Home
last modified time | relevance | path

Searched refs:random (Results 1 – 23 of 23) sorted by relevance

/hardware/interfaces/rebootescrow/aidl/default/
DHadamardUtilsTest.cpp31 if (random() % 100 < 47) { in AddError()
43 key.emplace_back(random() & 0xff); in TEST_F()
/hardware/interfaces/gatekeeper/1.0/software/
DSoftGateKeeper.h81 virtual void GetRandom(void* random, uint32_t requested_length) const { in GetRandom() argument
82 if (random == NULL) return; in GetRandom()
83 RAND_pseudo_bytes((uint8_t*)random, requested_length); in GetRandom()
/hardware/interfaces/gatekeeper/aidl/software/
DSoftGateKeeper.h89 virtual void GetRandom(void* random, uint32_t requested_length) const { in GetRandom() argument
90 if (random == NULL) return; in GetRandom()
91 RAND_pseudo_bytes((uint8_t*)random, requested_length); in GetRandom()
/hardware/google/aemu/base/include/aemu/base/testing/
DTestTempDir.h202 int random = rand() % 1000000; in mkdtemp() local
204 snprintf(path_end - kSuffixLen, kSuffixLen + 1, "%0d", random); in mkdtemp()
/hardware/google/gfxstream/guest/mesa/src/util/tests/
Dfast_urem_by_const_test.cpp79 TEST(fast_urem_by_const, random) in TEST() argument
/hardware/google/gfxstream/host/apigen-codec-common/X11/
DXw32defs.h52 # define random rand macro
/hardware/invensense/6515/libsensors_iio/software/simple_apps/stress_iio/
DREADME18 this set the enable and disable sequences to last a random time. It is good
/hardware/interfaces/biometrics/face/1.0/
DIBiometricsFace.hal72 * Generates a unique and cryptographically secure random token used to
91 * unique and cryptographically secure random token.
186 * authenticator ID must be an entropy-encoded random number which all
/hardware/interfaces/security/authgraph/aidl/android/hardware/security/authgraph/
DArc.cddl31 ? -70004 : bstr .size 16, ; Nonce (a cryptographic random number of 16 bytes) used in key
/hardware/interfaces/gnss/1.0/
DIGnssCallback.hal85 * Pseudo-random or satellite ID number for the satellite, a.k.a. Space Vehicle (SV), or
/hardware/interfaces/keymaster/3.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp1296 if (key_size % 8 == 0 || random() % 10 == 0) { in TEST_P()
1327 if (min_mac_length % 8 == 0 || random() % 10 == 0) { in TEST_P()
2684 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P()
2687 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
2792 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P()
2795 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal44 * which is not exposed as an API but used internally: Random number generation. The random number
46 * random padding and other elements of secure protocols that require randomness.
303 * 8. T generates a random seed S.
374 * indistinguishable from random. Thus, if the entropy from any source is good, the output must
989 * random padding string at least eight bytes in length. The size of the RSA key has to be at
1036 * IKeymasterDevice implementation must generate a random IV or nonce and return it via
1041 * Tag::CALLER_NONCE is authorized, IKeymasterDevice must generate a random IV/nonce.
Dtypes.hal1268 * getHmacSharingParameters() is called. Probabilistic uniqueness (i.e. random) is acceptable,
/hardware/interfaces/keymaster/4.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp855 if (key_size % 8 == 0 || random() % 10 == 0) { in TEST_P()
888 if (min_mac_length % 8 == 0 || random() % 10 == 0) { in TEST_P()
2515 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P()
2518 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
2626 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P()
2629 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
/hardware/google/gfxstream/third-party/glm/include/glm/gtc/
Drandom.inl2 /// @file glm/gtc/random.inl
/hardware/interfaces/security/keymint/aidl/vts/functional/
DKeyMintTest.cpp2751 if (key_size % 8 == 0 || random() % 10 == 0) { in TEST_P()
2794 if (min_mac_length % 8 == 0 || random() % 10 == 0) { in TEST_P()
5476 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P()
5479 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
5613 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P()
5616 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
5658 size_t offset_to_corrupt = random() % ciphertext.size(); in TEST_P()
5661 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
5793 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P()
5796 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
/hardware/interfaces/keymaster/3.0/
DIKeymasterDevice.hal66 * predict (or control), then the RNG output is indistinguishable from random. Thus, if the
/hardware/google/gfxstream/codegen/vulkan/vulkan-docs-next/
DBUILD.adoc480 random editing.
DChangeLog.adoc9950 * Fix random name markup issues (public pull request 603).
/hardware/google/gfxstream/codegen/vulkan/vulkan-docs-next/proposals/
DVK_EXT_shader_tile_image.adoc475 …-defined meaning to an application. It does _not_ mean that the value is random nor that it could …
/hardware/google/gfxstream/guest/mesa/
Dmeson.build1826 # up random libs with the generic name 'libversion'
/hardware/interfaces/neuralnetworks/1.2/
Dtypes.hal3855 * specifying seeds used to initialize the random distribution. If both
/hardware/interfaces/neuralnetworks/1.3/
Dtypes.hal4081 * specifying seeds used to initialize the random distribution. If both