in kernel_randomize_memory()
137 remain_entropy -= entropy; in kernel_randomize_memory()
/OK3568_Linux_fs/kernel/lib/zstd/
H A Ddecompress.c82 ZSTD_entropyTables_t entropy; member
114 …dctx->entropy.hufTable[0] = (HUF_DTable)((HufLog)*0x1000001); /* cover both little and big endian … in ZSTD_decompressBegin()
117 ZSTD_STATIC_ASSERT(sizeof(dctx->entropy.rep) == sizeof(repStartValue)); in ZSTD_decompressBegin()
118 memcpy(dctx->entropy.rep, repStartValue, sizeof(repStartValue)); /* initial repcodes */ in ZSTD_decompressBegin()
119 dctx->LLTptr = dctx->entropy.LLTable; in ZSTD_decompressBegin()
120 dctx->MLTptr = dctx->entropy.MLTable; in ZSTD_decompressBegin()
121 dctx->OFTptr = dctx->entropy.OFTable; in ZSTD_decompressBegin()
122 dctx->HUFptr = dctx->entropy.hufTable; in ZSTD_decompressBegin()
487 …? HUF_decompress1X2_DCtx_wksp(dctx->entropy.hufTable, dctx->litBuffer, litSize, istart + lhSize, l… in ZSTD_decodeLiteralsBlock()
488 dctx->entropy.workspace, sizeof(dctx->entropy.workspace)) in ZSTD_decodeLiteralsBlock()
[all …]
/OK3568_Linux_fs/buildroot/package/mongrel2/
H A D0004-Support-urandom-inside-chroot.patch6 This adds a new default entropy function that uses a /dev/urandom stream
64 - mbedtls_entropy_init( &srv->entropy );
67 - // test the entropy source
68 - rc = mbedtls_entropy_func(&srv->entropy, buf, MBEDTLS_ENTROPY_BLOCK_SIZE);
76 - mbedtls_entropy_func, &srv->entropy, NULL, 0);
83 - log_warn("entropy source unavailable. falling back to havege rng");
86 + log_warn("entropy source unavailable. falling back to havege rng");
93 + log_err("Unable to initialize urandom entropy source, and mbedTLS compiled without HAVEGE"…
/OK3568_Linux_fs/kernel/arch/s390/boot/
H A Dkaslr.c58 __u64 entropy[4]; in get_random() local
78 (u8 *) entropy, (u8 *) entropy, in get_random()
79 sizeof(entropy)); in get_random()
80 memcpy(prng.parm_block, entropy, sizeof(entropy)); in get_random()
/OK3568_Linux_fs/kernel/drivers/infiniband/ulp/opa_vnic/
H A Dopa_vnic_encap.c74 u16 pkey, u16 entropy, u8 sc, u8 rc, in opa_vnic_make_header() argument
81 h[3] = entropy; in opa_vnic_make_header()
461 u8 entropy) in opa_vnic_get_def_port() argument
466 flow_id = ((entropy & 0xf) + (entropy >> 4)); in opa_vnic_get_def_port()
487 u8 def_port, sc, rc, entropy, *hdr; in opa_vnic_encap_skb() local
493 entropy = opa_vnic_calc_entropy(skb); in opa_vnic_encap_skb()
494 def_port = opa_vnic_get_def_port(adapter, entropy); in opa_vnic_encap_skb()
503 mdata->entropy = entropy; in opa_vnic_encap_skb()
511 info->vesw.pkey, entropy, sc, rc, in opa_vnic_encap_skb()
/OK3568_Linux_fs/kernel/crypto/
H A Dalgif_rng.c63 u8 *entropy; member
228 kfree_sensitive(pctx->entropy); in rng_release()
271 if (IS_ENABLED(CONFIG_CRYPTO_USER_API_RNG_CAVP) && pctx->entropy) in rng_accept_parent()
287 static int __maybe_unused rng_setentropy(void *private, sockptr_t entropy, in rng_setentropy() argument
296 if (pctx->entropy) in rng_setentropy()
303 kentropy = memdup_sockptr(entropy, len); in rng_setentropy()
313 pctx->entropy = kentropy; in rng_setentropy()
H A Ddrbg.c243 const unsigned char *entropy) in drbg_fips_continuous_test() argument
260 memcpy(drbg->prev, entropy, entropylen); in drbg_fips_continuous_test()
265 ret = memcmp(drbg->prev, entropy, entropylen); in drbg_fips_continuous_test()
268 memcpy(drbg->prev, entropy, entropylen); in drbg_fips_continuous_test()
1075 unsigned char *entropy, in drbg_get_random_bytes() argument
1081 get_random_bytes(entropy, entropylen); in drbg_get_random_bytes()
1082 ret = drbg_fips_continuous_test(drbg, entropy); in drbg_get_random_bytes()
1095 unsigned char entropy[32]; in drbg_seed_from_random() local
1099 BUG_ON(entropylen > sizeof(entropy)); in drbg_seed_from_random()
1101 drbg_string_fill(&data, entropy, entropylen); in drbg_seed_from_random()
[all …]
/OK3568_Linux_fs/external/mpp/mpp/codec/dec/vp8/
H A Dvp8d_parser.c538 memcpy(pic_param->vp8_coef_update_probs, p->entropy.probCoeffs, in vp8d_convert_to_syntx()
540 memcpy(pic_param->vp8_mv_update_probs, p->entropy.probMvContext, in vp8d_convert_to_syntx()
544 pic_param->intra_chroma_prob[i] = p->entropy.probChromaPredMode[i]; in vp8d_convert_to_syntx()
558 pic_param->intra_16x16_prob[i] = p->entropy.probLuma16x16PredMode[i]; in vp8d_convert_to_syntx()
754 p->entropy.probLuma16x16PredMode[0] = 112; in vp8hwdResetProbs()
755 p->entropy.probLuma16x16PredMode[1] = 86; in vp8hwdResetProbs()
756 p->entropy.probLuma16x16PredMode[2] = 140; in vp8hwdResetProbs()
757 p->entropy.probLuma16x16PredMode[3] = 37; in vp8hwdResetProbs()
758 p->entropy.probChromaPredMode[0] = 162; in vp8hwdResetProbs()
759 p->entropy.probChromaPredMode[1] = 101; in vp8hwdResetProbs()
[all …]
/OK3568_Linux_fs/kernel/tools/testing/selftests/wireguard/qemu/
H A Dinit.c64 } entropy = { in seed_rng() local
65 .entropy_count = sizeof(entropy.buffer) * 8, in seed_rng()
66 .buffer_size = sizeof(entropy.buffer), in seed_rng()
76 if (ioctl(fd, RNDADDENTROPY, &entropy) < 0) in seed_rng()
/OK3568_Linux_fs/kernel/drivers/infiniband/hw/hfi1/
H A Dtrace_ibhdrs.h129 u16 *entropy, u16 *len, u16 *pkey,
135 u8 rc, u8 sc, u8 sl, u16 entropy,
179 __field(u16, entropy)
207 &__entry->entropy,
277 __entry->entropy,
338 __field(u16, entropy)
367 &__entry->entropy,
441 __entry->entropy,
/OK3568_Linux_fs/buildroot/package/linux-pam/
H A D0002-Remove-support-for-legacy-xcrypt.patch113 - char entropy[17];
114 - crypt_make_salt(entropy, sizeof(entropy) - 1);
116 - entropy, sizeof(entropy),
/OK3568_Linux_fs/buildroot/package/mkpasswd/
H A Dmkpasswd.c285 void *entropy = get_random_bytes(64); in main()
287 salt = crypt_gensalt(salt_prefix, rounds, entropy, 64); in main()
292 free(entropy); in main()
390 unsigned char *entropy = get_random_bytes(len * sizeof(unsigned char)); in generate_salt() local
392 buf[i] = valid_salts[entropy[i] % (sizeof valid_salts - 1)]; in generate_salt()
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/openssl/
H A Drand.h74 OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy);
92 void (*add) (const void *buf, int num, double entropy);
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/openssl/
H A Drand.h74 OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy);
92 void (*add) (const void *buf, int num, double entropy);
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/host_include/openssl/
H A Drand.h88 OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy);
106 void (*add) (const void *buf, int num, double entropy);
/OK3568_Linux_fs/external/security/rk_tee_user/v1/export-user_ta/include/openssl/
H A Drand.h88 OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy);
106 void (*add) (const void *buf, int num, double entropy);
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/openssl/
H A Drand.h74 OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy);
92 void (*add) (const void *buf, int num, double entropy);
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/openssl/
H A Drand.h74 OPENSSL_EXPORT void RAND_add(const void *buf, int num, double entropy);
92 void (*add) (const void *buf, int num, double entropy);
/OK3568_Linux_fs/kernel/lib/
H A Drandom32.c432 void prandom_seed(u32 entropy) in prandom_seed() argument
436 add_device_randomness(&entropy, sizeof(entropy)); in prandom_seed()
444 v3 ^= entropy; in prandom_seed()
447 v0 ^= entropy; in prandom_seed()
/OK3568_Linux_fs/external/security/rk_tee_user/v2/host/openssl/include/openssl/
H A Drand.h85 void (*add) (const void *buf, int num, double entropy);
104 void RAND_add(const void *buf, int num, double entropy);
/OK3568_Linux_fs/kernel/Documentation/devicetree/bindings/rng/
H A Dtimeriomem_rng.txt9 - quality : estimated number of bits of true entropy per 1024 bits read from the
13 entropy pool.

12345