/aosp_15_r20/external/libjpeg-turbo/ |
H A D | jcphuff.c | 14 * This file contains Huffman entropy encoding routines for progressive JPEG. 77 /* Expanded entropy encoder object for progressive Huffman encoding. */ 208 phuff_entropy_ptr entropy = (phuff_entropy_ptr)cinfo->entropy; in start_pass_phuff() local 213 entropy->cinfo = cinfo; in start_pass_phuff() 214 entropy->gather_statistics = gather_statistics; in start_pass_phuff() 223 entropy->pub.encode_mcu = encode_mcu_DC_first; in start_pass_phuff() 225 entropy->pub.encode_mcu = encode_mcu_AC_first; in start_pass_phuff() 227 entropy->AC_first_prepare = jsimd_encode_mcu_AC_first_prepare; in start_pass_phuff() 229 entropy->AC_first_prepare = encode_mcu_AC_first_prepare; in start_pass_phuff() 232 entropy->pub.encode_mcu = encode_mcu_DC_refine; in start_pass_phuff() [all …]
|
H A D | jcarith.c | 11 * This file contains portable arithmetic entropy encoding routines for JPEG 27 /* Expanded entropy encoder object for arithmetic encoding. */ 141 arith_entropy_ptr e = (arith_entropy_ptr)cinfo->entropy; in finish_pass() 227 register arith_entropy_ptr e = (arith_entropy_ptr)cinfo->entropy; in arith_encode() 327 arith_entropy_ptr entropy = (arith_entropy_ptr)cinfo->entropy; in emit_restart() local 341 memset(entropy->dc_stats[compptr->dc_tbl_no], 0, DC_STAT_BINS); in emit_restart() 343 entropy->last_dc_val[ci] = 0; in emit_restart() 344 entropy->dc_context[ci] = 0; in emit_restart() 348 memset(entropy->ac_stats[compptr->ac_tbl_no], 0, AC_STAT_BINS); in emit_restart() 353 entropy->c = 0; in emit_restart() [all …]
|
H A D | jdarith.c | 11 * This file contains portable arithmetic entropy encoding routines for JPEG 30 /* Expanded entropy decoder object for arithmetic decoding. */ 117 register arith_entropy_ptr e = (arith_entropy_ptr)cinfo->entropy; in arith_decode() 201 arith_entropy_ptr entropy = (arith_entropy_ptr)cinfo->entropy; in process_restart() local 213 memset(entropy->dc_stats[compptr->dc_tbl_no], 0, DC_STAT_BINS); in process_restart() 215 entropy->last_dc_val[ci] = 0; in process_restart() 216 entropy->dc_context[ci] = 0; in process_restart() 219 memset(entropy->ac_stats[compptr->ac_tbl_no], 0, AC_STAT_BINS); in process_restart() 224 entropy->c = 0; in process_restart() 225 entropy->a = 0; in process_restart() [all …]
|
H A D | jdphuff.c | 11 * This file contains Huffman entropy decoding routines for progressive JPEG. 33 * Expanded entropy decoder object for progressive Huffman decoding. 82 phuff_entropy_ptr entropy = (phuff_entropy_ptr)cinfo->entropy; in start_pass_phuff_decoder() local 147 entropy->pub.decode_mcu = decode_mcu_DC_first; in start_pass_phuff_decoder() 149 entropy->pub.decode_mcu = decode_mcu_AC_first; in start_pass_phuff_decoder() 152 entropy->pub.decode_mcu = decode_mcu_DC_refine; in start_pass_phuff_decoder() 154 entropy->pub.decode_mcu = decode_mcu_AC_refine; in start_pass_phuff_decoder() 165 pdtbl = (d_derived_tbl **)(entropy->derived_tbls) + tbl; in start_pass_phuff_decoder() 170 pdtbl = (d_derived_tbl **)(entropy->derived_tbls) + tbl; in start_pass_phuff_decoder() 173 entropy->ac_derived_tbl = entropy->derived_tbls[tbl]; in start_pass_phuff_decoder() [all …]
|
H A D | jdhuff.c | 12 * This file contains Huffman entropy decoding routines. 33 * Expanded entropy decoder object for Huffman decoding. 79 huff_entropy_ptr entropy = (huff_entropy_ptr)cinfo->entropy; in start_pass_huff_decoder() local 98 pdtbl = (d_derived_tbl **)(entropy->dc_derived_tbls) + dctbl; in start_pass_huff_decoder() 100 pdtbl = (d_derived_tbl **)(entropy->ac_derived_tbls) + actbl; in start_pass_huff_decoder() 103 entropy->saved.last_dc_val[ci] = 0; in start_pass_huff_decoder() 111 entropy->dc_cur_tbls[blkn] = entropy->dc_derived_tbls[compptr->dc_tbl_no]; in start_pass_huff_decoder() 112 entropy->ac_cur_tbls[blkn] = entropy->ac_derived_tbls[compptr->ac_tbl_no]; in start_pass_huff_decoder() 115 entropy->dc_needed[blkn] = TRUE; in start_pass_huff_decoder() 117 entropy->ac_needed[blkn] = (compptr->_DCT_scaled_size > 1); in start_pass_huff_decoder() [all …]
|
H A D | jchuff.c | 14 * This file contains Huffman entropy encoding routines. 68 /* Expanded entropy encoder object for Huffman encoding. 166 huff_entropy_ptr entropy = (huff_entropy_ptr)cinfo->entropy; in start_pass_huff() local 172 entropy->pub.encode_mcu = encode_mcu_gather; in start_pass_huff() 173 entropy->pub.finish_pass = finish_pass_gather; in start_pass_huff() 178 entropy->pub.encode_mcu = encode_mcu_huff; in start_pass_huff() 179 entropy->pub.finish_pass = finish_pass_huff; in start_pass_huff() 182 entropy->simd = jsimd_can_huff_encode_one_block(); in start_pass_huff() 198 if (entropy->dc_count_ptrs[dctbl] == NULL) in start_pass_huff() 199 entropy->dc_count_ptrs[dctbl] = (long *) in start_pass_huff() [all …]
|
/aosp_15_r20/external/rappor/client/javatest/com/google/rappor/ |
H A D | HmacDrbgTest.java | 29 byte[] entropy = in testHmacDrbgNistCase0() 38 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase0() 48 byte[] entropy = in testHmacDrbgNistCase1() 57 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase1() 67 byte[] entropy = in testHmacDrbgNistCase2() 76 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase2() 86 byte[] entropy = in testHmacDrbgNistCase3() 95 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase3() 105 byte[] entropy = in testHmacDrbgNistCase4() 114 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase4() [all …]
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/tests/suites/ |
H A D | test_suite_ctr_drbg.function | 2 #include "mbedtls/entropy.h" 33 int entropy_len_arg, data_t *entropy, 46 test_max_idx = entropy->len; 48 /* CTR_DRBG_Instantiate(entropy[:entropy->len], nonce, perso, <ignored>) 54 mbedtls_test_entropy_func, entropy->x, 63 /* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len], 79 /* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len], 153 void ctr_drbg_validate_no_reseed(data_t *add_init, data_t *entropy, 160 entropy->len, entropy, 169 void ctr_drbg_validate_pr(data_t *add_init, data_t *entropy, [all …]
|
H A D | test_suite_entropy.data | 1 Entropy init-free-free 4 Entropy init-free-init-free 10 Entropy write/update seed file: good 13 Entropy write/update seed file: nonexistent 16 Entropy write/update seed file: base NV seed file 19 Entropy no sources 22 Entropy too many sources 25 Entropy output length: 0 28 Entropy output length: 1 31 Entropy output length: 2 [all …]
|
/aosp_15_r20/external/mbedtls/include/mbedtls/ |
H A D | ctr_drbg.h | 36 #include "entropy.h" 42 /** The entropy source failed. */ 46 /** The input (entropy + additional data) is too large. */ 83 * \brief The amount of entropy used per seed by default, in bytes. 87 /** This is 48 bytes because the entropy module uses SHA-512. 93 /** This is 32 bytes because the entropy module uses SHA-256. 136 /** The default length of the nonce read from the entropy source. 138 * This is \c 0 because a single read from the entropy source is sufficient 144 /** The default length of the nonce read from the entropy source. 146 * This is half of the default entropy length because a single read from [all …]
|
H A D | entropy.h | 2 * \file entropy.h 4 * \brief Entropy accumulator implementation 23 #define MBEDTLS_ENTROPY_BLOCK_SIZE 64 /**< Block size of entropy accumulator (SHA-512) */ 28 #define MBEDTLS_ENTROPY_BLOCK_SIZE 32 /**< Block size of entropy accumulator (SHA-256) */ 37 /** Critical entropy source failure. */ 61 #define MBEDTLS_ENTROPY_MAX_GATHER 128 /**< Maximum amount requested from entropy sources … 69 #define MBEDTLS_ENTROPY_SOURCE_STRONG 1 /**< Entropy source is strong */ 70 #define MBEDTLS_ENTROPY_SOURCE_WEAK 0 /**< Entropy source is weak */ 77 * \brief Entropy poll callback pointer 91 * \brief Entropy source state [all …]
|
/aosp_15_r20/external/mbedtls/tests/suites/ |
H A D | test_suite_ctr_drbg.function | 2 #include "mbedtls/entropy.h" 28 int entropy_len_arg, data_t *entropy, 43 test_max_idx = entropy->len; 45 /* CTR_DRBG_Instantiate(entropy[:entropy->len], nonce, perso, <ignored>) 51 mbedtls_test_entropy_func, entropy->x, 60 /* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len], 76 /* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len], 137 void ctr_drbg_validate_no_reseed(data_t *add_init, data_t *entropy, 143 entropy->len, entropy, 151 void ctr_drbg_validate_pr(data_t *add_init, data_t *entropy, [all …]
|
H A D | test_suite_entropy.data | 1 Entropy init-free-free 4 Entropy init-free-init-free 10 Entropy write/update seed file: good 13 Entropy write/update seed file: nonexistent 16 Entropy write/update seed file: base NV seed file 19 Entropy no sources 22 Entropy too many sources 25 Entropy output length: 0 28 Entropy output length: 1 31 Entropy output length: 2 [all …]
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/include/mbedtls/ |
H A D | ctr_drbg.h | 43 #include "entropy.h" 49 /** The entropy source failed. */ 53 /** The input (entropy + additional data) is too large. */ 90 * \brief The amount of entropy used per seed by default, in bytes. 94 /** This is 48 bytes because the entropy module uses SHA-512. 100 /** This is 32 bytes because the entropy module uses SHA-256. 143 /** The default length of the nonce read from the entropy source. 145 * This is \c 0 because a single read from the entropy source is sufficient 151 /** The default length of the nonce read from the entropy source. 153 * This is half of the default entropy length because a single read from [all …]
|
H A D | entropy.h | 2 * \file entropy.h 4 * \brief Entropy accumulator implementation 23 #define MBEDTLS_ENTROPY_BLOCK_SIZE 64 /**< Block size of entropy accumulator (SHA-512) */ 28 #define MBEDTLS_ENTROPY_BLOCK_SIZE 32 /**< Block size of entropy accumulator (SHA-256) */ 37 /** Critical entropy source failure. */ 61 #define MBEDTLS_ENTROPY_MAX_GATHER 128 /**< Maximum amount requested from entropy sources … 69 #define MBEDTLS_ENTROPY_SOURCE_STRONG 1 /**< Entropy source is strong */ 70 #define MBEDTLS_ENTROPY_SOURCE_WEAK 0 /**< Entropy source is weak */ 77 * \brief Entropy poll callback pointer 91 * \brief Entropy source state [all …]
|
/aosp_15_r20/external/trusty/arm-trusted-firmware/services/std_svc/trng/ |
D | trng_entropy_pool.c | 14 * # Entropy pool 15 * Note that the TRNG Firmware interface can request up to 192 bits of entropy 18 * 192 bits of entropy, we don't have to throw out the leftover 1-63 bits of 19 * entropy. 22 static uint64_t entropy[WORDS_IN_POOL]; variable 23 /* index in bits of the first bit of usable entropy */ 25 /* then number of valid bits in the entropy pool */ 30 #define BITS_PER_WORD (sizeof(entropy[0]) * 8) 40 * Fill the entropy pool until we have at least as many bits as requested. 41 * Returns true after filling the pool, and false if the entropy source is out [all …]
|
/aosp_15_r20/external/cronet/components/metrics/ |
H A D | entropy_state.h | 18 // A class to get entropy source values from the PrefService. 22 // the entropy source value from this helper class. 35 // Overriding the entropy source preferences with new values as given by 47 // Returns the high entropy source for this client, which is composed of a 48 // client ID and the low entropy source. This is intended to be unique for 53 // Returns the low entropy source that is used to randomize field trials on 58 // Returns the pseudo low entropy source for this client. Generates a new 63 // Returns the old low entropy source for this client. Does not generate a new 68 // Returns the limited entropy randomization source that is used to randomize 69 // field trials in a limited entropy layer. Generates a new value if there is [all …]
|
/aosp_15_r20/packages/modules/Virtualization/libs/libvmbase/src/ |
D | rand.rs | 15 //! Functions and drivers for obtaining true entropy. 23 type Entropy = [u8; size_of::<u64>() * 3]; typedef 27 /// No source of entropy found. 57 Self::NoEntropySource => write!(f, "No source of entropy available"), in fmt() 72 /// Configure the source of entropy. 89 // SMCCC TRNG is currently our only source of entropy. in init() 99 /// Fills a slice of bytes with true entropy. 101 const MAX_BYTES_PER_CALL: usize = size_of::<Entropy>(); in fill_with_entropy() 104 let entropy = repeat_trng_rnd(chunk.len())?; in fill_with_entropy() localVariable 105 chunk.clone_from_slice(&entropy[..chunk.len()]); in fill_with_entropy() [all …]
|
/aosp_15_r20/external/arm-trusted-firmware/services/std_svc/trng/ |
H A D | trng_entropy_pool.c | 14 * # Entropy pool 15 * Note that the TRNG Firmware interface can request up to 192 bits of entropy 18 * 192 bits of entropy, we don't have to throw out the leftover 1-63 bits of 19 * entropy. 22 static uint64_t entropy[WORDS_IN_POOL]; variable 23 /* index in bits of the first bit of usable entropy */ 25 /* then number of valid bits in the entropy pool */ 30 #define BITS_PER_WORD (sizeof(entropy[0]) * 8) 40 * Fill the entropy pool until we have at least as many bits as requested. 41 * Returns true after filling the pool, and false if the entropy source is out [all …]
|
/aosp_15_r20/external/cronet/third_party/boringssl/src/crypto/fipsmodule/rand/ |
H A D | rand.c | 36 // entropy which is accessed via |CRYPTO_sysrand[_for_seed]|. (If the operating 37 // system entropy source fails, it's up to |CRYPTO_sysrand| to abort the 46 // (We assume that the OS entropy is safe from fork()ing and VM duplication. 185 // In passive entropy mode, entropy is supplied from outside of the module via 190 // bytes contains entropy suitable for seeding a DRBG. 197 // obtained via a method other than from the kernel. In these cases entropy 205 void RAND_load_entropy(const uint8_t *entropy, size_t entropy_len, in RAND_load_entropy() argument 215 OPENSSL_memcpy(&buffer->bytes[buffer->bytes_valid], entropy, entropy_len); in RAND_load_entropy() 250 // rand_get_seed fills |seed| with entropy. In some cases, it will additionally 251 // fill |additional_input| with entropy to supplement |seed|. It sets [all …]
|
/aosp_15_r20/external/boringssl/src/crypto/fipsmodule/rand/ |
H A D | rand.c | 36 // entropy which is accessed via |CRYPTO_sysrand[_for_seed]|. (If the operating 37 // system entropy source fails, it's up to |CRYPTO_sysrand| to abort the 46 // (We assume that the OS entropy is safe from fork()ing and VM duplication. 185 // In passive entropy mode, entropy is supplied from outside of the module via 190 // bytes contains entropy suitable for seeding a DRBG. 197 // obtained via a method other than from the kernel. In these cases entropy 205 void RAND_load_entropy(const uint8_t *entropy, size_t entropy_len, in RAND_load_entropy() argument 215 OPENSSL_memcpy(&buffer->bytes[buffer->bytes_valid], entropy, entropy_len); in RAND_load_entropy() 250 // rand_get_seed fills |seed| with entropy. In some cases, it will additionally 251 // fill |additional_input| with entropy to supplement |seed|. It sets [all …]
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/docs/proposed/ |
H A D | psa-driver-interface.md | 203 …). Separately, transparent and opaque drivers can have [entropy collection entry points](#entropy-… 818 ### Entropy collection entry point 820 A driver can declare an entropy source by providing a `"get_entropy"` entry point. This entry point… 831 * `flags`: a bit-mask of [entropy collection flags](#entropy-collection-flags). 832 …entropy that is present in the `output` buffer, in bits. This must be at least `1` on success. The… 833 …entropy of at least `*estimate_bits` bits. When the entropy is coming from a hardware peripheral, … 834 …ta with a low density of entropy; for example a peripheral that returns eight bytes of data with a… 836 …entropy may be located anywhere in the buffer, so the driver may write less than `output_size` byt… 840 * `PSA_SUCCESS`: success. The output buffer contains some entropy. 841 …entropy is available without blocking. This is only permitted if the `PSA_DRIVER_GET_ENTROPY_BLOCK… [all …]
|
/aosp_15_r20/external/mbedtls/docs/proposed/ |
H A D | psa-driver-interface.md | 203 …). Separately, transparent and opaque drivers can have [entropy collection entry points](#entropy-… 818 ### Entropy collection entry point 820 A driver can declare an entropy source by providing a `"get_entropy"` entry point. This entry point… 831 * `flags`: a bit-mask of [entropy collection flags](#entropy-collection-flags). 832 …entropy that is present in the `output` buffer, in bits. This must be at least `1` on success. The… 833 …entropy of at least `*estimate_bits` bits. When the entropy is coming from a hardware peripheral, … 834 …ta with a low density of entropy; for example a peripheral that returns eight bytes of data with a… 836 …entropy may be located anywhere in the buffer, so the driver may write less than `output_size` byt… 840 * `PSA_SUCCESS`: success. The output buffer contains some entropy. 841 …entropy is available without blocking. This is only permitted if the `PSA_DRIVER_GET_ENTROPY_BLOCK… [all …]
|
/aosp_15_r20/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/rand/ |
D | rand.c | 37 // entropy which is accessed via |CRYPTO_sysrand[_for_seed]|. (If the operating 38 // system entropy source fails, it's up to |CRYPTO_sysrand| to abort the 47 // (We assume that the OS entropy is safe from fork()ing and VM duplication. 181 // In passive entropy mode, entropy is supplied from outside of the module via 186 // bytes contains entropy suitable for seeding a DRBG. 199 void RAND_load_entropy(const uint8_t *entropy, size_t entropy_len, in RAND_load_entropy() argument 209 OPENSSL_memcpy(&buffer->bytes[buffer->bytes_valid], entropy, entropy_len); in RAND_load_entropy() 243 // rand_get_seed fills |seed| with entropy and sets |*out_used_cpu| to one if 244 // that entropy came directly from the CPU and zero otherwise. 254 uint8_t entropy[CTR_DRBG_ENTROPY_LEN * BORINGSSL_FIPS_OVERREAD]; in rand_get_seed() local [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/quiche/deps/boringssl/src/crypto/fipsmodule/rand/ |
D | rand.c | 37 // entropy which is accessed via |CRYPTO_sysrand[_for_seed]|. (If the operating 38 // system entropy source fails, it's up to |CRYPTO_sysrand| to abort the 47 // (We assume that the OS entropy is safe from fork()ing and VM duplication. 181 // In passive entropy mode, entropy is supplied from outside of the module via 186 // bytes contains entropy suitable for seeding a DRBG. 199 void RAND_load_entropy(const uint8_t *entropy, size_t entropy_len, in RAND_load_entropy() argument 209 OPENSSL_memcpy(&buffer->bytes[buffer->bytes_valid], entropy, entropy_len); in RAND_load_entropy() 243 // rand_get_seed fills |seed| with entropy and sets |*out_used_cpu| to one if 244 // that entropy came directly from the CPU and zero otherwise. 254 uint8_t entropy[CTR_DRBG_ENTROPY_LEN * BORINGSSL_FIPS_OVERREAD]; in rand_get_seed() local [all …]
|