/system/memory/libmemunreachable/ |
D | Leak.h | 32 std::size_t seed = 0; 34 hash_combine(seed, key.num_frames); 36 hash_combine(seed, key.frames[i]); 39 return seed; 44 inline void hash_combine(std::size_t& seed, const T& v) const { 46 seed ^= hasher(v) + 0x9e3779b9 + (seed << 6) + (seed >> 2);
|
/system/update_engine/update_manager/ |
D | prng.h | 31 explicit PRNG(uint32_t seed) : gen_(seed) {} in PRNG() argument
|
D | next_update_check_policy_impl.cc | 78 const auto* seed = ec->GetValue(state->random_provider()->var_seed()); in NextUpdateCheckTime() local 79 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in NextUpdateCheckTime() 81 PRNG prng(*seed); in NextUpdateCheckTime()
|
D | chromeos_policy.cc | 762 const uint64_t* seed = ec->GetValue(state->random_provider()->var_seed()); in UpdateBackoffAndDownloadUrl() local 763 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in UpdateBackoffAndDownloadUrl() 764 PRNG prng(*seed); in UpdateBackoffAndDownloadUrl() 818 const uint64_t* seed = ec->GetValue(state->random_provider()->var_seed()); in UpdateScattering() local 819 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in UpdateScattering() 820 PRNG prng(*seed); in UpdateScattering()
|
/system/keymaster/km_openssl/ |
D | soft_keymaster_enforcement.cpp | 82 saved_params_.seed = {}; in GetHmacSharingParameters() 86 params->seed = saved_params_.seed; in GetHmacSharingParameters() 141 return a.seed == b.seed && !memcmp(a.nonce, b.nonce, sizeof(a.nonce)); in operator ==() 156 *context_chunks_pos++ = params.seed; in ComputeSharedHmac()
|
/system/core/adb/fastdeploy/deploypatchgenerator/ |
D | deploy_patch_generator.cpp | 212 size_t seed = 0; in BuildIdenticalEntries() local 213 seed ^= hasher(digest.first) + 0x9e3779b9 + (seed << 6) + (seed >> 2); in BuildIdenticalEntries() 214 seed ^= hasher(digest.second) + 0x9e3779b9 + (seed << 6) + (seed >> 2); in BuildIdenticalEntries() 215 return seed; in BuildIdenticalEntries()
|
/system/extras/mmap-perf/ |
D | mmapPerf.cpp | 38 uint64_t seed = (unsigned long long)rand() | ((unsigned long long)rand() << 32); in fillPageJunk() local 41 *target = seed ^ (uint64_t)(uintptr_t)target; in fillPageJunk() 42 seed = (seed << 1) | ((seed >> 63) & 1); in fillPageJunk()
|
/system/extras/tests/ext4/ |
D | rand_emmc_perf.c | 192 unsigned int seed; in main() local 251 if (read(fd2, &seed, sizeof(seed)) != sizeof(seed)) { in main() 255 srand(seed); in main()
|
/system/extras/simpleperf/ |
D | utils.h | 173 void HashCombine(size_t& seed, const T& val) { in HashCombine() argument 174 seed ^= std::hash<T>()(val) + 0x9e3779b9 + (seed << 6) + (seed >> 2); in HashCombine()
|
D | cmd_inject.cpp | 65 size_t seed = 0; in operator ()() local 66 HashCombine(seed, ap.first); in operator ()() 67 HashCombine(seed, ap.second); in operator ()() 68 return seed; in operator ()()
|
/system/extras/puncture_fs/ |
D | puncture_fs.cpp | 206 int seed = time(NULL); in main() local 216 seed = atoi(optarg); in main() 248 srandom(seed); in main() 249 fprintf(stderr, "\nRandom seed is: %d\n", seed); in main()
|
/system/chre/apps/wifi_offload/test/ |
D | random_generator.cc | 40 random_engine_.seed(initial_seed_); in Reset()
|
/system/keymaster/ng/ |
D | AndroidKeymaster4Device.cpp | 247 params.seed.setToExternal(const_cast<uint8_t*>(response.params.seed.data), in getHmacSharingParameters() 248 response.params.seed.data_length); in getHmacSharingParameters() 262 request.params_array.params_array[i].seed = {params[i].seed.data(), params[i].seed.size()}; in computeSharedHmac()
|
/system/netd/bpf_progs/ |
D | bpf_net_helpers.h | 33 __wsum seed) = (void*)BPF_FUNC_csum_diff;
|
/system/core/trusty/keymaster/4.0/ |
D | TrustyKeymaster4Device.cpp | 277 params.seed.setToExternal(const_cast<uint8_t*>(response.params.seed.data), in getHmacSharingParameters() 278 response.params.seed.data_length); in getHmacSharingParameters() 291 request.params_array.params_array[i].seed = {params[i].seed.data(), params[i].seed.size()}; in computeSharedHmac()
|
/system/update_engine/payload_consumer/ |
D | delta_performer_unittest.cc | 903 unsigned int seed = time(nullptr); in TEST_F() local 910 uint64_t manifest_size = rand_r(&seed) % 256; in TEST_F() 911 uint32_t metadata_signature_size = rand_r(&seed) % 256; in TEST_F() 938 unsigned int seed = time(nullptr); in TEST_F() local 950 uint32_t metadata_signature_size = rand_r(&seed) % 256; in TEST_F() 971 unsigned int seed = time(nullptr); in TEST_F() local 978 uint64_t manifest_size = rand_r(&seed) % 256; in TEST_F()
|
/system/keymaster/include/keymaster/ |
D | android_keymaster_messages.h | 698 HmacSharingParameters() : seed({}) { memset(nonce, 0, sizeof(nonce)); } in HmacSharingParameters() 700 seed = move(other.seed); in HmacSharingParameters() 704 void SetSeed(KeymasterBlob&& value) { seed = move(value); } in SetSeed() 710 KeymasterBlob seed{};
|
/system/keymaster/android_keymaster/ |
D | android_keymaster_messages.cpp | 583 return blob_size(seed) + sizeof(nonce); in SerializedSize() 587 buf = serialize_blob(seed, buf, end); in Serialize() 592 return deserialize_blob(&seed, buf_ptr, end) && in Deserialize()
|
/system/core/adb/ |
D | test_adb.py | 807 random.seed(0)
|
D | test_device.py | 1751 random.seed(0)
|
/system/keymaster/tests/ |
D | android_keymaster_test.cpp | 4362 ASSERT_EQ(ToByteString(paramsVec[0].seed), ToByteString(paramsVec[1].seed)) in TEST_F() 4469 finally([&]() { params[param_to_tweak].seed.data = nullptr; }); in TEST_F()
|