Home
last modified time | relevance | path

Searched full:entropy (Results 1 – 25 of 2774) sorted by relevance

12345678910>>...111

/aosp_15_r20/external/libjpeg-turbo/
H A Djcphuff.c14 * This file contains Huffman entropy encoding routines for progressive JPEG.
77 /* Expanded entropy encoder object for progressive Huffman encoding. */
208 phuff_entropy_ptr entropy = (phuff_entropy_ptr)cinfo->entropy; in start_pass_phuff() local
213 entropy->cinfo = cinfo; in start_pass_phuff()
214 entropy->gather_statistics = gather_statistics; in start_pass_phuff()
223 entropy->pub.encode_mcu = encode_mcu_DC_first; in start_pass_phuff()
225 entropy->pub.encode_mcu = encode_mcu_AC_first; in start_pass_phuff()
227 entropy->AC_first_prepare = jsimd_encode_mcu_AC_first_prepare; in start_pass_phuff()
229 entropy->AC_first_prepare = encode_mcu_AC_first_prepare; in start_pass_phuff()
232 entropy->pub.encode_mcu = encode_mcu_DC_refine; in start_pass_phuff()
[all …]
H A Djcarith.c11 * This file contains portable arithmetic entropy encoding routines for JPEG
27 /* Expanded entropy encoder object for arithmetic encoding. */
141 arith_entropy_ptr e = (arith_entropy_ptr)cinfo->entropy; in finish_pass()
227 register arith_entropy_ptr e = (arith_entropy_ptr)cinfo->entropy; in arith_encode()
327 arith_entropy_ptr entropy = (arith_entropy_ptr)cinfo->entropy; in emit_restart() local
341 memset(entropy->dc_stats[compptr->dc_tbl_no], 0, DC_STAT_BINS); in emit_restart()
343 entropy->last_dc_val[ci] = 0; in emit_restart()
344 entropy->dc_context[ci] = 0; in emit_restart()
348 memset(entropy->ac_stats[compptr->ac_tbl_no], 0, AC_STAT_BINS); in emit_restart()
353 entropy->c = 0; in emit_restart()
[all …]
H A Djdarith.c11 * This file contains portable arithmetic entropy encoding routines for JPEG
30 /* Expanded entropy decoder object for arithmetic decoding. */
117 register arith_entropy_ptr e = (arith_entropy_ptr)cinfo->entropy; in arith_decode()
201 arith_entropy_ptr entropy = (arith_entropy_ptr)cinfo->entropy; in process_restart() local
213 memset(entropy->dc_stats[compptr->dc_tbl_no], 0, DC_STAT_BINS); in process_restart()
215 entropy->last_dc_val[ci] = 0; in process_restart()
216 entropy->dc_context[ci] = 0; in process_restart()
219 memset(entropy->ac_stats[compptr->ac_tbl_no], 0, AC_STAT_BINS); in process_restart()
224 entropy->c = 0; in process_restart()
225 entropy->a = 0; in process_restart()
[all …]
H A Djdphuff.c11 * This file contains Huffman entropy decoding routines for progressive JPEG.
33 * Expanded entropy decoder object for progressive Huffman decoding.
82 phuff_entropy_ptr entropy = (phuff_entropy_ptr)cinfo->entropy; in start_pass_phuff_decoder() local
147 entropy->pub.decode_mcu = decode_mcu_DC_first; in start_pass_phuff_decoder()
149 entropy->pub.decode_mcu = decode_mcu_AC_first; in start_pass_phuff_decoder()
152 entropy->pub.decode_mcu = decode_mcu_DC_refine; in start_pass_phuff_decoder()
154 entropy->pub.decode_mcu = decode_mcu_AC_refine; in start_pass_phuff_decoder()
165 pdtbl = (d_derived_tbl **)(entropy->derived_tbls) + tbl; in start_pass_phuff_decoder()
170 pdtbl = (d_derived_tbl **)(entropy->derived_tbls) + tbl; in start_pass_phuff_decoder()
173 entropy->ac_derived_tbl = entropy->derived_tbls[tbl]; in start_pass_phuff_decoder()
[all …]
H A Djdhuff.c12 * This file contains Huffman entropy decoding routines.
33 * Expanded entropy decoder object for Huffman decoding.
79 huff_entropy_ptr entropy = (huff_entropy_ptr)cinfo->entropy; in start_pass_huff_decoder() local
98 pdtbl = (d_derived_tbl **)(entropy->dc_derived_tbls) + dctbl; in start_pass_huff_decoder()
100 pdtbl = (d_derived_tbl **)(entropy->ac_derived_tbls) + actbl; in start_pass_huff_decoder()
103 entropy->saved.last_dc_val[ci] = 0; in start_pass_huff_decoder()
111 entropy->dc_cur_tbls[blkn] = entropy->dc_derived_tbls[compptr->dc_tbl_no]; in start_pass_huff_decoder()
112 entropy->ac_cur_tbls[blkn] = entropy->ac_derived_tbls[compptr->ac_tbl_no]; in start_pass_huff_decoder()
115 entropy->dc_needed[blkn] = TRUE; in start_pass_huff_decoder()
117 entropy->ac_needed[blkn] = (compptr->_DCT_scaled_size > 1); in start_pass_huff_decoder()
[all …]
H A Djchuff.c14 * This file contains Huffman entropy encoding routines.
68 /* Expanded entropy encoder object for Huffman encoding.
166 huff_entropy_ptr entropy = (huff_entropy_ptr)cinfo->entropy; in start_pass_huff() local
172 entropy->pub.encode_mcu = encode_mcu_gather; in start_pass_huff()
173 entropy->pub.finish_pass = finish_pass_gather; in start_pass_huff()
178 entropy->pub.encode_mcu = encode_mcu_huff; in start_pass_huff()
179 entropy->pub.finish_pass = finish_pass_huff; in start_pass_huff()
182 entropy->simd = jsimd_can_huff_encode_one_block(); in start_pass_huff()
198 if (entropy->dc_count_ptrs[dctbl] == NULL) in start_pass_huff()
199 entropy->dc_count_ptrs[dctbl] = (long *) in start_pass_huff()
[all …]
/aosp_15_r20/external/rappor/client/javatest/com/google/rappor/
H A DHmacDrbgTest.java29 byte[] entropy = in testHmacDrbgNistCase0()
38 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase0()
48 byte[] entropy = in testHmacDrbgNistCase1()
57 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase1()
67 byte[] entropy = in testHmacDrbgNistCase2()
76 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase2()
86 byte[] entropy = in testHmacDrbgNistCase3()
95 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase3()
105 byte[] entropy = in testHmacDrbgNistCase4()
114 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase4()
[all …]
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/tests/suites/
H A Dtest_suite_ctr_drbg.function2 #include "mbedtls/entropy.h"
33 int entropy_len_arg, data_t *entropy,
46 test_max_idx = entropy->len;
48 /* CTR_DRBG_Instantiate(entropy[:entropy->len], nonce, perso, <ignored>)
54 mbedtls_test_entropy_func, entropy->x,
63 /* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len],
79 /* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len],
153 void ctr_drbg_validate_no_reseed(data_t *add_init, data_t *entropy,
160 entropy->len, entropy,
169 void ctr_drbg_validate_pr(data_t *add_init, data_t *entropy,
[all …]
H A Dtest_suite_entropy.data1 Entropy init-free-free
4 Entropy init-free-init-free
10 Entropy write/update seed file: good
13 Entropy write/update seed file: nonexistent
16 Entropy write/update seed file: base NV seed file
19 Entropy no sources
22 Entropy too many sources
25 Entropy output length: 0
28 Entropy output length: 1
31 Entropy output length: 2
[all …]
/aosp_15_r20/external/mbedtls/include/mbedtls/
H A Dctr_drbg.h36 #include "entropy.h"
42 /** The entropy source failed. */
46 /** The input (entropy + additional data) is too large. */
83 * \brief The amount of entropy used per seed by default, in bytes.
87 /** This is 48 bytes because the entropy module uses SHA-512.
93 /** This is 32 bytes because the entropy module uses SHA-256.
136 /** The default length of the nonce read from the entropy source.
138 * This is \c 0 because a single read from the entropy source is sufficient
144 /** The default length of the nonce read from the entropy source.
146 * This is half of the default entropy length because a single read from
[all …]
H A Dentropy.h2 * \file entropy.h
4 * \brief Entropy accumulator implementation
23 #define MBEDTLS_ENTROPY_BLOCK_SIZE 64 /**< Block size of entropy accumulator (SHA-512) */
28 #define MBEDTLS_ENTROPY_BLOCK_SIZE 32 /**< Block size of entropy accumulator (SHA-256) */
37 /** Critical entropy source failure. */
61 #define MBEDTLS_ENTROPY_MAX_GATHER 128 /**< Maximum amount requested from entropy sources …
69 #define MBEDTLS_ENTROPY_SOURCE_STRONG 1 /**< Entropy source is strong */
70 #define MBEDTLS_ENTROPY_SOURCE_WEAK 0 /**< Entropy source is weak */
77 * \brief Entropy poll callback pointer
91 * \brief Entropy source state
[all …]
/aosp_15_r20/external/mbedtls/tests/suites/
H A Dtest_suite_ctr_drbg.function2 #include "mbedtls/entropy.h"
28 int entropy_len_arg, data_t *entropy,
43 test_max_idx = entropy->len;
45 /* CTR_DRBG_Instantiate(entropy[:entropy->len], nonce, perso, <ignored>)
51 mbedtls_test_entropy_func, entropy->x,
60 /* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len],
76 /* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len],
137 void ctr_drbg_validate_no_reseed(data_t *add_init, data_t *entropy,
143 entropy->len, entropy,
151 void ctr_drbg_validate_pr(data_t *add_init, data_t *entropy,
[all …]
H A Dtest_suite_entropy.data1 Entropy init-free-free
4 Entropy init-free-init-free
10 Entropy write/update seed file: good
13 Entropy write/update seed file: nonexistent
16 Entropy write/update seed file: base NV seed file
19 Entropy no sources
22 Entropy too many sources
25 Entropy output length: 0
28 Entropy output length: 1
31 Entropy output length: 2
[all …]
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/include/mbedtls/
H A Dctr_drbg.h43 #include "entropy.h"
49 /** The entropy source failed. */
53 /** The input (entropy + additional data) is too large. */
90 * \brief The amount of entropy used per seed by default, in bytes.
94 /** This is 48 bytes because the entropy module uses SHA-512.
100 /** This is 32 bytes because the entropy module uses SHA-256.
143 /** The default length of the nonce read from the entropy source.
145 * This is \c 0 because a single read from the entropy source is sufficient
151 /** The default length of the nonce read from the entropy source.
153 * This is half of the default entropy length because a single read from
[all …]
H A Dentropy.h2 * \file entropy.h
4 * \brief Entropy accumulator implementation
23 #define MBEDTLS_ENTROPY_BLOCK_SIZE 64 /**< Block size of entropy accumulator (SHA-512) */
28 #define MBEDTLS_ENTROPY_BLOCK_SIZE 32 /**< Block size of entropy accumulator (SHA-256) */
37 /** Critical entropy source failure. */
61 #define MBEDTLS_ENTROPY_MAX_GATHER 128 /**< Maximum amount requested from entropy sources …
69 #define MBEDTLS_ENTROPY_SOURCE_STRONG 1 /**< Entropy source is strong */
70 #define MBEDTLS_ENTROPY_SOURCE_WEAK 0 /**< Entropy source is weak */
77 * \brief Entropy poll callback pointer
91 * \brief Entropy source state
[all …]
/aosp_15_r20/external/trusty/arm-trusted-firmware/services/std_svc/trng/
Dtrng_entropy_pool.c14 * # Entropy pool
15 * Note that the TRNG Firmware interface can request up to 192 bits of entropy
18 * 192 bits of entropy, we don't have to throw out the leftover 1-63 bits of
19 * entropy.
22 static uint64_t entropy[WORDS_IN_POOL]; variable
23 /* index in bits of the first bit of usable entropy */
25 /* then number of valid bits in the entropy pool */
30 #define BITS_PER_WORD (sizeof(entropy[0]) * 8)
40 * Fill the entropy pool until we have at least as many bits as requested.
41 * Returns true after filling the pool, and false if the entropy source is out
[all …]
/aosp_15_r20/external/cronet/components/metrics/
H A Dentropy_state.h18 // A class to get entropy source values from the PrefService.
22 // the entropy source value from this helper class.
35 // Overriding the entropy source preferences with new values as given by
47 // Returns the high entropy source for this client, which is composed of a
48 // client ID and the low entropy source. This is intended to be unique for
53 // Returns the low entropy source that is used to randomize field trials on
58 // Returns the pseudo low entropy source for this client. Generates a new
63 // Returns the old low entropy source for this client. Does not generate a new
68 // Returns the limited entropy randomization source that is used to randomize
69 // field trials in a limited entropy layer. Generates a new value if there is
[all …]
/aosp_15_r20/packages/modules/Virtualization/libs/libvmbase/src/
Drand.rs15 //! Functions and drivers for obtaining true entropy.
23 type Entropy = [u8; size_of::<u64>() * 3]; typedef
27 /// No source of entropy found.
57 Self::NoEntropySource => write!(f, "No source of entropy available"), in fmt()
72 /// Configure the source of entropy.
89 // SMCCC TRNG is currently our only source of entropy. in init()
99 /// Fills a slice of bytes with true entropy.
101 const MAX_BYTES_PER_CALL: usize = size_of::<Entropy>(); in fill_with_entropy()
104 let entropy = repeat_trng_rnd(chunk.len())?; in fill_with_entropy() localVariable
105 chunk.clone_from_slice(&entropy[..chunk.len()]); in fill_with_entropy()
[all …]
/aosp_15_r20/external/arm-trusted-firmware/services/std_svc/trng/
H A Dtrng_entropy_pool.c14 * # Entropy pool
15 * Note that the TRNG Firmware interface can request up to 192 bits of entropy
18 * 192 bits of entropy, we don't have to throw out the leftover 1-63 bits of
19 * entropy.
22 static uint64_t entropy[WORDS_IN_POOL]; variable
23 /* index in bits of the first bit of usable entropy */
25 /* then number of valid bits in the entropy pool */
30 #define BITS_PER_WORD (sizeof(entropy[0]) * 8)
40 * Fill the entropy pool until we have at least as many bits as requested.
41 * Returns true after filling the pool, and false if the entropy source is out
[all …]
/aosp_15_r20/external/cronet/third_party/boringssl/src/crypto/fipsmodule/rand/
H A Drand.c36 // entropy which is accessed via |CRYPTO_sysrand[_for_seed]|. (If the operating
37 // system entropy source fails, it's up to |CRYPTO_sysrand| to abort the
46 // (We assume that the OS entropy is safe from fork()ing and VM duplication.
185 // In passive entropy mode, entropy is supplied from outside of the module via
190 // bytes contains entropy suitable for seeding a DRBG.
197 // obtained via a method other than from the kernel. In these cases entropy
205 void RAND_load_entropy(const uint8_t *entropy, size_t entropy_len, in RAND_load_entropy() argument
215 OPENSSL_memcpy(&buffer->bytes[buffer->bytes_valid], entropy, entropy_len); in RAND_load_entropy()
250 // rand_get_seed fills |seed| with entropy. In some cases, it will additionally
251 // fill |additional_input| with entropy to supplement |seed|. It sets
[all …]
/aosp_15_r20/external/boringssl/src/crypto/fipsmodule/rand/
H A Drand.c36 // entropy which is accessed via |CRYPTO_sysrand[_for_seed]|. (If the operating
37 // system entropy source fails, it's up to |CRYPTO_sysrand| to abort the
46 // (We assume that the OS entropy is safe from fork()ing and VM duplication.
185 // In passive entropy mode, entropy is supplied from outside of the module via
190 // bytes contains entropy suitable for seeding a DRBG.
197 // obtained via a method other than from the kernel. In these cases entropy
205 void RAND_load_entropy(const uint8_t *entropy, size_t entropy_len, in RAND_load_entropy() argument
215 OPENSSL_memcpy(&buffer->bytes[buffer->bytes_valid], entropy, entropy_len); in RAND_load_entropy()
250 // rand_get_seed fills |seed| with entropy. In some cases, it will additionally
251 // fill |additional_input| with entropy to supplement |seed|. It sets
[all …]
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/docs/proposed/
H A Dpsa-driver-interface.md203 …). Separately, transparent and opaque drivers can have [entropy collection entry points](#entropy-…
818 ### Entropy collection entry point
820 A driver can declare an entropy source by providing a `"get_entropy"` entry point. This entry point…
831 * `flags`: a bit-mask of [entropy collection flags](#entropy-collection-flags).
832entropy that is present in the `output` buffer, in bits. This must be at least `1` on success. The…
833entropy of at least `*estimate_bits` bits. When the entropy is coming from a hardware peripheral, …
834 …ta with a low density of entropy; for example a peripheral that returns eight bytes of data with a…
836entropy may be located anywhere in the buffer, so the driver may write less than `output_size` byt…
840 * `PSA_SUCCESS`: success. The output buffer contains some entropy.
841entropy is available without blocking. This is only permitted if the `PSA_DRIVER_GET_ENTROPY_BLOCK…
[all …]
/aosp_15_r20/external/mbedtls/docs/proposed/
H A Dpsa-driver-interface.md203 …). Separately, transparent and opaque drivers can have [entropy collection entry points](#entropy-…
818 ### Entropy collection entry point
820 A driver can declare an entropy source by providing a `"get_entropy"` entry point. This entry point…
831 * `flags`: a bit-mask of [entropy collection flags](#entropy-collection-flags).
832entropy that is present in the `output` buffer, in bits. This must be at least `1` on success. The…
833entropy of at least `*estimate_bits` bits. When the entropy is coming from a hardware peripheral, …
834 …ta with a low density of entropy; for example a peripheral that returns eight bytes of data with a…
836entropy may be located anywhere in the buffer, so the driver may write less than `output_size` byt…
840 * `PSA_SUCCESS`: success. The output buffer contains some entropy.
841entropy is available without blocking. This is only permitted if the `PSA_DRIVER_GET_ENTROPY_BLOCK…
[all …]
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/rand/
Drand.c37 // entropy which is accessed via |CRYPTO_sysrand[_for_seed]|. (If the operating
38 // system entropy source fails, it's up to |CRYPTO_sysrand| to abort the
47 // (We assume that the OS entropy is safe from fork()ing and VM duplication.
181 // In passive entropy mode, entropy is supplied from outside of the module via
186 // bytes contains entropy suitable for seeding a DRBG.
199 void RAND_load_entropy(const uint8_t *entropy, size_t entropy_len, in RAND_load_entropy() argument
209 OPENSSL_memcpy(&buffer->bytes[buffer->bytes_valid], entropy, entropy_len); in RAND_load_entropy()
243 // rand_get_seed fills |seed| with entropy and sets |*out_used_cpu| to one if
244 // that entropy came directly from the CPU and zero otherwise.
254 uint8_t entropy[CTR_DRBG_ENTROPY_LEN * BORINGSSL_FIPS_OVERREAD]; in rand_get_seed() local
[all …]
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/crypto/fipsmodule/rand/
Drand.c37 // entropy which is accessed via |CRYPTO_sysrand[_for_seed]|. (If the operating
38 // system entropy source fails, it's up to |CRYPTO_sysrand| to abort the
47 // (We assume that the OS entropy is safe from fork()ing and VM duplication.
181 // In passive entropy mode, entropy is supplied from outside of the module via
186 // bytes contains entropy suitable for seeding a DRBG.
199 void RAND_load_entropy(const uint8_t *entropy, size_t entropy_len, in RAND_load_entropy() argument
209 OPENSSL_memcpy(&buffer->bytes[buffer->bytes_valid], entropy, entropy_len); in RAND_load_entropy()
243 // rand_get_seed fills |seed| with entropy and sets |*out_used_cpu| to one if
244 // that entropy came directly from the CPU and zero otherwise.
254 uint8_t entropy[CTR_DRBG_ENTROPY_LEN * BORINGSSL_FIPS_OVERREAD]; in rand_get_seed() local
[all …]

12345678910>>...111