Home
last modified time | relevance | path

Searched refs:random (Results 1 – 12 of 12) sorted by relevance

/hardware/interfaces/gatekeeper/1.0/software/
DSoftGateKeeper.h81 virtual void GetRandom(void* random, uint32_t requested_length) const { in GetRandom() argument
82 if (random == NULL) return; in GetRandom()
83 RAND_pseudo_bytes((uint8_t*)random, requested_length); in GetRandom()
/hardware/invensense/6515/libsensors_iio/software/simple_apps/stress_iio/
DREADME18 this set the enable and disable sequences to last a random time. It is good
/hardware/interfaces/identity/aidl/default/
DWritableIdentityCredential.cpp43 optional<vector<uint8_t>> random = support::getRandom(16); in initialize() local
44 if (!random) { in initialize()
48 storageKey_ = random.value(); in initialize()
/hardware/interfaces/biometrics/face/1.0/
DIBiometricsFace.hal72 * Generates a unique and cryptographically secure random token used to
91 * unique and cryptographically secure random token.
186 * authenticator ID must be an entropy-encoded random number which all
/hardware/interfaces/gnss/1.0/
DIGnssCallback.hal79 * Pseudo-random or satellite ID number for the satellite, a.k.a. Space Vehicle (SV), or
/hardware/interfaces/keymaster/3.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp1296 if (key_size % 8 == 0 || random() % 10 == 0) { in TEST_P()
1327 if (min_mac_length % 8 == 0 || random() % 10 == 0) { in TEST_P()
2681 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P()
2684 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
2789 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P()
2792 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
/hardware/interfaces/keymaster/4.0/
DIKeymasterDevice.hal44 * which is not exposed as an API but used internally: Random number generation. The random number
46 * random padding and other elements of secure protocols that require randomness.
303 * 8. T generates a random seed S.
374 * indistinguishable from random. Thus, if the entropy from any source is good, the output must
989 * random padding string at least eight bytes in length. The size of the RSA key has to be at
1036 * IKeymasterDevice implementation must generate a random IV or nonce and return it via
1041 * Tag::CALLER_NONCE is authorized, IKeymasterDevice must generate a random IV/nonce.
Dtypes.hal1268 * getHmacSharingParameters() is called. Probabilistic uniqueness (i.e. random) is acceptable,
/hardware/interfaces/keymaster/4.0/vts/functional/
Dkeymaster_hidl_hal_test.cpp762 if (key_size % 8 == 0 || random() % 10 == 0) { in TEST_P()
795 if (min_mac_length % 8 == 0 || random() % 10 == 0) { in TEST_P()
2387 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P()
2390 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
2497 size_t offset_to_corrupt = random() % ciphertext1.size(); in TEST_P()
2500 corrupt_byte = static_cast<char>(random() % 256); in TEST_P()
/hardware/interfaces/keymaster/3.0/
DIKeymasterDevice.hal65 * predict (or control), then the RNG output is indistinguishable from random. Thus, if the
/hardware/interfaces/neuralnetworks/1.2/
Dtypes.hal3853 * specifying seeds used to initialize the random distribution. If both
/hardware/interfaces/neuralnetworks/1.3/
Dtypes.hal4077 * specifying seeds used to initialize the random distribution. If both