Home
last modified time | relevance | path

Searched full:entropy (Results 1 – 25 of 224) sorted by relevance

123456789

/openbmc/linux/drivers/media/platform/verisilicon/
H A Dhantro_vp8.c52 const struct v4l2_vp8_entropy *entropy = &hdr->entropy; in hantro_vp8_prob_update() local
69 dst[0] = entropy->y_mode_probs[0]; in hantro_vp8_prob_update()
70 dst[1] = entropy->y_mode_probs[1]; in hantro_vp8_prob_update()
71 dst[2] = entropy->y_mode_probs[2]; in hantro_vp8_prob_update()
72 dst[3] = entropy->y_mode_probs[3]; in hantro_vp8_prob_update()
73 dst[4] = entropy->uv_mode_probs[0]; in hantro_vp8_prob_update()
74 dst[5] = entropy->uv_mode_probs[1]; in hantro_vp8_prob_update()
75 dst[6] = entropy->uv_mode_probs[2]; in hantro_vp8_prob_update()
80 dst[0] = entropy->mv_probs[0][0]; /* is short */ in hantro_vp8_prob_update()
81 dst[1] = entropy->mv_probs[1][0]; in hantro_vp8_prob_update()
[all …]
/openbmc/linux/drivers/char/
H A Drandom.c12 * - Entropy accumulation and extraction routines.
13 * - Entropy collection routines.
19 * data is then "credited" as having a certain number of bits of entropy.
20 * When enough bits of entropy are available, the hash is finalized and
23 * entropy collectors, described below, add data to the input pool.
70 * being able to wait until the RNG has collected enough entropy and
80 CRNG_EMPTY = 0, /* Little to no entropy collected */
119 /* Used by wait_for_random_bytes(), and considered an entropy collector, below. */
176 * These functions expand entropy from the entropy extractor into
471 * Batched entropy returns random integers. The quality of the random
[all …]
/openbmc/linux/drivers/media/test-drivers/visl/
H A Dvisl-trace-vp8.h17 "entropy.y_mode_probs %s\n"
18 "entropy.uv_mode_probs %s\n"
19 "entropy.mv_probs {%s}",
21 __entry->f.entropy.coeff_probs,
22 sizeof(__entry->f.entropy.coeff_probs),
24 __print_array(__entry->f.entropy.y_mode_probs,
25 ARRAY_SIZE(__entry->f.entropy.y_mode_probs),
26 sizeof(__entry->f.entropy.y_mode_probs[0])),
27 __print_array(__entry->f.entropy.uv_mode_probs,
28 ARRAY_SIZE(__entry->f.entropy.uv_mode_probs),
[all …]
/openbmc/linux/include/uapi/linux/
H A Drandom.h17 /* Get the entropy count. */
20 /* Add to (or subtract from) the entropy count. (Superuser only.) */
23 /* Get the contents of the entropy pool. (Superuser only.) */
27 * Write bytes into the entropy pool and add to the entropy count.
32 /* Clear entropy count to 0. (Superuser only.) */
35 /* Clear the entropy pool and associated counters. (Superuser only.) */
/openbmc/qemu/scripts/
H A Du2f-setup-gen.py25 entropy: bytes, counter: int) -> None:
33 entropy: The 48 bytes of entropy.
47 # Entropy
48 with open(f'{dirpath}/entropy', 'wb') as f:
49 f.write(entropy)
141 # Entropy
142 entropy = os.urandom(48)
148 write_setup_dir(dirpath, privkey_pem, certificate_pem, entropy, counter)
/openbmc/linux/lib/zstd/decompress/
H A Dzstd_ddict.c37 ZSTD_entropyDTables_t entropy; member
72 dctx->LLTptr = ddict->entropy.LLTable; in ZSTD_copyDDictParameters()
73 dctx->MLTptr = ddict->entropy.MLTable; in ZSTD_copyDDictParameters()
74 dctx->OFTptr = ddict->entropy.OFTable; in ZSTD_copyDDictParameters()
75 dctx->HUFptr = ddict->entropy.hufTable; in ZSTD_copyDDictParameters()
76 dctx->entropy.rep[0] = ddict->entropy.rep[0]; in ZSTD_copyDDictParameters()
77 dctx->entropy.rep[1] = ddict->entropy.rep[1]; in ZSTD_copyDDictParameters()
78 dctx->entropy.rep[2] = ddict->entropy.rep[2]; in ZSTD_copyDDictParameters()
108 /* load entropy tables */ in ZSTD_loadEntropy_intoDDict()
110 &ddict->entropy, ddict->dictContent, ddict->dictSize)), in ZSTD_loadEntropy_intoDDict()
[all …]
/openbmc/linux/crypto/
H A Djitterentropy.c63 /* The entropy pool */
71 void *hash_state; /* SENSITIVE hash state entropy pool */
113 * entropy, saves MEMORY_SIZE RAM for
114 * entropy collector */
127 * The output n bits can receive more than n bits of min entropy, of course,
129 * approach the output size bits of min entropy, not attain that bound. Random
131 * output entropy (that is what SP 800-90B Section 3.1.5.1.2 attempts to bound).
135 * that a string can be considered "full entropy" if you can bound the min
136 * entropy in each bit of output to at least 1-epsilon, where epsilon is
153 * @ec [in] Reference to entropy collector
[all …]
H A Dalgif_rng.c63 u8 *entropy; member
226 kfree_sensitive(pctx->entropy); in rng_release()
266 * Non NULL pctx->entropy means that CAVP test has been initiated on in rng_accept_parent()
269 if (IS_ENABLED(CONFIG_CRYPTO_USER_API_RNG_CAVP) && pctx->entropy) in rng_accept_parent()
285 static int __maybe_unused rng_setentropy(void *private, sockptr_t entropy, in rng_setentropy() argument
294 if (pctx->entropy) in rng_setentropy()
301 kentropy = memdup_sockptr(entropy, len); in rng_setentropy()
308 * Since rng doesn't perform any memory management for the entropy in rng_setentropy()
311 pctx->entropy = kentropy; in rng_setentropy()
/openbmc/linux/drivers/net/ethernet/mellanox/mlx5/core/lib/
H A Dport_tun.c92 /* Tunnel entropy calculation may be controlled either on port basis in mlx5_set_entropy()
106 /* Other applications may change the global FW entropy in mlx5_set_entropy()
107 * calculations settings. Check that the current entropy value in mlx5_set_entropy()
113 "Unexpected entropy calc setting - expected %d", in mlx5_set_entropy()
117 /* GRE requires disabling entropy calculation. if there are in mlx5_set_entropy()
128 /* if we turn on the entropy we don't need to force it anymore */ in mlx5_set_entropy()
141 * entropy capabilities and configuration.
152 /* in case entropy calculation is enabled for all tunneling in mlx5_tun_entropy_refcount_inc()
159 /* turn off the entropy only for the first GRE rule. in mlx5_tun_entropy_refcount_inc()
160 * for the next rules the entropy was already disabled in mlx5_tun_entropy_refcount_inc()
/openbmc/linux/arch/x86/mm/
H A Dkaslr.c8 * Entropy is generated using the KASLR early boot functions now shared in
124 /* Calculate entropy available between regions */ in kernel_randomize_memory()
132 unsigned long entropy; in kernel_randomize_memory() local
135 * Select a random virtual address using the extra entropy in kernel_randomize_memory()
138 entropy = remain_entropy / (ARRAY_SIZE(kaslr_regions) - i); in kernel_randomize_memory()
140 entropy = (rand % (entropy + 1)) & PUD_MASK; in kernel_randomize_memory()
141 vaddr += entropy; in kernel_randomize_memory()
157 remain_entropy -= entropy; in kernel_randomize_memory()
/openbmc/linux/scripts/gcc-plugins/
H A Dlatent_entropy_plugin.c11 * This gcc plugin helps generate a little bit of entropy from program state,
86 .help = "disable\tturn off latent entropy instrumentation\n",
291 * entropy PRNG. When RHS is specified, the request is for perturbing the
292 * local latent entropy variable, otherwise it is for perturbing the global
293 * latent entropy variable where the two operands are already given by the
294 * local and global latent entropy variables themselves.
296 * The operation is one of add/xor/rol when instrumenting the local entropy
297 * variable and one of add/xor when perturbing the global entropy variable.
299 * entropy to the global variable than the other two operations.
457 /* 4. read the global entropy variable into local entropy */ in init_local_entropy()
[all …]
H A DKconfig33 bool "Generate some entropy during boot and runtime"
36 extract some entropy from both original and artificially created
38 there is little 'natural' source of entropy normally. The cost
42 Note that entropy extracted this way is not cryptographically
/openbmc/linux/lib/zstd/compress/
H A Dzstd_compress_superblock.c18 #include "zstd_compress_internal.h" /* ZSTD_[huf|fse|entropy]CTablesMetadata_t */
85 DEBUGLOG(5, "Failed to write entropy tables %s", ZSTD_getErrorName(cSize)); in ZSTD_compressSubBlock_literal()
259 static size_t ZSTD_compressSubBlock(const ZSTD_entropyCTables_t* entropy, in ZSTD_compressSubBlock() argument
276 { size_t cLitSize = ZSTD_compressSubBlock_literal((const HUF_CElt*)entropy->huf.CTable, in ZSTD_compressSubBlock()
283 { size_t cSeqSize = ZSTD_compressSubBlock_sequences(&entropy->fse, in ZSTD_compressSubBlock()
393 const ZSTD_entropyCTables_t* entropy, in ZSTD_estimateSubBlockSize() argument
399 … &entropy->huf, &entropyMetadata->hufMetadata, in ZSTD_estimateSubBlockSize()
402 … nbSeq, &entropy->fse, &entropyMetadata->fseMetadata, in ZSTD_estimateSubBlockSize()
420 * Entropy will be written to the first block.
481 &nextCBlock->entropy, entropyMetadata, in ZSTD_compressSubBlock_multi()
[all …]
/openbmc/linux/drivers/infiniband/ulp/opa_vnic/
H A Dopa_vnic_encap.c74 u16 pkey, u16 entropy, u8 sc, u8 rc, in opa_vnic_make_header() argument
81 h[3] = entropy; in opa_vnic_make_header()
446 /* opa_vnic_calc_entropy - calculate the packet entropy */
455 /* return lower 8 bits as entropy */ in opa_vnic_calc_entropy()
459 /* opa_vnic_get_def_port - get default port based on entropy */
461 u8 entropy) in opa_vnic_get_def_port() argument
465 /* Add the upper and lower 4-bits of entropy to get the flow id */ in opa_vnic_get_def_port()
466 flow_id = ((entropy & 0xf) + (entropy >> 4)); in opa_vnic_get_def_port()
487 u8 def_port, sc, rc, entropy, *hdr; in opa_vnic_encap_skb() local
493 entropy = opa_vnic_calc_entropy(skb); in opa_vnic_encap_skb()
[all …]
/openbmc/qemu/hw/usb/
H A Du2f-emulated.c81 char *entropy; member
259 /* Entropy */ in u2f_emulated_setup_vdev_manualy()
260 ret = u2f_emulated_read(key->entropy, (char *)&setup_info.entropy, in u2f_emulated_setup_vdev_manualy()
261 sizeof(setup_info.entropy)); in u2f_emulated_setup_vdev_manualy()
303 if (key->cert != NULL || key->privkey != NULL || key->entropy != NULL in u2f_emulated_realize()
306 && key->entropy != NULL && key->counter != NULL) { in u2f_emulated_realize()
309 error_setg(errp, "%s: cert, priv, entropy and counter " in u2f_emulated_realize()
376 DEFINE_PROP_STRING("entropy", U2FEmulatedState, entropy),
/openbmc/linux/tools/testing/selftests/lkdtm/
H A Dstack-entropy.sh4 # Measure kernel stack entropy by sampling via LKDTM's REPORT_STACK test.
23 log=$(mktemp -t stack-entropy-XXXXXX)
42 echo "Bits of stack entropy: $bits"
47 echo "Stack entropy is low! Booted without 'randomize_kstack_offset=y'?"
/openbmc/linux/arch/s390/crypto/
H A Dprng.c119 * This function fills a given buffer with random bytes. The entropy within
121 * a 64 bytes buffer has at least 64 * 8 / 2 = 256 bits of entropy.
122 * Within the function the entropy generation is done in junks of 64 bytes.
124 * The generation of the entropy is based on the assumption that every stckf()
125 * invocation produces 0.5 bits of entropy. To accumulate 256 bits of entropy
126 * at least 512 stckf() values are needed. The entropy relevant part of the
189 __u64 entropy[4]; in prng_tdes_add_entropy() local
194 (char *) entropy, (char *) entropy, in prng_tdes_add_entropy()
195 sizeof(entropy)); in prng_tdes_add_entropy()
196 memcpy(prng_data->prngws.parm_block, entropy, sizeof(entropy)); in prng_tdes_add_entropy()
[all …]
/openbmc/linux/arch/s390/boot/
H A Dkaslr.c59 __u64 entropy[4]; in get_random() local
75 /* add entropy */ in get_random()
79 (u8 *) entropy, (u8 *) entropy, in get_random()
80 sizeof(entropy)); in get_random()
81 memcpy(prng.parm_block, entropy, sizeof(entropy)); in get_random()
/openbmc/linux/include/linux/
H A Drandomize_kstack.h35 * Use, at most, 10 bits of entropy. We explicitly cap this to keep the
37 * per-arch offset masks to reduce entropy (by removing higher bits, since
38 * high entropy may overly constrain usable stack space), and for
49 * the stack. For testing the resulting entropy, please see:
50 * tools/testing/selftests/lkdtm/stack-entropy.sh
/openbmc/qemu/docs/system/devices/
H A Dusb-u2f.rst54 * 48 bytes of entropy (random bits)
79 * ``entropy``: 48 bytes of entropy
90 * ``entropy``
93 … -device u2f-emulated,cert=$DIR1/$FILE1,priv=$DIR2/$FILE2,counter=$DIR3/$FILE3,entropy=$DIR4/$FILE4
/openbmc/qemu/include/sysemu/
H A Drng.h62 * @s: the backend to request entropy from
64 * @receive_entropy: a function to be invoked when entropy is available
67 * This function is used by the front-end to request entropy from an entropy
/openbmc/linux/drivers/char/hw_random/
H A Dcore.c50 "current hwrng entropy estimation per 1024 bits of input -- obsolete, use rng_quality instead");
53 "default maximum entropy content of hwrng per 1024 bits of input");
75 size_t entropy = bytes_read * 8 * rng->quality / 1024; in add_early_randomness() local
76 add_hwgenerator_randomness(rng_fillbuf, bytes_read, entropy, false); in add_early_randomness()
501 size_t entropy, entropy_credit = 0; /* in 1/1024 of a bit */ in hwrng_fillfn() local
527 /* If we cannot credit at least one bit of entropy, in hwrng_fillfn()
530 entropy = rc * quality * 8 + entropy_credit; in hwrng_fillfn()
531 if ((entropy >> 10) == 0) in hwrng_fillfn()
532 entropy_credit = entropy; in hwrng_fillfn()
536 entropy >> 10, true); in hwrng_fillfn()
[all …]
H A Dcavium-rng.c41 /* Enable the RNG hardware and entropy source */ in cavium_rng_probe()
50 /* Disable the RNG hardware and entropy source */ in cavium_rng_probe()
71 /* Disable the RNG hardware and entropy source */ in cavium_rng_remove()
/openbmc/linux/drivers/infiniband/hw/hfi1/
H A Dtrace_ibhdrs.h88 u16 *entropy, u16 *len, u16 *pkey,
94 u8 rc, u8 sc, u8 sl, u16 entropy,
138 __field(u16, entropy)
166 &__entry->entropy,
236 __entry->entropy,
297 __field(u16, entropy)
326 &__entry->entropy,
400 __entry->entropy,
/openbmc/linux/Documentation/powerpc/
H A Dkaslr-booke32.rst20 Entropy is derived from the banner and timer base, which will change every
22 pass entropy via the /chosen/kaslr-seed node in device tree.
26 bit of the entropy to decide the index of the 64M zone. Then we chose a

123456789