| /external/libjpeg-turbo/ |
| D | jcphuff.c | 14 * This file contains Huffman entropy encoding routines for progressive JPEG. 77 /* Expanded entropy encoder object for progressive Huffman encoding. */ 208 phuff_entropy_ptr entropy = (phuff_entropy_ptr)cinfo->entropy; in start_pass_phuff() local 213 entropy->cinfo = cinfo; in start_pass_phuff() 214 entropy->gather_statistics = gather_statistics; in start_pass_phuff() 223 entropy->pub.encode_mcu = encode_mcu_DC_first; in start_pass_phuff() 225 entropy->pub.encode_mcu = encode_mcu_AC_first; in start_pass_phuff() 227 entropy->AC_first_prepare = jsimd_encode_mcu_AC_first_prepare; in start_pass_phuff() 229 entropy->AC_first_prepare = encode_mcu_AC_first_prepare; in start_pass_phuff() 232 entropy->pub.encode_mcu = encode_mcu_DC_refine; in start_pass_phuff() [all …]
|
| D | jcarith.c | 11 * This file contains portable arithmetic entropy encoding routines for JPEG 27 /* Expanded entropy encoder object for arithmetic encoding. */ 141 arith_entropy_ptr e = (arith_entropy_ptr)cinfo->entropy; in finish_pass() 227 register arith_entropy_ptr e = (arith_entropy_ptr)cinfo->entropy; in arith_encode() 327 arith_entropy_ptr entropy = (arith_entropy_ptr)cinfo->entropy; in emit_restart() local 341 memset(entropy->dc_stats[compptr->dc_tbl_no], 0, DC_STAT_BINS); in emit_restart() 343 entropy->last_dc_val[ci] = 0; in emit_restart() 344 entropy->dc_context[ci] = 0; in emit_restart() 348 memset(entropy->ac_stats[compptr->ac_tbl_no], 0, AC_STAT_BINS); in emit_restart() 353 entropy->c = 0; in emit_restart() [all …]
|
| D | jdarith.c | 11 * This file contains portable arithmetic entropy encoding routines for JPEG 30 /* Expanded entropy decoder object for arithmetic decoding. */ 117 register arith_entropy_ptr e = (arith_entropy_ptr)cinfo->entropy; in arith_decode() 201 arith_entropy_ptr entropy = (arith_entropy_ptr)cinfo->entropy; in process_restart() local 213 memset(entropy->dc_stats[compptr->dc_tbl_no], 0, DC_STAT_BINS); in process_restart() 215 entropy->last_dc_val[ci] = 0; in process_restart() 216 entropy->dc_context[ci] = 0; in process_restart() 219 memset(entropy->ac_stats[compptr->ac_tbl_no], 0, AC_STAT_BINS); in process_restart() 224 entropy->c = 0; in process_restart() 225 entropy->a = 0; in process_restart() [all …]
|
| D | jdphuff.c | 11 * This file contains Huffman entropy decoding routines for progressive JPEG. 33 * Expanded entropy decoder object for progressive Huffman decoding. 82 phuff_entropy_ptr entropy = (phuff_entropy_ptr)cinfo->entropy; in start_pass_phuff_decoder() local 147 entropy->pub.decode_mcu = decode_mcu_DC_first; in start_pass_phuff_decoder() 149 entropy->pub.decode_mcu = decode_mcu_AC_first; in start_pass_phuff_decoder() 152 entropy->pub.decode_mcu = decode_mcu_DC_refine; in start_pass_phuff_decoder() 154 entropy->pub.decode_mcu = decode_mcu_AC_refine; in start_pass_phuff_decoder() 165 pdtbl = (d_derived_tbl **)(entropy->derived_tbls) + tbl; in start_pass_phuff_decoder() 170 pdtbl = (d_derived_tbl **)(entropy->derived_tbls) + tbl; in start_pass_phuff_decoder() 173 entropy->ac_derived_tbl = entropy->derived_tbls[tbl]; in start_pass_phuff_decoder() [all …]
|
| D | jdhuff.c | 12 * This file contains Huffman entropy decoding routines. 33 * Expanded entropy decoder object for Huffman decoding. 79 huff_entropy_ptr entropy = (huff_entropy_ptr)cinfo->entropy; in start_pass_huff_decoder() local 98 pdtbl = (d_derived_tbl **)(entropy->dc_derived_tbls) + dctbl; in start_pass_huff_decoder() 100 pdtbl = (d_derived_tbl **)(entropy->ac_derived_tbls) + actbl; in start_pass_huff_decoder() 103 entropy->saved.last_dc_val[ci] = 0; in start_pass_huff_decoder() 111 entropy->dc_cur_tbls[blkn] = entropy->dc_derived_tbls[compptr->dc_tbl_no]; in start_pass_huff_decoder() 112 entropy->ac_cur_tbls[blkn] = entropy->ac_derived_tbls[compptr->ac_tbl_no]; in start_pass_huff_decoder() 115 entropy->dc_needed[blkn] = TRUE; in start_pass_huff_decoder() 117 entropy->ac_needed[blkn] = (compptr->_DCT_scaled_size > 1); in start_pass_huff_decoder() [all …]
|
| D | jchuff.c | 14 * This file contains Huffman entropy encoding routines. 68 /* Expanded entropy encoder object for Huffman encoding. 166 huff_entropy_ptr entropy = (huff_entropy_ptr)cinfo->entropy; in start_pass_huff() local 172 entropy->pub.encode_mcu = encode_mcu_gather; in start_pass_huff() 173 entropy->pub.finish_pass = finish_pass_gather; in start_pass_huff() 178 entropy->pub.encode_mcu = encode_mcu_huff; in start_pass_huff() 179 entropy->pub.finish_pass = finish_pass_huff; in start_pass_huff() 182 entropy->simd = jsimd_can_huff_encode_one_block(); in start_pass_huff() 198 if (entropy->dc_count_ptrs[dctbl] == NULL) in start_pass_huff() 199 entropy->dc_count_ptrs[dctbl] = (long *) in start_pass_huff() [all …]
|
| /external/openthread/third_party/mbedtls/repo/tests/suites/ |
| D | test_suite_entropy.data | 1 Entropy init-free-free 4 Entropy init-free-init-free 10 Entropy write/update seed file: good 13 Entropy write/update seed file: nonexistent 16 Entropy write/update seed file: base NV seed file 19 Entropy no sources 22 Entropy too many sources 25 Entropy output length: 0 28 Entropy output length: 1 31 Entropy output length: 2 [all …]
|
| D | test_suite_ctr_drbg.function | 2 #include "mbedtls/entropy.h" 28 int entropy_len_arg, data_t *entropy, 43 test_max_idx = entropy->len; 45 /* CTR_DRBG_Instantiate(entropy[:entropy->len], nonce, perso, <ignored>) 51 mbedtls_test_entropy_func, entropy->x, 60 /* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len], 76 /* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len], 137 void ctr_drbg_validate_no_reseed(data_t *add_init, data_t *entropy, 143 entropy->len, entropy, 151 void ctr_drbg_validate_pr(data_t *add_init, data_t *entropy, [all …]
|
| D | test_suite_hmac_drbg.function | 39 entropy_ctx entropy; 48 entropy.len = sizeof(buf); 49 entropy.p = buf; 64 /* Init must use entropy */ 65 TEST_ASSERT(mbedtls_hmac_drbg_seed(&ctx, md_info, mbedtls_test_entropy_func, &entropy, 67 /* default_entropy_len of entropy, plus half as much for the nonce */ 69 TEST_EQUAL(sizeof(buf) - entropy.len, expected_consumed_entropy); 72 * 2 * reps so the next few calls should not use entropy */ 78 TEST_EQUAL(sizeof(buf) - entropy.len, expected_consumed_entropy); 89 TEST_EQUAL(sizeof(buf) - entropy.len, expected_consumed_entropy); [all …]
|
| D | test_suite_random.function | 8 #include "mbedtls/entropy.h" 24 mbedtls_entropy_context entropy; 30 mbedtls_entropy_init(&entropy); 33 mbedtls_entropy_func, &entropy, 38 mbedtls_entropy_free(&entropy); 41 mbedtls_entropy_init(&entropy); 44 mbedtls_entropy_func, &entropy, 49 mbedtls_entropy_free(&entropy); 56 mbedtls_entropy_free(&entropy); 63 mbedtls_entropy_context entropy; [all …]
|
| /external/mbedtls/tests/suites/ |
| D | test_suite_entropy.data | 1 Entropy init-free-free 4 Entropy init-free-init-free 10 Entropy write/update seed file: good 13 Entropy write/update seed file: nonexistent 16 Entropy write/update seed file: base NV seed file 19 Entropy no sources 22 Entropy too many sources 25 Entropy output length: 0 28 Entropy output length: 1 31 Entropy output length: 2 [all …]
|
| D | test_suite_ctr_drbg.function | 2 #include "mbedtls/entropy.h" 28 int entropy_len_arg, data_t *entropy, 43 test_max_idx = entropy->len; 45 /* CTR_DRBG_Instantiate(entropy[:entropy->len], nonce, perso, <ignored>) 51 mbedtls_test_entropy_func, entropy->x, 60 /* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len], 76 /* CTR_DRBG_Reseed(entropy[idx:idx+entropy->len], 137 void ctr_drbg_validate_no_reseed(data_t *add_init, data_t *entropy, 143 entropy->len, entropy, 151 void ctr_drbg_validate_pr(data_t *add_init, data_t *entropy, [all …]
|
| D | test_suite_random.function | 8 #include "mbedtls/entropy.h" 24 mbedtls_entropy_context entropy; 32 mbedtls_entropy_init(&entropy); 35 mbedtls_entropy_func, &entropy, 40 mbedtls_entropy_free(&entropy); 43 mbedtls_entropy_init(&entropy); 46 mbedtls_entropy_func, &entropy, 51 mbedtls_entropy_free(&entropy); 58 mbedtls_entropy_free(&entropy); 66 mbedtls_entropy_context entropy; [all …]
|
| D | test_suite_hmac_drbg.function | 39 entropy_ctx entropy; 50 entropy.len = sizeof(buf); 51 entropy.p = buf; 66 /* Init must use entropy */ 67 TEST_ASSERT(mbedtls_hmac_drbg_seed(&ctx, md_info, mbedtls_test_entropy_func, &entropy, 69 /* default_entropy_len of entropy, plus half as much for the nonce */ 71 TEST_EQUAL(sizeof(buf) - entropy.len, expected_consumed_entropy); 74 * 2 * reps so the next few calls should not use entropy */ 80 TEST_EQUAL(sizeof(buf) - entropy.len, expected_consumed_entropy); 91 TEST_EQUAL(sizeof(buf) - entropy.len, expected_consumed_entropy); [all …]
|
| /external/rappor/client/javatest/com/google/rappor/ |
| D | HmacDrbgTest.java | 29 byte[] entropy = in testHmacDrbgNistCase0() 38 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase0() 48 byte[] entropy = in testHmacDrbgNistCase1() 57 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase1() 67 byte[] entropy = in testHmacDrbgNistCase2() 76 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase2() 86 byte[] entropy = in testHmacDrbgNistCase3() 95 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase3() 105 byte[] entropy = in testHmacDrbgNistCase4() 114 HmacDrbg drbg = new HmacDrbg(Bytes.concat(entropy, nonce), null); in testHmacDrbgNistCase4() [all …]
|
| /external/mbedtls/include/mbedtls/ |
| D | entropy.h | 2 * \file entropy.h 4 * \brief Entropy accumulator implementation 23 #define MBEDTLS_ENTROPY_BLOCK_SIZE 64 /**< Block size of entropy accumulator (SHA-512) */ 28 #define MBEDTLS_ENTROPY_BLOCK_SIZE 32 /**< Block size of entropy accumulator (SHA-256) */ 37 /** Critical entropy source failure. */ 61 #define MBEDTLS_ENTROPY_MAX_GATHER 128 /**< Maximum amount requested from entropy sources … 69 #define MBEDTLS_ENTROPY_SOURCE_STRONG 1 /**< Entropy source is strong */ 70 #define MBEDTLS_ENTROPY_SOURCE_WEAK 0 /**< Entropy source is weak */ 77 * \brief Entropy poll callback pointer 91 * \brief Entropy source state [all …]
|
| D | ctr_drbg.h | 36 #include "entropy.h" 42 /** The entropy source failed. */ 46 /** The input (entropy + additional data) is too large. */ 83 * \brief The amount of entropy used per seed by default, in bytes. 87 /** This is 48 bytes because the entropy module uses SHA-512. 93 /** This is 32 bytes because the entropy module uses SHA-256. 136 /** The default length of the nonce read from the entropy source. 138 * This is \c 0 because a single read from the entropy source is sufficient 144 /** The default length of the nonce read from the entropy source. 146 * This is half of the default entropy length because a single read from [all …]
|
| /external/openthread/third_party/mbedtls/repo/include/mbedtls/ |
| D | entropy.h | 2 * \file entropy.h 4 * \brief Entropy accumulator implementation 39 /** Critical entropy source failure. */ 63 #define MBEDTLS_ENTROPY_MAX_GATHER 128 /**< Maximum amount requested from entropy sources … 69 #define MBEDTLS_ENTROPY_BLOCK_SIZE 64 /**< Block size of entropy accumulator (SHA-512) */ 71 #define MBEDTLS_ENTROPY_BLOCK_SIZE 32 /**< Block size of entropy accumulator (SHA-256) */ 77 #define MBEDTLS_ENTROPY_SOURCE_STRONG 1 /**< Entropy source is strong */ 78 #define MBEDTLS_ENTROPY_SOURCE_WEAK 0 /**< Entropy source is weak */ 85 * \brief Entropy poll callback pointer 99 * \brief Entropy source state [all …]
|
| D | ctr_drbg.h | 44 /** The entropy source failed. */ 48 /** The input (entropy + additional data) is too large. */ 85 * \brief The amount of entropy used per seed by default, in bytes. 89 /** This is 48 bytes because the entropy module uses SHA-512 96 /** This is 32 bytes because the entropy module uses SHA-256 141 /** The default length of the nonce read from the entropy source. 143 * This is \c 0 because a single read from the entropy source is sufficient 149 /** The default length of the nonce read from the entropy source. 151 * This is half of the default entropy length because a single read from 152 * the entropy source does not provide enough material to form a nonce. [all …]
|
| /external/trusty/arm-trusted-firmware/services/std_svc/trng/ |
| D | trng_entropy_pool.c | 14 * # Entropy pool 15 * Note that the TRNG Firmware interface can request up to 192 bits of entropy 18 * 192 bits of entropy, we don't have to throw out the leftover 1-63 bits of 19 * entropy. 22 static uint64_t entropy[WORDS_IN_POOL]; variable 23 /* index in bits of the first bit of usable entropy */ 25 /* then number of valid bits in the entropy pool */ 30 #define BITS_PER_WORD (sizeof(entropy[0]) * 8) 40 * Fill the entropy pool until we have at least as many bits as requested. 41 * Returns true after filling the pool, and false if the entropy source is out [all …]
|
| /external/arm-trusted-firmware/services/std_svc/trng/ |
| D | trng_entropy_pool.c | 14 * # Entropy pool 15 * Note that the TRNG Firmware interface can request up to 192 bits of entropy 18 * 192 bits of entropy, we don't have to throw out the leftover 1-63 bits of 19 * entropy. 22 static uint64_t entropy[WORDS_IN_POOL]; variable 23 /* index in bits of the first bit of usable entropy */ 25 /* then number of valid bits in the entropy pool */ 30 #define BITS_PER_WORD (sizeof(entropy[0]) * 8) 40 * Fill the entropy pool until we have at least as many bits as requested. 41 * Returns true after filling the pool, and false if the entropy source is out [all …]
|
| /external/cronet/components/metrics/ |
| D | entropy_state.h | 18 // A class to get entropy source values from the PrefService. 22 // the entropy source value from this helper class. 35 // Overriding the entropy source preferences with new values as given by 43 // Returns the high entropy source for this client, which is composed of a 44 // client ID and the low entropy source. This is intended to be unique for 49 // Returns the low entropy source that is used to randomize field trials on 54 // Returns the pseudo low entropy source for this client. Generates a new 59 // Returns the old low entropy source for this client. Does not generate a new 64 // The argument used to generate a non-identifying entropy source. We want no 65 // more than 13 bits of entropy, so use this max to return a number in the [all …]
|
| /external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/rand/ |
| D | internal.h | 44 // CRYPTO_get_seed_entropy writes |out_entropy_len| bytes of entropy, suitable 46 // entropy came directly from the CPU and zero if it came from the OS. It 47 // actively obtains entropy from the CPU/OS and so should not be called from 52 // RAND_load_entropy supplies |entropy_len| bytes of entropy to the module. The 53 // |from_cpu| parameter is true iff the entropy was obtained directly from the 55 void RAND_load_entropy(const uint8_t *entropy, size_t entropy_len, 59 // when the module has stopped because it has run out of entropy. 64 // CRYPTO_sysrand fills |len| bytes at |buf| with entropy from the operating 68 // CRYPTO_sysrand_for_seed fills |len| bytes at |buf| with entropy from the 74 // CRYPTO_init_sysrand initializes long-lived resources needed to draw entropy [all …]
|
| /external/boringssl/src/crypto/fipsmodule/rand/ |
| D | rand.c | 36 // entropy which is accessed via |CRYPTO_sysrand[_for_seed]|. (If the operating 37 // system entropy source fails, it's up to |CRYPTO_sysrand| to abort the 46 // (We assume that the OS entropy is safe from fork()ing and VM duplication. 185 // In passive entropy mode, entropy is supplied from outside of the module via 190 // bytes contains entropy suitable for seeding a DRBG. 197 // obtained via a method other than from the kernel. In these cases entropy 205 void RAND_load_entropy(const uint8_t *entropy, size_t entropy_len, in RAND_load_entropy() argument 215 OPENSSL_memcpy(&buffer->bytes[buffer->bytes_valid], entropy, entropy_len); in RAND_load_entropy() 250 // rand_get_seed fills |seed| with entropy. In some cases, it will additionally 251 // fill |additional_input| with entropy to supplement |seed|. It sets [all …]
|
| /external/cronet/third_party/boringssl/src/crypto/fipsmodule/rand/ |
| D | rand.c | 36 // entropy which is accessed via |CRYPTO_sysrand[_for_seed]|. (If the operating 37 // system entropy source fails, it's up to |CRYPTO_sysrand| to abort the 46 // (We assume that the OS entropy is safe from fork()ing and VM duplication. 182 // In passive entropy mode, entropy is supplied from outside of the module via 187 // bytes contains entropy suitable for seeding a DRBG. 194 // obtained via a method other than from the kernel. In these cases entropy 202 void RAND_load_entropy(const uint8_t *entropy, size_t entropy_len, in RAND_load_entropy() argument 212 OPENSSL_memcpy(&buffer->bytes[buffer->bytes_valid], entropy, entropy_len); in RAND_load_entropy() 247 // rand_get_seed fills |seed| with entropy. In some cases, it will additionally 248 // fill |additional_input| with entropy to supplement |seed|. It sets [all …]
|