/system/bt/osi/src/ |
H A D | osi.c | 35 int rand; local 39 LOG_ERROR(LOG_TAG, "%s can't open rand fd %s: %s ", __func__, RANDOM_PATH, 44 ssize_t read_bytes = read(rand_fd, &rand, sizeof(rand)); 47 assert(read_bytes == sizeof(rand)); 49 if (rand < 0) 50 rand = -rand; 52 return rand;
|
/system/tpm/tpm_manager/server/ |
H A D | openssl_crypto_util_impl.cc | 21 #include <openssl/rand.h>
|
/system/bt/stack/btm/ |
H A D | btm_ble_addr.c | 132 /* generate 3B rand as BD LSB, SRK with it, get BD MSB */ 279 UINT8 rand[3]; 286 rand[0] = rpa[2]; 287 rand[1] = rpa[1]; 288 rand[2] = rpa[0]; 292 &rand[0], 3, &output); 294 rand[0] = rpa[5]; 295 rand[1] = rpa[4]; 296 rand[2] = rpa[3]; 298 if (!memcmp(output.param_buf, &rand[ 324 UINT8 rand[3]; local [all...] |
H A D | btm_ble.c | 1175 memcpy(p_rec->ble.keys.rand, p_keys->penc_key.rand, BT_OCTET8_LEN); 1492 void btm_ble_ltk_request(UINT16 handle, UINT8 rand[8], UINT16 ediv) argument 1502 memcpy(p_cb->enc_rand, rand, BT_OCTET8_LEN); 1552 if (btsnd_hcic_ble_start_enc(p_rec->ble_hci_handle, p_rec->ble.keys.rand,
|
H A D | btm_ble_int.h | 390 extern void btm_ble_ltk_request(UINT16 handle, UINT8 rand[8], UINT16 ediv);
|
/system/extras/mmap-perf/ |
H A D | mmapPerf.cpp | 37 uint64_t seed = (unsigned long long)rand() | ((unsigned long long)rand() << 32); 116 unsigned int targetPage = rand() % pagesTotal; 126 unsigned int targetPage = rand() % pagesTotal;
|
/system/tpm/trunks/ |
H A D | hmac_session_impl.cc | 24 #include <openssl/rand.h>
|
H A D | policy_session_impl.cc | 26 #include <openssl/rand.h>
|
H A D | session_manager_impl.cc | 28 #include <openssl/rand.h>
|
H A D | hmac_authorization_delegate.cc | 25 #include <openssl/rand.h>
|
/system/keymaster/ |
H A D | aes_key.cpp | 24 #include <openssl/rand.h>
|
H A D | hmac_key.cpp | 22 #include <openssl/rand.h>
|
H A D | operation_table.cpp | 21 #include <openssl/rand.h>
|
H A D | symmetric_key.cpp | 22 #include <openssl/rand.h>
|
H A D | key_blob_test.cpp | 22 #include <openssl/rand.h> 294 std::cout << "Seeding rand() with " << now << " for fuzz test." << std::endl; 301 buf[i] = static_cast<uint8_t>(rand());
|
/system/extras/zram-perf/ |
H A D | zram-perf.cpp | 18 int start = rand(); 24 int val = rand() & 0xfff;
|
/system/media/audio_utils/tests/ |
H A D | fifo_tests.cpp | 105 framesToWrite = rand() % (framesToWrite + 1); 126 framesToRead = rand() % (framesToRead + 1);
|
/system/bt/stack/smp/ |
H A D | smp_keys.c | 600 void smp_calculate_comfirm (tSMP_CB *p_cb, BT_OCTET16 rand, BD_ADDR bda) argument 612 /* p1 = rand XOR p1 */ 613 smp_xor_128(p1, rand); 694 smp_debug_print_nbyte_little_endian ((UINT8 *)p_cb->rand, (const UINT8 *)"local rand", 16); 695 smp_calculate_comfirm(p_cb, p_cb->rand, p_cb->pairing_bda); 715 smp_debug_print_nbyte_little_endian ((UINT8 *)p_cb->rrand, (const UINT8 *)"peer rand", 16); 880 /* generate EDIV and rand now */ 934 memcpy(p, p_cb->rand, BT_OCTET8_LEN); 940 memcpy(&p[BT_OCTET8_LEN], p_cb->rand, BT_OCTET8_LE [all...] |
H A D | smp_utils.c | 476 ARRAY_TO_STREAM(p, p_cb->rand, BT_OCTET16_LEN); 1475 memset(ple_key.rand, 0, BT_OCTET8_LEN); 1507 p_na = p_cb->rand; 1515 p_nb = p_cb->rand;
|
/system/bt/test/suite/gatt/ |
H A D | gatt_unittest.cpp | 32 uuid->uu[i] = (uint8_t) (rand() % 256);
|
/system/extras/tests/ext4/ |
H A D | rand_emmc_perf.c | 126 if (lseek64(fd, (rand() % max_blocks) * TST_BLK_SIZE, SEEK_SET) < 0) { 156 if (lseek64(fd, (rand() % max_blocks) * TST_BLK_SIZE, SEEK_SET) < 0) {
|
/system/core/trusty/libtrusty/tipc-test/ |
H A D | tipc_test.c | 363 msg_len = rand() % msgsz; 427 msg_len = rand() % msgsz;
|
/system/core/gatekeeperd/ |
H A D | SoftGateKeeper.h | 22 #include <openssl/rand.h>
|
/system/core/libutils/ |
H A D | BlobCache.cpp | 292 return rand();
|
/system/gatekeeper/tests/ |
H A D | gatekeeper_messages_test.cpp | 42 buffer[i] = rand();
|