/system/core/libmemunreachable/ |
D | Leak.h | 32 std::size_t seed = 0; 34 hash_combine(seed, key.num_frames); 36 hash_combine(seed, key.frames[i]); 39 return seed; 44 inline void hash_combine(std::size_t& seed, const T& v) const { 46 seed ^= hasher(v) + 0x9e3779b9 + (seed << 6) + (seed >> 2);
|
/system/update_engine/update_manager/ |
D | prng.h | 31 explicit PRNG(uint32_t seed) : gen_(seed) {} in PRNG() argument
|
D | next_update_check_policy_impl.cc | 78 const auto* seed = ec->GetValue(state->random_provider()->var_seed()); in NextUpdateCheckTime() local 79 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in NextUpdateCheckTime() 81 PRNG prng(*seed); in NextUpdateCheckTime()
|
D | chromeos_policy.cc | 755 const uint64_t* seed = ec->GetValue(state->random_provider()->var_seed()); in UpdateBackoffAndDownloadUrl() local 756 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in UpdateBackoffAndDownloadUrl() 757 PRNG prng(*seed); in UpdateBackoffAndDownloadUrl() 811 const uint64_t* seed = ec->GetValue(state->random_provider()->var_seed()); in UpdateScattering() local 812 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in UpdateScattering() 813 PRNG prng(*seed); in UpdateScattering()
|
/system/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.cpp | 82 saved_params_.seed = {}; in GetHmacSharingParameters() 86 params->seed = saved_params_.seed; in GetHmacSharingParameters() 141 return a.seed == b.seed && !memcmp(a.nonce, b.nonce, sizeof(a.nonce)); in operator ==() 156 *context_chunks_pos++ = params.seed; in ComputeSharedHmac()
|
/system/extras/mmap-perf/ |
D | mmapPerf.cpp | 38 uint64_t seed = (unsigned long long)rand() | ((unsigned long long)rand() << 32); in fillPageJunk() local 41 *target = seed ^ (uint64_t)(uintptr_t)target; in fillPageJunk() 42 seed = (seed << 1) | ((seed >> 63) & 1); in fillPageJunk()
|
/system/extras/tests/ext4/ |
D | rand_emmc_perf.c | 192 unsigned int seed; in main() local 251 if (read(fd2, &seed, sizeof(seed)) != sizeof(seed)) { in main() 255 srand(seed); in main()
|
/system/extras/puncture_fs/ |
D | puncture_fs.c | 206 int seed = time(NULL); in main() local 216 seed = atoi(optarg); in main() 248 srandom(seed); in main() 249 fprintf(stderr, "\nRandom seed is: %d\n", seed); in main()
|
/system/extras/perfprofd/ |
D | perfprofdcore.cc | 596 unsigned seed = 0; in set_seed() local 601 seed = use_fixed_seed; in set_seed() 607 seed = arc4random(); in set_seed() 609 seed = 12345678u; in set_seed() 612 LOG(INFO) << "random seed set to " << seed; in set_seed() 616 random_seed[0] = seed & 0xffff; in set_seed() 617 random_seed[1] = (seed >> 16); in set_seed()
|
D | perfprofd_config.proto | 22 // Use the specified fixed seed for random number generation (unit
|
/system/chre/apps/wifi_offload/test/ |
D | random_generator.cc | 40 random_engine_.seed(initial_seed_); in Reset()
|
/system/apex/apexd/ |
D | apex_database.cpp | 54 inline size_t hash_combine(size_t seed, size_t val) { in hash_combine() argument 55 return seed ^ (val + 0x9e3779b9 + (seed << 6) + (seed >> 2)); in hash_combine()
|
/system/keymaster/ng/ |
D | AndroidKeymaster4Device.cpp | 234 params.seed.setToExternal(const_cast<uint8_t*>(response.params.seed.data), in getHmacSharingParameters() 235 response.params.seed.data_length); in getHmacSharingParameters() 249 request.params_array.params_array[i].seed = {params[i].seed.data(), params[i].seed.size()}; in computeSharedHmac()
|
/system/keymaster/include/keymaster/ |
D | android_keymaster_messages.h | 692 HmacSharingParameters() : seed({}) { memset(nonce, 0, sizeof(nonce)); } in HmacSharingParameters() 694 seed = move(other.seed); in HmacSharingParameters() 698 void SetSeed(KeymasterBlob&& value) { seed = move(value); } in SetSeed() 704 KeymasterBlob seed{};
|
/system/extras/perfprofd/tests/ |
D | perfprofd_test.cc | 1340 I: random seed set to 12345678 in TEST_F() 1428 I: random seed set to 12345678 in TEST_F() 1449 I: random seed set to 12345678 in TEST_F() 1493 I: random seed set to 12345678 in TEST_F() 1559 I: random seed set to 12345678 in TEST_F() 1630 I: random seed set to 12345678 in TEST_F()
|
/system/keymaster/android_keymaster/ |
D | android_keymaster_messages.cpp | 583 return blob_size(seed) + sizeof(nonce); in SerializedSize() 587 buf = serialize_blob(seed, buf, end); in Serialize() 592 return deserialize_blob(&seed, buf_ptr, end) && in Deserialize()
|
/system/update_engine/payload_consumer/ |
D | delta_performer_unittest.cc | 897 unsigned int seed = time(nullptr); in TEST_F() local 903 uint64_t manifest_size = rand_r(&seed) % 256; in TEST_F() 907 uint32_t metadata_signature_size = rand_r(&seed) % 256; in TEST_F()
|
/system/core/adb/ |
D | test_adb.py | 556 random.seed(0)
|
D | test_device.py | 1598 random.seed(0)
|
/system/keymaster/tests/ |
D | android_keymaster_test.cpp | 4362 ASSERT_EQ(ToByteString(paramsVec[0].seed), ToByteString(paramsVec[1].seed)) in TEST_F() 4469 finally([&]() { params[param_to_tweak].seed.data = nullptr; }); in TEST_F()
|