Searched refs:random (Results 1 – 12 of 12) sorted by relevance
/hardware/interfaces/gatekeeper/1.0/software/ |
D | SoftGateKeeper.h | 81 virtual void GetRandom(void* random, uint32_t requested_length) const { in GetRandom() argument 82 if (random == NULL) return; in GetRandom() 83 RAND_pseudo_bytes((uint8_t*)random, requested_length); in GetRandom()
|
/hardware/invensense/6515/libsensors_iio/software/simple_apps/stress_iio/ |
D | README | 18 this set the enable and disable sequences to last a random time. It is good
|
/hardware/interfaces/identity/aidl/default/ |
D | WritableIdentityCredential.cpp | 43 optional<vector<uint8_t>> random = support::getRandom(16); in initialize() local 44 if (!random) { in initialize() 48 storageKey_ = random.value(); in initialize()
|
/hardware/interfaces/biometrics/face/1.0/ |
D | IBiometricsFace.hal | 72 * Generates a unique and cryptographically secure random token used to 91 * unique and cryptographically secure random token. 186 * authenticator ID must be an entropy-encoded random number which all
|
/hardware/interfaces/gnss/1.0/ |
D | IGnssCallback.hal | 79 * Pseudo-random or satellite ID number for the satellite, a.k.a. Space Vehicle (SV), or
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 1296 if (key_size % 8 == 0 || random() % 10 == 0) { in TEST_P() 1327 if (min_mac_length % 8 == 0 || random() % 10 == 0) { in TEST_P() 2681 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P() 2684 corrupt_byte = static_cast<char>(random() % 256); in TEST_P() 2789 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P() 2792 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 44 * which is not exposed as an API but used internally: Random number generation. The random number 46 * random padding and other elements of secure protocols that require randomness. 303 * 8. T generates a random seed S. 374 * indistinguishable from random. Thus, if the entropy from any source is good, the output must 989 * random padding string at least eight bytes in length. The size of the RSA key has to be at 1036 * IKeymasterDevice implementation must generate a random IV or nonce and return it via 1041 * Tag::CALLER_NONCE is authorized, IKeymasterDevice must generate a random IV/nonce.
|
D | types.hal | 1268 * getHmacSharingParameters() is called. Probabilistic uniqueness (i.e. random) is acceptable,
|
/hardware/interfaces/keymaster/4.0/vts/functional/ |
D | keymaster_hidl_hal_test.cpp | 762 if (key_size % 8 == 0 || random() % 10 == 0) { in TEST_P() 795 if (min_mac_length % 8 == 0 || random() % 10 == 0) { in TEST_P() 2387 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P() 2390 corrupt_byte = static_cast<char>(random() % 256); in TEST_P() 2497 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P() 2500 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
|
/hardware/interfaces/keymaster/3.0/ |
D | IKeymasterDevice.hal | 65 * predict (or control), then the RNG output is indistinguishable from random. Thus, if the
|
/hardware/interfaces/neuralnetworks/1.2/ |
D | types.hal | 3853 * specifying seeds used to initialize the random distribution. If both
|
/hardware/interfaces/neuralnetworks/1.3/ |
D | types.hal | 4077 * specifying seeds used to initialize the random distribution. If both
|