/hardware/interfaces/rebootescrow/aidl/default/ |
D | HadamardUtilsTest.cpp | 31 if (random() % 100 < 47) { in AddError() 43 key.emplace_back(random() & 0xff); in TEST_F()
|
/hardware/interfaces/gatekeeper/1.0/software/ |
D | SoftGateKeeper.h | 81 virtual void GetRandom(void* random, uint32_t requested_length) const { in GetRandom() argument 82 if (random == NULL) return; in GetRandom() 83 RAND_pseudo_bytes((uint8_t*)random, requested_length); in GetRandom()
|
/hardware/interfaces/gatekeeper/aidl/software/ |
D | SoftGateKeeper.h | 89 virtual void GetRandom(void* random, uint32_t requested_length) const { in GetRandom() argument 90 if (random == NULL) return; in GetRandom() 91 RAND_pseudo_bytes((uint8_t*)random, requested_length); in GetRandom()
|
/hardware/google/aemu/base/include/aemu/base/testing/ |
D | TestTempDir.h | 202 int random = rand() % 1000000; in mkdtemp() local 204 snprintf(path_end - kSuffixLen, kSuffixLen + 1, "%0d", random); in mkdtemp()
|
/hardware/google/gfxstream/guest/mesa/src/util/tests/ |
D | fast_urem_by_const_test.cpp | 79 TEST(fast_urem_by_const, random) in TEST() argument
|
/hardware/google/gfxstream/host/apigen-codec-common/X11/ |
D | Xw32defs.h | 52 # define random rand macro
|
/hardware/invensense/6515/libsensors_iio/software/simple_apps/stress_iio/ |
D | README | 18 this set the enable and disable sequences to last a random time. It is good
|
/hardware/interfaces/biometrics/face/1.0/ |
D | IBiometricsFace.hal | 72 * Generates a unique and cryptographically secure random token used to 91 * unique and cryptographically secure random token. 186 * authenticator ID must be an entropy-encoded random number which all
|
/hardware/interfaces/security/authgraph/aidl/android/hardware/security/authgraph/ |
D | Arc.cddl | 31 ? -70004 : bstr .size 16, ; Nonce (a cryptographic random number of 16 bytes) used in key
|
/hardware/interfaces/gnss/1.0/ |
D | IGnssCallback.hal | 85 * Pseudo-random or satellite ID number for the satellite, a.k.a. Space Vehicle (SV), or
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 1296 if (key_size % 8 == 0 || random() % 10 == 0) { in TEST_P() 1327 if (min_mac_length % 8 == 0 || random() % 10 == 0) { in TEST_P() 2684 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P() 2687 corrupt_byte = static_cast<char>(random() % 256); in TEST_P() 2792 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P() 2795 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 44 * which is not exposed as an API but used internally: Random number generation. The random number 46 * random padding and other elements of secure protocols that require randomness. 303 * 8. T generates a random seed S. 374 * indistinguishable from random. Thus, if the entropy from any source is good, the output must 989 * random padding string at least eight bytes in length. The size of the RSA key has to be at 1036 * IKeymasterDevice implementation must generate a random IV or nonce and return it via 1041 * Tag::CALLER_NONCE is authorized, IKeymasterDevice must generate a random IV/nonce.
|
D | types.hal | 1268 * getHmacSharingParameters() is called. Probabilistic uniqueness (i.e. random) is acceptable,
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 855 if (key_size % 8 == 0 || random() % 10 == 0) { in TEST_P() 888 if (min_mac_length % 8 == 0 || random() % 10 == 0) { in TEST_P() 2515 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P() 2518 corrupt_byte = static_cast<char>(random() % 256); in TEST_P() 2626 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P() 2629 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
|
/hardware/google/gfxstream/third-party/glm/include/glm/gtc/ |
D | random.inl | 2 /// @file glm/gtc/random.inl
|
/hardware/interfaces/security/keymint/aidl/vts/functional/ |
D | KeyMintTest.cpp | 2751 if (key_size % 8 == 0 || random() % 10 == 0) { in TEST_P() 2794 if (min_mac_length % 8 == 0 || random() % 10 == 0) { in TEST_P() 5476 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P() 5479 corrupt_byte = static_cast<char>(random() % 256); in TEST_P() 5613 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P() 5616 corrupt_byte = static_cast<char>(random() % 256); in TEST_P() 5658 size_t offset_to_corrupt = random() % ciphertext.size(); in TEST_P() 5661 corrupt_byte = static_cast<char>(random() % 256); in TEST_P() 5793 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P() 5796 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
|
/hardware/interfaces/keymaster/3.0/ |
D | IKeymasterDevice.hal | 66 * predict (or control), then the RNG output is indistinguishable from random. Thus, if the
|
/hardware/google/gfxstream/codegen/vulkan/vulkan-docs-next/ |
D | BUILD.adoc | 480 random editing.
|
D | ChangeLog.adoc | 9950 * Fix random name markup issues (public pull request 603).
|
/hardware/google/gfxstream/codegen/vulkan/vulkan-docs-next/proposals/ |
D | VK_EXT_shader_tile_image.adoc | 475 …-defined meaning to an application. It does _not_ mean that the value is random nor that it could …
|
/hardware/google/gfxstream/guest/mesa/ |
D | meson.build | 1826 # up random libs with the generic name 'libversion'
|
/hardware/interfaces/neuralnetworks/1.2/ |
D | types.hal | 3855 * specifying seeds used to initialize the random distribution. If both
|
/hardware/interfaces/neuralnetworks/1.3/ |
D | types.hal | 4081 * specifying seeds used to initialize the random distribution. If both
|