/external/webkit/Source/WebCore/svg/ |
H A D | SVGFETurbulenceElement.h | 61 DECLARE_ANIMATED_NUMBER(Seed, seed)
|
H A D | SVGFETurbulenceElement.cpp | 36 DEFINE_ANIMATED_NUMBER(SVGFETurbulenceElement, SVGNames::seedAttr, Seed, seed) 102 return turbulence->setSeed(seed()); 173 baseFrequencyY(), numOctaves(), seed(), stitchTiles() == SVG_STITCHTYPE_STITCH);
|
/external/dbus/test/ |
H A D | break-loader.c | 169 exit (1); /* so we can see the seed that was printed out */ 641 unsigned int seed; local 645 seed = 0; 661 seed = * (unsigned int*) s; 668 fprintf (stderr, "could not open/read /dev/urandom, using current time for seed\n"); 672 seed = tv_usec; 678 return seed; 708 unsigned int seed; local 712 seed = get_random_seed (); 719 if (!_dbus_string_append_uint (&failure_dir, seed)) [all...] |
/external/openssh/openbsd-compat/ |
H A D | openssl-compat.c | 107 DSA_generate_parameters_ex(DSA *dsa, int bits, const unsigned char *seed, argument 114 new_dsa = DSA_generate_parameters(bits, (unsigned char *)seed, seed_len,
|
/external/chromium/net/disk_cache/ |
H A D | disk_cache_perftest.cc | 149 int seed = static_cast<int>(Time::Now().ToInternalValue()); local 150 srand(seed); 176 int seed = static_cast<int>(Time::Now().ToInternalValue()); local 177 srand(seed); 227 int seed = static_cast<int>(Time::Now().ToInternalValue()); local 228 srand(seed);
|
/external/openssl/crypto/dsa/ |
H A D | dsatest.c | 96 /* seed, out_p, out_q, out_g are taken from the updated Appendix 5 to 98 static unsigned char seed[20]={ variable 161 seed, 20, &counter, &h, &cb)) 164 BIO_printf(bio_err,"seed\n"); 168 seed[i],seed[i+1],seed[i+2],seed[i+3]);
|
/external/guava/guava-tests/test/com/google/common/collect/ |
H A D | MinMaxPriorityQueueTest.java | 547 long seed = new Random().nextLong(); 548 Random random = new Random(seed); 558 assertTrue("Modification " + i + " of seed " + seed, mmHeap.isIntact()); 560 assertTrue("Modification " + i + " of seed " + seed, mmHeap.isIntact()); 584 long seed = insertRandomly(elements, q); 588 assertEquals("Using seed " + seed, expected, elements); 599 long seed [all...] |
/external/openssl/crypto/ec/ |
H A D | ec_lib.c | 110 ret->seed = NULL; 137 if (group->seed) 138 OPENSSL_free(group->seed); 160 if (group->seed) 162 OPENSSL_cleanse(group->seed, group->seed_len); 163 OPENSSL_free(group->seed); 226 if (src->seed) 228 if (dest->seed) 229 OPENSSL_free(dest->seed); 230 dest->seed [all...] |
/external/webkit/Source/WebKit/chromium/tests/ |
H A D | PODIntervalTreeTest.cpp | 220 void InsertionAndDeletionTest(int32_t seed, int treeSize) argument 222 initRandom(seed); 245 ASSERT_TRUE(tree.contains(addedElements[index])) << "Test failed for seed " << seed; 249 ASSERT_TRUE(tree.checkInvariants()) << "Test failed for seed " << seed; 273 ASSERT_TRUE(tree.contains(addedElements[index])) << "Test failed for seed " << seed; 274 ASSERT_TRUE(tree.remove(addedElements[index])) << "Test failed for seed " << seed; [all...] |
H A D | PODRedBlackTreeTest.cpp | 173 void InsertionAndDeletionTest(const int32_t seed, const int treeSize) argument 175 initRandom(seed); 183 ASSERT_TRUE(tree.checkInvariants()) << "Test failed for seed " << seed; 193 ASSERT_TRUE(tree.checkInvariants()) << "Test failed for seed " << seed; 198 ASSERT_TRUE(tree.checkInvariants()) << "Test failed for seed " << seed;
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.c | 53 u8 seed[2 * TLS_RANDOM_LEN]; local 61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 62 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 66 "master secret", seed, 2 * TLS_RANDOM_LEN, 76 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 83 "key expansion", seed, 2 * TLS_RANDOM_LEN, 511 * @server_random_first: seed is 0 = client_random|server_random, 520 u8 seed[2 * TLS_RANDOM_LEN]; local 526 os_memcpy(seed, con [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client.c | 53 u8 seed[2 * TLS_RANDOM_LEN]; local 61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 62 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 66 "master secret", seed, 2 * TLS_RANDOM_LEN, 76 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 83 "key expansion", seed, 2 * TLS_RANDOM_LEN, 511 * @server_random_first: seed is 0 = client_random|server_random, 520 u8 seed[2 * TLS_RANDOM_LEN]; local 526 os_memcpy(seed, con [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client.c | 53 u8 seed[2 * TLS_RANDOM_LEN]; local 61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 62 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 66 "master secret", seed, 2 * TLS_RANDOM_LEN, 76 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 83 "key expansion", seed, 2 * TLS_RANDOM_LEN, 511 * @server_random_first: seed is 0 = client_random|server_random, 520 u8 seed[2 * TLS_RANDOM_LEN]; local 526 os_memcpy(seed, con [all...] |
/external/webp/src/enc/ |
H A D | histogram.c | 243 static uint32_t MyRand(uint32_t *seed) { argument 244 *seed *= 16807U; 245 if (*seed == 0) { 246 *seed = 1; 248 return *seed; 255 uint32_t seed = 0; local 278 seed += iter; 282 const uint32_t idx1 = MyRand(&seed) % out_size; 284 const uint32_t diff = (tmp < 3) ? tmp : MyRand(&seed) % (out_size - 1);
|
/external/antlr/antlr-3.4/tool/src/main/java/org/antlr/tool/ |
H A D | RandomPhrase.java | 47 * java org.antlr.tool.RandomPhrase grammarFile.g startRule [seed] 52 * The seed acts like a unique identifier so you can get the same random 55 * If you do not specify a seed then the current time in milliseconds is used 56 * guaranteeing that you'll never see that seed again. 147 long seed = System.currentTimeMillis(); // use random seed unless spec. 150 seed = Long.parseLong(seedStr); 153 random = new Random(seed); 221 System.err.println("Error walking "+grammarFileName+" rule "+startRule+" seed "+seed); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/ |
H A D | OAEPEncoding.java | 167 // generate the seed. 169 byte[] seed = new byte[defHash.length]; 171 random.nextBytes(seed); 176 byte[] mask = maskGeneratorFunction1(seed, 0, seed.length, block.length - defHash.length); 184 // add in the seed 186 System.arraycopy(seed, 0, block, 0, defHash.length); 189 // mask the seed. 237 // unmask the seed.
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_fast_common.c | 79 u8 seed[2 * TLS_RANDOM_LEN]; local 91 os_memcpy(seed, server_random, TLS_RANDOM_LEN); 92 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 95 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN);
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_fast_common.c | 73 u8 seed[2 * TLS_RANDOM_LEN]; local 85 os_memcpy(seed, server_random, TLS_RANDOM_LEN); 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN);
|
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_fast_common.c | 73 u8 seed[2 * TLS_RANDOM_LEN]; local 85 os_memcpy(seed, server_random, TLS_RANDOM_LEN); 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN);
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_fast_common.c | 73 u8 seed[2 * TLS_RANDOM_LEN]; local 85 os_memcpy(seed, server_random, TLS_RANDOM_LEN); 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN);
|
/external/libxml2/ |
H A D | dict.c | 71 xmlDictComputeFastKey(name, len, (dict)->seed) : \ 72 xmlDictComputeBigKey(name, len, (dict)->seed)) 78 xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed) : \ 79 xmlDictComputeBigQKey(prefix, plen, name, len, (dict)->seed))) 83 xmlDictComputeFastKey(name, len, (dict)->seed) 85 xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed) 124 int seed; member in struct:_xmlDict 307 xmlDictComputeBigKey(const xmlChar* data, int namelen, int seed) { argument 313 hash = seed; 340 const xmlChar *name, int len, int seed) 339 xmlDictComputeBigQKey(const xmlChar *prefix, int plen, const xmlChar *name, int len, int seed) argument 376 xmlDictComputeFastKey(const xmlChar *name, int namelen, int seed) argument 410 xmlDictComputeFastQKey(const xmlChar *prefix, int plen, const xmlChar *name, int len, int seed) argument [all...] |
/external/opencv/cvaux/src/ |
H A D | cvsegment.cpp | 86 CvSize /*roi*/, CvPoint seed, 91 uchar* img = pImage + step * seed.y; 92 uchar* mask = pMask + maskStep * (seed.y + 1); 99 int XMin, XMax, YMin = seed.y, YMax = seed.y; 102 L = R = seed.x; 103 img = pImage + seed.y*step; 104 mask = pMask + seed.y*maskStep; 107 val0[0] = img[seed.x*3]; 108 val0[1] = img[seed 84 icvSegmFloodFill_Stage1( uchar* pImage, int step, uchar* pMask, int maskStep, CvSize , CvPoint seed, int* newVal, int d_lw, int d_up, CvConnectedComp * region, void *pStack ) argument [all...] |
/external/openssl/crypto/rand/ |
H A D | rand_lib.c | 149 if (meth && meth->seed) 150 meth->seed(buf,num); 190 /* Entropy gatherer: use standard OpenSSL PRNG to seed (this will gather 244 RAND_SSLeay()->seed(in, inlen);
|
/external/dnsmasq/src/ |
H A D | util.c | 48 static uint32 seed[32]; variable 57 !read_write(fd, (unsigned char *)&seed, sizeof(seed), 1) || 59 die(_("failed to seed the random number generator: %s"), NULL, EC_MISC); 65 #define MUSH(i,b) x = t[i] += (((x ^ seed[i]) + sum) ^ ROTATE(x,b)); 72 for (i = 0;i < 12;++i) t[i] = in[i] ^ seed[12 + i]; 73 for (i = 0;i < 8;++i) out[i] = seed[24 + i];
|
/external/openfst/src/include/fst/ |
H A D | randequivalent.h | 119 // of length no more than 'path_length' using the seed 'seed' in these FSTs. 124 int seed = time(0), int path_length = INT_MAX, 126 UniformArcSelector<Arc> uniform_selector(seed);
|