/external/chromium_org/third_party/smhasher/src/ |
H A D | Spooky.cpp | 188 void SpookyHash::Init(uint64 seed1, uint64 seed2) argument 193 m_state[1] = seed2;
|
/external/pixman/test/ |
H A D | prng-test.c | 115 uint32_t ref, seed, seed0, seed1, seed2, seed3; local 138 seed2 = (seed = seed * 1103515245 + 12345); 150 raninit (&x, seed2);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_sim_common.c | 233 const u8 *seed2, size_t seed2_len, 255 addr[2] = seed2; 232 prf_prime(const u8 *k, const char *seed1, const u8 *seed2, size_t seed2_len, const u8 *seed3, size_t seed3_len, u8 *res, size_t res_len) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_sim_common.c | 233 const u8 *seed2, size_t seed2_len, 255 addr[2] = seed2; 232 prf_prime(const u8 *k, const char *seed1, const u8 *seed2, size_t seed2_len, const u8 *seed3, size_t seed3_len, u8 *res, size_t res_len) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_sim_common.c | 233 const u8 *seed2, size_t seed2_len, 255 addr[2] = seed2; 232 prf_prime(const u8 *k, const char *seed1, const u8 *seed2, size_t seed2_len, const u8 *seed3, size_t seed3_len, u8 *res, size_t res_len) argument
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
H A D | t1_enc.c | 153 const void *seed2, int seed2_len, 181 if (seed2 && !EVP_DigestSignUpdate(&ctx,seed2,seed2_len)) 204 if (seed2 && !EVP_DigestSignUpdate(&ctx,seed2,seed2_len)) 247 const void *seed2, int seed2_len, 278 seed1,seed1_len,seed2,seed2_len,seed3,seed3_len,seed4,seed4_len,seed5,seed5_len, 150 tls1_P_hash(const EVP_MD *md, const unsigned char *sec, int sec_len, const void *seed1, int seed1_len, const void *seed2, int seed2_len, const void *seed3, int seed3_len, const void *seed4, int seed4_len, const void *seed5, int seed5_len, unsigned char *out, int olen) argument 245 tls1_PRF(long digest_mask, const void *seed1, int seed1_len, const void *seed2, int seed2_len, const void *seed3, int seed3_len, const void *seed4, int seed4_len, const void *seed5, int seed5_len, const unsigned char *sec, int slen, unsigned char *out1, unsigned char *out2, int olen) argument
|
/external/openssl/ssl/ |
H A D | t1_enc.c | 155 const void *seed2, int seed2_len, 185 if (seed2 && !EVP_DigestSignUpdate(&ctx,seed2,seed2_len)) 209 if (seed2 && !EVP_DigestSignUpdate(&ctx,seed2,seed2_len)) 248 const void *seed2, int seed2_len, 280 seed1,seed1_len,seed2,seed2_len,seed3,seed3_len,seed4,seed4_len,seed5,seed5_len, 152 tls1_P_hash(const EVP_MD *md, const unsigned char *sec, int sec_len, const void *seed1, int seed1_len, const void *seed2, int seed2_len, const void *seed3, int seed3_len, const void *seed4, int seed4_len, const void *seed5, int seed5_len, unsigned char *out, int olen) argument 246 tls1_PRF(long digest_mask, const void *seed1, int seed1_len, const void *seed2, int seed2_len, const void *seed3, int seed3_len, const void *seed4, int seed4_len, const void *seed5, int seed5_len, const unsigned char *sec, int slen, unsigned char *out1, unsigned char *out2, int olen) argument
|
/external/chromium_org/testing/gtest/test/ |
H A D | gtest_unittest.cc | 337 const int seed2 = GetRandomSeedFromFlag(kMaxRandomSeed + 1); local 338 EXPECT_LE(1, seed2); 339 EXPECT_LE(seed2, static_cast<int>(kMaxRandomSeed));
|
/external/gtest/test/ |
H A D | gtest_unittest.cc | 334 const int seed2 = GetRandomSeedFromFlag(kMaxRandomSeed + 1); local 335 EXPECT_LE(1, seed2); 336 EXPECT_LE(seed2, static_cast<int>(kMaxRandomSeed));
|
/external/protobuf/gtest/test/ |
H A D | gtest_unittest.cc | 218 const int seed2 = GetRandomSeedFromFlag(kMaxRandomSeed + 1); local 219 EXPECT_LE(1, seed2); 220 EXPECT_LE(seed2, static_cast<int>(kMaxRandomSeed));
|