/system/bt/service/common/bluetooth/ |
D | gatt_identifier.h | 122 std::size_t seed = 0; 124 hash_combine(seed, key.device_address_); 125 hash_combine(seed, key.is_primary_); 126 hash_combine(seed, key.service_uuid_); 127 hash_combine(seed, key.char_uuid_); 128 hash_combine(seed, key.desc_uuid_); 129 hash_combine(seed, key.service_instance_id_); 130 hash_combine(seed, key.char_instance_id_); 131 hash_combine(seed, key.desc_instance_id_); 133 return seed; [all …]
|
/system/core/libmemunreachable/ |
D | Leak.h | 32 std::size_t seed = 0; 34 hash_combine(seed, key.num_frames); 36 hash_combine(seed, key.frames[i]); 39 return seed; 44 inline void hash_combine(std::size_t& seed, const T& v) const { 46 seed ^= hasher(v) + 0x9e3779b9 + (seed << 6) + (seed >> 2);
|
/system/extras/mmap-perf/ |
D | mmapPerf.cpp | 37 uint64_t seed = (unsigned long long)rand() | ((unsigned long long)rand() << 32); in fillPageJunk() local 40 *target = seed ^ (uint64_t)(uintptr_t)target; in fillPageJunk() 41 seed = (seed << 1) | ((seed >> 63) & 1); in fillPageJunk()
|
/system/update_engine/update_manager/ |
D | prng.h | 31 explicit PRNG(uint32_t seed) : gen_(seed) {} in PRNG() argument
|
D | chromeos_policy.cc | 604 const uint64_t* seed = ec->GetValue(state->random_provider()->var_seed()); in NextUpdateCheckTime() local 605 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in NextUpdateCheckTime() 607 PRNG prng(*seed); in NextUpdateCheckTime() 837 const uint64_t* seed = ec->GetValue(state->random_provider()->var_seed()); in UpdateBackoffAndDownloadUrl() local 838 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in UpdateBackoffAndDownloadUrl() 839 PRNG prng(*seed); in UpdateBackoffAndDownloadUrl() 891 const uint64_t* seed = ec->GetValue(state->random_provider()->var_seed()); in UpdateScattering() local 892 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in UpdateScattering() 893 PRNG prng(*seed); in UpdateScattering()
|
/system/extras/tests/ext4/ |
D | rand_emmc_perf.c | 192 unsigned int seed; in main() local 250 if (read(fd2, &seed, sizeof(seed)) != sizeof(seed)) { in main() 254 srand(seed); in main()
|
/system/bt/test/suite/gatt/ |
D | gatt_unittest.cpp | 29 static void create_random_uuid(bt_uuid_t *uuid, int seed) { in create_random_uuid() argument 30 srand(seed < 0 ? time(NULL) : seed); in create_random_uuid()
|
/system/extras/puncture_fs/ |
D | puncture_fs.c | 202 int seed = time(NULL); in main() local 212 seed = atoi(optarg); in main() 244 srandom(seed); in main() 245 fprintf(stderr, "\nRandom seed is: %d\n", seed); in main()
|
/system/extras/perfprofd/ |
D | perfprofdcore.cc | 799 unsigned seed = 0; in set_seed() local 805 seed = use_fixed_seed; in set_seed() 810 seed = arc4random(); in set_seed() 812 W_ALOGI("random seed set to %u", seed); in set_seed() 816 random_seed[0] = seed & 0xffff; in set_seed() 817 random_seed[1] = (seed >> 16); in set_seed()
|
/system/core/adb/ |
D | test_adb.py | 212 random.seed(0)
|
D | test_device.py | 1082 random.seed(0)
|
/system/extras/perfprofd/tests/ |
D | perfprofd_test.cc | 612 I: random seed set to 12345678 in TEST_F() 668 I: random seed set to 12345678 in TEST_F()
|
/system/tpm/trunks/generator/ |
D | raw_commands_fixed.txt | 1287 5) If the handle references a primary seed for a hierarchy (TPM_RH_ENDORSEMENT, 4289 The encryption key is derived from the symmetric seed in the sensitive area of the parent. 5721 …he key associated with keyHandle is used to recover a seed from secret, which is the encrypted see… 5722 The Name of the object associated with activateHandle and the recovered seed are used in a KDF to 5723 recover the symmetric key. The recovered seed (but not the Name) is used is used in a KDF to recover 5793 keyHandle algorithm-dependent encrypted seed that 6922 seed protected by the asymmetric algorithms of new 7197 and used to integrity check and decrypt inDuplicate. A new protection seed value is generated accor… 7274 seed for symmetric key 7275 needs oldParent private key to recover the seed and [all …]
|
D | raw_commands.txt | 1287 5) If the handle references a primary seed for a hierarchy (TPM_RH_ENDORSEMENT, 4287 The encryption key is derived from the symmetric seed in the sensitive area of the parent. 5719 …he key associated with keyHandle is used to recover a seed from secret, which is the encrypted see… 5720 The Name of the object associated with activateHandle and the recovered seed are used in a KDF to 5721 recover the symmetric key. The recovered seed (but not the Name) is used is used in a KDF to recover 5791 keyHandle algorithm-dependent encrypted seed that 6916 seed protected by the asymmetric algorithms of new 7191 and used to integrity check and decrypt inDuplicate. A new protection seed value is generated accor… 7266 seed for symmetric key 7267 needs oldParent private key to recover the seed and [all …]
|
D | raw_structures.txt | 15073 seed; for other objects, the obfuscation value 15127 …res are CFBencrypted using a key and Initialization Vector (IV) that are derived from a seed value.
|
D | raw_structures_fixed.txt | 15065 seed; for other objects, the obfuscation value 15119 …res are CFBencrypted using a key and Initialization Vector (IV) that are derived from a seed value.
|