Searched defs:seed (Results 176 - 200 of 398) sorted by relevance

1234567891011>>

/external/iputils/ninfod/
H A Dninfod_core.c400 unsigned int seed = 0; local
406 seed = (tv.tv_usec & 0xffffffff);
410 seed ^= (((unsigned long)pid) & 0xffffffff);
412 srand(seed);
/external/lz4/programs/
H A Ddatagen.c108 #define CDG_RAND15BITS ((CDG_rand(seed) >> 3) & 32767)
109 #define CDG_RANDLENGTH ( ((CDG_rand(seed) >> 7) & 3) ? (CDG_rand(seed) % 14) : (CDG_rand(seed) & 511) + 15)
110 #define CDG_RANDCHAR (((CDG_rand(seed) >> 9) & 63) + '0')
111 static void CDG_generate(U64 size, U32* seed, double proba) argument
197 DISPLAY( " -s# : Select seed (default:%i)\n", CDG_SEED_DEFAULT);
209 U32 seed = CDG_SEED_DEFAULT; local
247 seed=0;
250 seed *
[all...]
/external/netperf/src/
H A Dnet_uuid.c116 static void get_random_info(char seed[16]) argument
124 seed[i++] = myrand & 0xff;
125 seed[i++] = myrand >> 8;
147 static void get_random_info(char seed[16]) argument
158 read(fd, seed, 16);
168 seed[i++] = myrand & 0xff;
169 seed[i++] = myrand >> 8;
279 char seed[16]; local
282 get_random_info(seed);
283 seed[
[all...]
/external/speex/libspeex/
H A Dmath_approx.h49 static inline spx_word16_t speex_rand(spx_word16_t std, spx_int32_t *seed) argument
54 *seed = 1664525 * *seed + 1013904223;
55 ran.i = jflone | (jflmsk & *seed);
122 static inline spx_word16_t speex_rand(spx_word16_t std, spx_int32_t *seed) argument
125 *seed = 1664525 * *seed + 1013904223;
126 res = MULT16_16(EXTRACT16(SHR32(*seed,16)),std);
H A Dsb_celp.h124 spx_int32_t seed; member in struct:SBDecState
H A Dscal.c68 int seed; member in struct:SpeexDecorrState_
106 st->seed = rand();
119 static float uni_rand(int *seed) argument
124 *seed = 1664525 * *seed + 1013904223;
125 ran.i = jflone | (jflmsk & *seed);
130 static unsigned int irand(int *seed) argument
132 *seed = 1664525 * *seed + 1013904223;
133 return ((unsigned int)*seed)>>1
[all...]
/external/tpm2/
H A DSession.c310 TPM2B_DATA *seed, // IN: seed data
370 if(bind != TPM_RH_NULL || seed->t.size != 0)
372 // sessionKey = KDFa(hash, (authValue || seed), "ATH", nonceTPM,
375 // of an authorization value and a seed value
376 TPM2B_TYPE(KEY, (sizeof(TPMT_HA) + sizeof(seed->t.buffer)));
386 // Concatenate authValue and seed
387 pAssert(entityAuth.t.size + seed->t.size <= sizeof(key.t.buffer));
389 MemoryConcat2B(&key.b, &seed->b, sizeof(key.t.buffer));
304 SessionCreate( TPM_SE sessionType, TPMI_ALG_HASH authHash, TPM2B_NONCE *nonceCaller, TPMT_SYM_DEF *symmetric, TPMI_DH_ENTITY bind, TPM2B_DATA *seed, TPM_HANDLE *sessionHandle ) argument
/external/v8/src/ic/
H A Dstub-cache.h130 static int SecondaryOffset(Name* name, Code::Flags flags, int seed) { argument
131 // Use the seed from the primary cache in the secondary cache.
138 uint32_t key = (seed - name_low32bits) + iflags;
/external/valgrind/memcheck/tests/
H A Dunit_oset.c50 static UInt seed = 0; variable
53 seed = (1103515245 * seed + 12345);
54 return seed;
107 seed = 0;
323 seed = 0;
489 seed = 0;
/external/valgrind/none/tests/arm64/
H A Dinteger.c32 static UInt seed = 80021; local
33 seed = 1103515245 * seed + 12345;
34 return (seed >> 17) & 0xFF;
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_gpsk_common.c111 const u8 *seed, size_t seed_len,
153 os_memcpy(pos, seed, seed_len); /* inputString */
164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
190 const u8 *seed, size_t seed_len,
201 * (= seed)
218 psk, psk_len, seed, seed_len,
226 const u8 *seed, size_t seed_len,
237 * (= seed)
252 psk, psk_len, seed, seed_len,
287 u8 *seed, *po local
108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument
343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument
424 u8 *seed, *pos; local
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_common.c322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
321 tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
/external/wpa_supplicant_8/src/eap_common/
H A Deap_gpsk_common.c111 const u8 *seed, size_t seed_len,
153 os_memcpy(pos, seed, seed_len); /* inputString */
164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
190 const u8 *seed, size_t seed_len,
201 * (= seed)
218 psk, psk_len, seed, seed_len,
226 const u8 *seed, size_t seed_len,
237 * (= seed)
252 psk, psk_len, seed, seed_len,
287 u8 *seed, *po local
108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument
343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument
424 u8 *seed, *pos; local
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_common.c322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
321 tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_gpsk_common.c111 const u8 *seed, size_t seed_len,
153 os_memcpy(pos, seed, seed_len); /* inputString */
164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0)
190 const u8 *seed, size_t seed_len,
201 * (= seed)
218 psk, psk_len, seed, seed_len,
226 const u8 *seed, size_t seed_len,
237 * (= seed)
252 psk, psk_len, seed, seed_len,
287 u8 *seed, *po local
108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument
189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument
225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument
343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument
424 u8 *seed, *pos; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_common.c322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
326 tls_prf_sha256(secret, secret_len, label, seed, seed_len,
332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out,
321 tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
/external/apache-commons-math/src/main/java/org/apache/commons/math/random/
H A DRandomDataImpl.java84 * explicitly seed the default non-secure generator, it is seeded with the
725 * Reseeds the random number generator with the supplied seed.
730 * @param seed
731 * the seed value to use
733 public void reSeed(long seed) { argument
737 rand.setSeed(seed);
755 * Reseeds the secure random number generator with the supplied seed.
760 * @param seed
761 * the seed value to use
763 public void reSeedSecure(long seed) { argument
[all...]
/external/boringssl/src/crypto/ec/
H A Dec_asn1.c93 ASN1_BIT_STRING *seed; member in struct:x9_62_curve_st
99 ASN1_OPT(X9_62_CURVE, seed, ASN1_BIT_STRING)
/external/boringssl/src/crypto/rsa/
H A Dpadding.c278 int PKCS1_MGF1(uint8_t *mask, unsigned len, const uint8_t *seed, argument
297 !EVP_DigestUpdate(&c, seed, seedlen) ||
327 uint8_t *db, *seed; local
357 seed = to + 1;
366 if (!RAND_bytes(seed, mdlen)) {
376 if (PKCS1_MGF1(dbmask, emlen - mdlen, seed, mdlen, mgf1md) < 0) {
387 seed[i] ^= seedmask[i];
402 uint8_t *db = NULL, seed[EVP_MAX_MD_SIZE], phash[EVP_MAX_MD_SIZE]; local
432 if (PKCS1_MGF1(seed, mdlen, maskeddb, dblen, mgf1md)) {
436 seed[
[all...]
/external/boringssl/src/ssl/
H A Dt1_enc.c156 * seed parameter. It returns one on success and zero on failure. */
590 uint8_t *seed = OPENSSL_malloc(seed_len); local
591 if (seed == NULL) {
596 memcpy(seed, ssl->s3->client_random, SSL3_RANDOM_SIZE);
597 memcpy(seed + SSL3_RANDOM_SIZE, ssl->s3->server_random, SSL3_RANDOM_SIZE);
599 seed[2 * SSL3_RANDOM_SIZE] = (uint8_t)(context_len >> 8);
600 seed[2 * SSL3_RANDOM_SIZE + 1] = (uint8_t)context_len;
601 memcpy(seed + 2 * SSL3_RANDOM_SIZE + 2, context, context_len);
606 label_len, seed, seed_len, NULL, 0);
607 OPENSSL_free(seed);
[all...]
/external/deqp/modules/egl/
H A DteglMemoryStressTests.cpp72 MemoryAllocator (EglTestContext& eglTestCtx, EGLDisplay display, EGLConfig config, int seed, ObjectType types, int minWidth, int minHeight, int maxWidth, int maxHeight, bool use);
105 MemoryAllocator::MemoryAllocator (EglTestContext& eglTestCtx, EGLDisplay display, EGLConfig config, int seed, ObjectType types, int minWidth, int minHeight, int maxWidth, int maxHeight, bool use) argument
110 , m_rnd (seed)
/external/deqp/modules/gles2/functional/
H A Des2fBufferTestUtil.cpp70 void fillWithRandomBytes (deUint8* ptr, int numBytes, deUint32 seed) argument
72 std::copy(tcu::RandomValueIterator<deUint8>::begin(seed, numBytes), tcu::RandomValueIterator<deUint8>::end(), ptr);
H A Des2fDepthStencilClearTests.cpp130 void generateClears (vector<Clear>& dst, deUint32 seed);
227 void DepthStencilClearCase::generateClears (vector<Clear>& clears, deUint32 seed) argument
232 de::Random rnd (seed);
/external/deqp/modules/gles3/functional/
H A Des3fDepthStencilClearTests.cpp130 void generateClears (vector<Clear>& dst, deUint32 seed);
230 void DepthStencilClearCase::generateClears (vector<Clear>& clears, deUint32 seed) argument
235 de::Random rnd (seed);
/external/deqp/modules/gles3/stress/
H A Des3sLongRunningShaderTests.cpp263 const deUint32 seed = deStringHash(params.name) local
270 return seed;

Completed in 1033 milliseconds

1234567891011>>