/external/iputils/ninfod/ |
H A D | ninfod_core.c | 400 unsigned int seed = 0; local 406 seed = (tv.tv_usec & 0xffffffff); 410 seed ^= (((unsigned long)pid) & 0xffffffff); 412 srand(seed);
|
/external/lz4/programs/ |
H A D | datagen.c | 108 #define CDG_RAND15BITS ((CDG_rand(seed) >> 3) & 32767) 109 #define CDG_RANDLENGTH ( ((CDG_rand(seed) >> 7) & 3) ? (CDG_rand(seed) % 14) : (CDG_rand(seed) & 511) + 15) 110 #define CDG_RANDCHAR (((CDG_rand(seed) >> 9) & 63) + '0') 111 static void CDG_generate(U64 size, U32* seed, double proba) argument 197 DISPLAY( " -s# : Select seed (default:%i)\n", CDG_SEED_DEFAULT); 209 U32 seed = CDG_SEED_DEFAULT; local 247 seed=0; 250 seed * [all...] |
/external/netperf/src/ |
H A D | net_uuid.c | 116 static void get_random_info(char seed[16]) argument 124 seed[i++] = myrand & 0xff; 125 seed[i++] = myrand >> 8; 147 static void get_random_info(char seed[16]) argument 158 read(fd, seed, 16); 168 seed[i++] = myrand & 0xff; 169 seed[i++] = myrand >> 8; 279 char seed[16]; local 282 get_random_info(seed); 283 seed[ [all...] |
/external/speex/libspeex/ |
H A D | math_approx.h | 49 static inline spx_word16_t speex_rand(spx_word16_t std, spx_int32_t *seed) argument 54 *seed = 1664525 * *seed + 1013904223; 55 ran.i = jflone | (jflmsk & *seed); 122 static inline spx_word16_t speex_rand(spx_word16_t std, spx_int32_t *seed) argument 125 *seed = 1664525 * *seed + 1013904223; 126 res = MULT16_16(EXTRACT16(SHR32(*seed,16)),std);
|
H A D | sb_celp.h | 124 spx_int32_t seed; member in struct:SBDecState
|
H A D | scal.c | 68 int seed; member in struct:SpeexDecorrState_ 106 st->seed = rand(); 119 static float uni_rand(int *seed) argument 124 *seed = 1664525 * *seed + 1013904223; 125 ran.i = jflone | (jflmsk & *seed); 130 static unsigned int irand(int *seed) argument 132 *seed = 1664525 * *seed + 1013904223; 133 return ((unsigned int)*seed)>>1 [all...] |
/external/tpm2/ |
H A D | Session.c | 310 TPM2B_DATA *seed, // IN: seed data 370 if(bind != TPM_RH_NULL || seed->t.size != 0) 372 // sessionKey = KDFa(hash, (authValue || seed), "ATH", nonceTPM, 375 // of an authorization value and a seed value 376 TPM2B_TYPE(KEY, (sizeof(TPMT_HA) + sizeof(seed->t.buffer))); 386 // Concatenate authValue and seed 387 pAssert(entityAuth.t.size + seed->t.size <= sizeof(key.t.buffer)); 389 MemoryConcat2B(&key.b, &seed->b, sizeof(key.t.buffer)); 304 SessionCreate( TPM_SE sessionType, TPMI_ALG_HASH authHash, TPM2B_NONCE *nonceCaller, TPMT_SYM_DEF *symmetric, TPMI_DH_ENTITY bind, TPM2B_DATA *seed, TPM_HANDLE *sessionHandle ) argument
|
/external/v8/src/ic/ |
H A D | stub-cache.h | 130 static int SecondaryOffset(Name* name, Code::Flags flags, int seed) { argument 131 // Use the seed from the primary cache in the secondary cache. 138 uint32_t key = (seed - name_low32bits) + iflags;
|
/external/valgrind/memcheck/tests/ |
H A D | unit_oset.c | 50 static UInt seed = 0; variable 53 seed = (1103515245 * seed + 12345); 54 return seed; 107 seed = 0; 323 seed = 0; 489 seed = 0;
|
/external/valgrind/none/tests/arm64/ |
H A D | integer.c | 32 static UInt seed = 80021; local 33 seed = 1103515245 * seed + 12345; 34 return (seed >> 17) & 0xFF;
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_gpsk_common.c | 111 const u8 *seed, size_t seed_len, 153 os_memcpy(pos, seed, seed_len); /* inputString */ 164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 190 const u8 *seed, size_t seed_len, 201 * (= seed) 218 psk, psk_len, seed, seed_len, 226 const u8 *seed, size_t seed_len, 237 * (= seed) 252 psk, psk_len, seed, seed_len, 287 u8 *seed, *po local 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument 424 u8 *seed, *pos; local [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, 321 tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_gpsk_common.c | 111 const u8 *seed, size_t seed_len, 153 os_memcpy(pos, seed, seed_len); /* inputString */ 164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 190 const u8 *seed, size_t seed_len, 201 * (= seed) 218 psk, psk_len, seed, seed_len, 226 const u8 *seed, size_t seed_len, 237 * (= seed) 252 psk, psk_len, seed, seed_len, 287 u8 *seed, *po local 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument 424 u8 *seed, *pos; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, 321 tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 111 const u8 *seed, size_t seed_len, 153 os_memcpy(pos, seed, seed_len); /* inputString */ 164 if (gkdf(mk, seed, seed_len, kdf_out, kdf_out_len) < 0) 190 const u8 *seed, size_t seed_len, 201 * (= seed) 218 psk, psk_len, seed, seed_len, 226 const u8 *seed, size_t seed_len, 237 * (= seed) 252 psk, psk_len, seed, seed_len, 287 u8 *seed, *po local 108 eap_gpsk_derive_keys_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t sk_len, u8 *pk, size_t pk_len) argument 189 eap_gpsk_derive_keys_aes(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len, u8 *pk, size_t *pk_len) argument 225 eap_gpsk_derive_keys_sha256(const u8 *psk, size_t psk_len, const u8 *seed, size_t seed_len, u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len) argument 343 eap_gpsk_derive_mid_helper(u32 csuite_specifier, u8 *kdf_out, size_t kdf_out_len, const u8 *psk, const u8 *seed, size_t seed_len, u8 method_type) argument 424 u8 *seed, *pos; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_common.c | 322 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 326 tls_prf_sha256(secret, secret_len, label, seed, seed_len, 332 return tls_prf_sha1_md5(secret, secret_len, label, seed, seed_len, out, 321 tls_prf(u16 ver, const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/random/ |
H A D | RandomDataImpl.java | 84 * explicitly seed the default non-secure generator, it is seeded with the 725 * Reseeds the random number generator with the supplied seed. 730 * @param seed 731 * the seed value to use 733 public void reSeed(long seed) { argument 737 rand.setSeed(seed); 755 * Reseeds the secure random number generator with the supplied seed. 760 * @param seed 761 * the seed value to use 763 public void reSeedSecure(long seed) { argument [all...] |
/external/boringssl/src/crypto/ec/ |
H A D | ec_asn1.c | 93 ASN1_BIT_STRING *seed; member in struct:x9_62_curve_st 99 ASN1_OPT(X9_62_CURVE, seed, ASN1_BIT_STRING)
|
/external/boringssl/src/crypto/rsa/ |
H A D | padding.c | 278 int PKCS1_MGF1(uint8_t *mask, unsigned len, const uint8_t *seed, argument 297 !EVP_DigestUpdate(&c, seed, seedlen) || 327 uint8_t *db, *seed; local 357 seed = to + 1; 366 if (!RAND_bytes(seed, mdlen)) { 376 if (PKCS1_MGF1(dbmask, emlen - mdlen, seed, mdlen, mgf1md) < 0) { 387 seed[i] ^= seedmask[i]; 402 uint8_t *db = NULL, seed[EVP_MAX_MD_SIZE], phash[EVP_MAX_MD_SIZE]; local 432 if (PKCS1_MGF1(seed, mdlen, maskeddb, dblen, mgf1md)) { 436 seed[ [all...] |
/external/boringssl/src/ssl/ |
H A D | t1_enc.c | 156 * seed parameter. It returns one on success and zero on failure. */ 590 uint8_t *seed = OPENSSL_malloc(seed_len); local 591 if (seed == NULL) { 596 memcpy(seed, ssl->s3->client_random, SSL3_RANDOM_SIZE); 597 memcpy(seed + SSL3_RANDOM_SIZE, ssl->s3->server_random, SSL3_RANDOM_SIZE); 599 seed[2 * SSL3_RANDOM_SIZE] = (uint8_t)(context_len >> 8); 600 seed[2 * SSL3_RANDOM_SIZE + 1] = (uint8_t)context_len; 601 memcpy(seed + 2 * SSL3_RANDOM_SIZE + 2, context, context_len); 606 label_len, seed, seed_len, NULL, 0); 607 OPENSSL_free(seed); [all...] |
/external/deqp/modules/egl/ |
H A D | teglMemoryStressTests.cpp | 72 MemoryAllocator (EglTestContext& eglTestCtx, EGLDisplay display, EGLConfig config, int seed, ObjectType types, int minWidth, int minHeight, int maxWidth, int maxHeight, bool use); 105 MemoryAllocator::MemoryAllocator (EglTestContext& eglTestCtx, EGLDisplay display, EGLConfig config, int seed, ObjectType types, int minWidth, int minHeight, int maxWidth, int maxHeight, bool use) argument 110 , m_rnd (seed)
|
/external/deqp/modules/gles2/functional/ |
H A D | es2fBufferTestUtil.cpp | 70 void fillWithRandomBytes (deUint8* ptr, int numBytes, deUint32 seed) argument 72 std::copy(tcu::RandomValueIterator<deUint8>::begin(seed, numBytes), tcu::RandomValueIterator<deUint8>::end(), ptr);
|
H A D | es2fDepthStencilClearTests.cpp | 130 void generateClears (vector<Clear>& dst, deUint32 seed); 227 void DepthStencilClearCase::generateClears (vector<Clear>& clears, deUint32 seed) argument 232 de::Random rnd (seed);
|
/external/deqp/modules/gles3/functional/ |
H A D | es3fDepthStencilClearTests.cpp | 130 void generateClears (vector<Clear>& dst, deUint32 seed); 230 void DepthStencilClearCase::generateClears (vector<Clear>& clears, deUint32 seed) argument 235 de::Random rnd (seed);
|
/external/deqp/modules/gles3/stress/ |
H A D | es3sLongRunningShaderTests.cpp | 263 const deUint32 seed = deStringHash(params.name) local 270 return seed;
|