Searched refs:seed (Results 1 – 14 of 14) sorted by relevance
/system/core/libmemunreachable/ |
D | Leak.h | 32 std::size_t seed = 0; 34 hash_combine(seed, key.num_frames); 36 hash_combine(seed, key.frames[i]); 39 return seed; 44 inline void hash_combine(std::size_t& seed, const T& v) const { 46 seed ^= hasher(v) + 0x9e3779b9 + (seed << 6) + (seed >> 2);
|
/system/update_engine/update_manager/ |
D | prng.h | 31 explicit PRNG(uint32_t seed) : gen_(seed) {} in PRNG() argument
|
D | chromeos_policy.cc | 637 const uint64_t* seed = ec->GetValue(state->random_provider()->var_seed()); in NextUpdateCheckTime() local 638 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in NextUpdateCheckTime() 640 PRNG prng(*seed); in NextUpdateCheckTime() 870 const uint64_t* seed = ec->GetValue(state->random_provider()->var_seed()); in UpdateBackoffAndDownloadUrl() local 871 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in UpdateBackoffAndDownloadUrl() 872 PRNG prng(*seed); in UpdateBackoffAndDownloadUrl() 924 const uint64_t* seed = ec->GetValue(state->random_provider()->var_seed()); in UpdateScattering() local 925 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in UpdateScattering() 926 PRNG prng(*seed); in UpdateScattering()
|
/system/extras/mmap-perf/ |
D | mmapPerf.cpp | 37 uint64_t seed = (unsigned long long)rand() | ((unsigned long long)rand() << 32); in fillPageJunk() local 40 *target = seed ^ (uint64_t)(uintptr_t)target; in fillPageJunk() 41 seed = (seed << 1) | ((seed >> 63) & 1); in fillPageJunk()
|
/system/bt/test/suite/gatt/ |
D | gatt_unittest.cc | 29 static void create_random_uuid(bt_uuid_t* uuid, int seed) { in create_random_uuid() argument 30 srand(seed < 0 ? time(NULL) : seed); in create_random_uuid()
|
/system/extras/tests/ext4/ |
D | rand_emmc_perf.c | 192 unsigned int seed; in main() local 251 if (read(fd2, &seed, sizeof(seed)) != sizeof(seed)) { in main() 255 srand(seed); in main()
|
/system/extras/puncture_fs/ |
D | puncture_fs.c | 206 int seed = time(NULL); in main() local 216 seed = atoi(optarg); in main() 248 srandom(seed); in main() 249 fprintf(stderr, "\nRandom seed is: %d\n", seed); in main()
|
/system/extras/perfprofd/ |
D | perfprofdcore.cc | 817 unsigned seed = 0; in set_seed() local 823 seed = use_fixed_seed; in set_seed() 828 seed = arc4random(); in set_seed() 830 W_ALOGI("random seed set to %u", seed); in set_seed() 834 random_seed[0] = seed & 0xffff; in set_seed() 835 random_seed[1] = (seed >> 16); in set_seed()
|
/system/core/adb/ |
D | test_adb.py | 234 random.seed(0)
|
D | test_device.py | 1192 random.seed(0)
|
/system/extras/perfprofd/tests/ |
D | perfprofd_test.cc | 729 I: random seed set to 12345678 in TEST_F() 785 I: random seed set to 12345678 in TEST_F() 855 I: random seed set to 12345678 in TEST_F()
|
/system/tpm/trunks/generator/ |
D | raw_commands_fixed.txt | 1287 5) If the handle references a primary seed for a hierarchy (TPM_RH_ENDORSEMENT, 4289 The encryption key is derived from the symmetric seed in the sensitive area of the parent. 5721 …he key associated with keyHandle is used to recover a seed from secret, which is the encrypted see… 5722 The Name of the object associated with activateHandle and the recovered seed are used in a KDF to 5723 recover the symmetric key. The recovered seed (but not the Name) is used is used in a KDF to recover 5793 keyHandle algorithm-dependent encrypted seed that 6922 seed protected by the asymmetric algorithms of new 7197 and used to integrity check and decrypt inDuplicate. A new protection seed value is generated accor… 7274 seed for symmetric key 7275 needs oldParent private key to recover the seed and [all …]
|
D | raw_structures_fixed.txt | 15065 seed; for other objects, the obfuscation value 15119 …res are CFBencrypted using a key and Initialization Vector (IV) that are derived from a seed value.
|
D | raw_structures.txt | 15073 seed; for other objects, the obfuscation value 15127 …res are CFBencrypted using a key and Initialization Vector (IV) that are derived from a seed value.
|