Searched refs:seed (Results 126 - 150 of 301) sorted by relevance

1234567891011>>

/external/webkit/Source/WebCore/svg/
H A DSVGFETurbulenceElement.h61 DECLARE_ANIMATED_NUMBER(Seed, seed)
H A DSVGFETurbulenceElement.cpp36 DEFINE_ANIMATED_NUMBER(SVGFETurbulenceElement, SVGNames::seedAttr, Seed, seed)
102 return turbulence->setSeed(seed());
173 baseFrequencyY(), numOctaves(), seed(), stitchTiles() == SVG_STITCHTYPE_STITCH);
/external/dbus/test/
H A Dbreak-loader.c169 exit (1); /* so we can see the seed that was printed out */
641 unsigned int seed; local
645 seed = 0;
661 seed = * (unsigned int*) s;
668 fprintf (stderr, "could not open/read /dev/urandom, using current time for seed\n");
672 seed = tv_usec;
678 return seed;
708 unsigned int seed; local
712 seed = get_random_seed ();
719 if (!_dbus_string_append_uint (&failure_dir, seed))
[all...]
/external/openssh/openbsd-compat/
H A Dopenssl-compat.c107 DSA_generate_parameters_ex(DSA *dsa, int bits, const unsigned char *seed, argument
114 new_dsa = DSA_generate_parameters(bits, (unsigned char *)seed, seed_len,
/external/chromium/net/disk_cache/
H A Ddisk_cache_perftest.cc149 int seed = static_cast<int>(Time::Now().ToInternalValue()); local
150 srand(seed);
176 int seed = static_cast<int>(Time::Now().ToInternalValue()); local
177 srand(seed);
227 int seed = static_cast<int>(Time::Now().ToInternalValue()); local
228 srand(seed);
/external/openssl/crypto/dsa/
H A Ddsatest.c96 /* seed, out_p, out_q, out_g are taken from the updated Appendix 5 to
98 static unsigned char seed[20]={ variable
161 seed, 20, &counter, &h, &cb))
164 BIO_printf(bio_err,"seed\n");
168 seed[i],seed[i+1],seed[i+2],seed[i+3]);
/external/guava/guava-tests/test/com/google/common/collect/
H A DMinMaxPriorityQueueTest.java547 long seed = new Random().nextLong();
548 Random random = new Random(seed);
558 assertTrue("Modification " + i + " of seed " + seed, mmHeap.isIntact());
560 assertTrue("Modification " + i + " of seed " + seed, mmHeap.isIntact());
584 long seed = insertRandomly(elements, q);
588 assertEquals("Using seed " + seed, expected, elements);
599 long seed
[all...]
/external/openssl/crypto/ec/
H A Dec_lib.c110 ret->seed = NULL;
137 if (group->seed)
138 OPENSSL_free(group->seed);
160 if (group->seed)
162 OPENSSL_cleanse(group->seed, group->seed_len);
163 OPENSSL_free(group->seed);
226 if (src->seed)
228 if (dest->seed)
229 OPENSSL_free(dest->seed);
230 dest->seed
[all...]
/external/webkit/Source/WebKit/chromium/tests/
H A DPODIntervalTreeTest.cpp220 void InsertionAndDeletionTest(int32_t seed, int treeSize) argument
222 initRandom(seed);
245 ASSERT_TRUE(tree.contains(addedElements[index])) << "Test failed for seed " << seed;
249 ASSERT_TRUE(tree.checkInvariants()) << "Test failed for seed " << seed;
273 ASSERT_TRUE(tree.contains(addedElements[index])) << "Test failed for seed " << seed;
274 ASSERT_TRUE(tree.remove(addedElements[index])) << "Test failed for seed " << seed;
[all...]
H A DPODRedBlackTreeTest.cpp173 void InsertionAndDeletionTest(const int32_t seed, const int treeSize) argument
175 initRandom(seed);
183 ASSERT_TRUE(tree.checkInvariants()) << "Test failed for seed " << seed;
193 ASSERT_TRUE(tree.checkInvariants()) << "Test failed for seed " << seed;
198 ASSERT_TRUE(tree.checkInvariants()) << "Test failed for seed " << seed;
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.c53 u8 seed[2 * TLS_RANDOM_LEN]; local
61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
62 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
66 "master secret", seed, 2 * TLS_RANDOM_LEN,
76 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
83 "key expansion", seed, 2 * TLS_RANDOM_LEN,
511 * @server_random_first: seed is 0 = client_random|server_random,
520 u8 seed[2 * TLS_RANDOM_LEN]; local
526 os_memcpy(seed, con
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client.c53 u8 seed[2 * TLS_RANDOM_LEN]; local
61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
62 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
66 "master secret", seed, 2 * TLS_RANDOM_LEN,
76 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
83 "key expansion", seed, 2 * TLS_RANDOM_LEN,
511 * @server_random_first: seed is 0 = client_random|server_random,
520 u8 seed[2 * TLS_RANDOM_LEN]; local
526 os_memcpy(seed, con
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client.c53 u8 seed[2 * TLS_RANDOM_LEN]; local
61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN);
62 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random,
66 "master secret", seed, 2 * TLS_RANDOM_LEN,
76 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN);
77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN);
83 "key expansion", seed, 2 * TLS_RANDOM_LEN,
511 * @server_random_first: seed is 0 = client_random|server_random,
520 u8 seed[2 * TLS_RANDOM_LEN]; local
526 os_memcpy(seed, con
[all...]
/external/webp/src/enc/
H A Dhistogram.c243 static uint32_t MyRand(uint32_t *seed) { argument
244 *seed *= 16807U;
245 if (*seed == 0) {
246 *seed = 1;
248 return *seed;
255 uint32_t seed = 0; local
278 seed += iter;
282 const uint32_t idx1 = MyRand(&seed) % out_size;
284 const uint32_t diff = (tmp < 3) ? tmp : MyRand(&seed) % (out_size - 1);
/external/antlr/antlr-3.4/tool/src/main/java/org/antlr/tool/
H A DRandomPhrase.java47 * java org.antlr.tool.RandomPhrase grammarFile.g startRule [seed]
52 * The seed acts like a unique identifier so you can get the same random
55 * If you do not specify a seed then the current time in milliseconds is used
56 * guaranteeing that you'll never see that seed again.
147 long seed = System.currentTimeMillis(); // use random seed unless spec.
150 seed = Long.parseLong(seedStr);
153 random = new Random(seed);
221 System.err.println("Error walking "+grammarFileName+" rule "+startRule+" seed "+seed);
[all...]
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/
H A DOAEPEncoding.java167 // generate the seed.
169 byte[] seed = new byte[defHash.length];
171 random.nextBytes(seed);
176 byte[] mask = maskGeneratorFunction1(seed, 0, seed.length, block.length - defHash.length);
184 // add in the seed
186 System.arraycopy(seed, 0, block, 0, defHash.length);
189 // mask the seed.
237 // unmask the seed.
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/
H A Deap_fast_common.c79 u8 seed[2 * TLS_RANDOM_LEN]; local
91 os_memcpy(seed, server_random, TLS_RANDOM_LEN);
92 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
95 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN);
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_fast_common.c73 u8 seed[2 * TLS_RANDOM_LEN]; local
85 os_memcpy(seed, server_random, TLS_RANDOM_LEN);
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN);
/external/wpa_supplicant_8/src/eap_common/
H A Deap_fast_common.c73 u8 seed[2 * TLS_RANDOM_LEN]; local
85 os_memcpy(seed, server_random, TLS_RANDOM_LEN);
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN);
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_fast_common.c73 u8 seed[2 * TLS_RANDOM_LEN]; local
85 os_memcpy(seed, server_random, TLS_RANDOM_LEN);
86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN);
89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN);
/external/libxml2/
H A Ddict.c71 xmlDictComputeFastKey(name, len, (dict)->seed) : \
72 xmlDictComputeBigKey(name, len, (dict)->seed))
78 xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed) : \
79 xmlDictComputeBigQKey(prefix, plen, name, len, (dict)->seed)))
83 xmlDictComputeFastKey(name, len, (dict)->seed)
85 xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed)
124 int seed; member in struct:_xmlDict
307 xmlDictComputeBigKey(const xmlChar* data, int namelen, int seed) { argument
313 hash = seed;
340 const xmlChar *name, int len, int seed)
339 xmlDictComputeBigQKey(const xmlChar *prefix, int plen, const xmlChar *name, int len, int seed) argument
376 xmlDictComputeFastKey(const xmlChar *name, int namelen, int seed) argument
410 xmlDictComputeFastQKey(const xmlChar *prefix, int plen, const xmlChar *name, int len, int seed) argument
[all...]
/external/opencv/cvaux/src/
H A Dcvsegment.cpp86 CvSize /*roi*/, CvPoint seed,
91 uchar* img = pImage + step * seed.y;
92 uchar* mask = pMask + maskStep * (seed.y + 1);
99 int XMin, XMax, YMin = seed.y, YMax = seed.y;
102 L = R = seed.x;
103 img = pImage + seed.y*step;
104 mask = pMask + seed.y*maskStep;
107 val0[0] = img[seed.x*3];
108 val0[1] = img[seed
84 icvSegmFloodFill_Stage1( uchar* pImage, int step, uchar* pMask, int maskStep, CvSize , CvPoint seed, int* newVal, int d_lw, int d_up, CvConnectedComp * region, void *pStack ) argument
[all...]
/external/openssl/crypto/rand/
H A Drand_lib.c149 if (meth && meth->seed)
150 meth->seed(buf,num);
190 /* Entropy gatherer: use standard OpenSSL PRNG to seed (this will gather
244 RAND_SSLeay()->seed(in, inlen);
/external/dnsmasq/src/
H A Dutil.c48 static uint32 seed[32]; variable
57 !read_write(fd, (unsigned char *)&seed, sizeof(seed), 1) ||
59 die(_("failed to seed the random number generator: %s"), NULL, EC_MISC);
65 #define MUSH(i,b) x = t[i] += (((x ^ seed[i]) + sum) ^ ROTATE(x,b));
72 for (i = 0;i < 12;++i) t[i] = in[i] ^ seed[12 + i];
73 for (i = 0;i < 8;++i) out[i] = seed[24 + i];
/external/openfst/src/include/fst/
H A Drandequivalent.h119 // of length no more than 'path_length' using the seed 'seed' in these FSTs.
124 int seed = time(0), int path_length = INT_MAX,
126 UniformArcSelector<Arc> uniform_selector(seed);

Completed in 482 milliseconds

1234567891011>>