Home
last modified time | relevance | path

Searched refs:seed (Results 1 – 21 of 21) sorted by relevance

/system/memory/libmemunreachable/
DLeak.h32 std::size_t seed = 0;
34 hash_combine(seed, key.num_frames);
36 hash_combine(seed, key.frames[i]);
39 return seed;
44 inline void hash_combine(std::size_t& seed, const T& v) const {
46 seed ^= hasher(v) + 0x9e3779b9 + (seed << 6) + (seed >> 2);
/system/update_engine/update_manager/
Dprng.h31 explicit PRNG(uint32_t seed) : gen_(seed) {} in PRNG() argument
Dnext_update_check_policy_impl.cc78 const auto* seed = ec->GetValue(state->random_provider()->var_seed()); in NextUpdateCheckTime() local
79 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in NextUpdateCheckTime()
81 PRNG prng(*seed); in NextUpdateCheckTime()
Dchromeos_policy.cc762 const uint64_t* seed = ec->GetValue(state->random_provider()->var_seed()); in UpdateBackoffAndDownloadUrl() local
763 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in UpdateBackoffAndDownloadUrl()
764 PRNG prng(*seed); in UpdateBackoffAndDownloadUrl()
818 const uint64_t* seed = ec->GetValue(state->random_provider()->var_seed()); in UpdateScattering() local
819 POLICY_CHECK_VALUE_AND_FAIL(seed, error); in UpdateScattering()
820 PRNG prng(*seed); in UpdateScattering()
/system/keymaster/km_openssl/
Dsoft_keymaster_enforcement.cpp82 saved_params_.seed = {}; in GetHmacSharingParameters()
86 params->seed = saved_params_.seed; in GetHmacSharingParameters()
141 return a.seed == b.seed && !memcmp(a.nonce, b.nonce, sizeof(a.nonce)); in operator ==()
156 *context_chunks_pos++ = params.seed; in ComputeSharedHmac()
/system/core/adb/fastdeploy/deploypatchgenerator/
Ddeploy_patch_generator.cpp212 size_t seed = 0; in BuildIdenticalEntries() local
213 seed ^= hasher(digest.first) + 0x9e3779b9 + (seed << 6) + (seed >> 2); in BuildIdenticalEntries()
214 seed ^= hasher(digest.second) + 0x9e3779b9 + (seed << 6) + (seed >> 2); in BuildIdenticalEntries()
215 return seed; in BuildIdenticalEntries()
/system/extras/mmap-perf/
DmmapPerf.cpp38 uint64_t seed = (unsigned long long)rand() | ((unsigned long long)rand() << 32); in fillPageJunk() local
41 *target = seed ^ (uint64_t)(uintptr_t)target; in fillPageJunk()
42 seed = (seed << 1) | ((seed >> 63) & 1); in fillPageJunk()
/system/extras/tests/ext4/
Drand_emmc_perf.c192 unsigned int seed; in main() local
251 if (read(fd2, &seed, sizeof(seed)) != sizeof(seed)) { in main()
255 srand(seed); in main()
/system/extras/simpleperf/
Dutils.h173 void HashCombine(size_t& seed, const T& val) { in HashCombine() argument
174 seed ^= std::hash<T>()(val) + 0x9e3779b9 + (seed << 6) + (seed >> 2); in HashCombine()
Dcmd_inject.cpp65 size_t seed = 0; in operator ()() local
66 HashCombine(seed, ap.first); in operator ()()
67 HashCombine(seed, ap.second); in operator ()()
68 return seed; in operator ()()
/system/extras/puncture_fs/
Dpuncture_fs.cpp206 int seed = time(NULL); in main() local
216 seed = atoi(optarg); in main()
248 srandom(seed); in main()
249 fprintf(stderr, "\nRandom seed is: %d\n", seed); in main()
/system/chre/apps/wifi_offload/test/
Drandom_generator.cc40 random_engine_.seed(initial_seed_); in Reset()
/system/keymaster/ng/
DAndroidKeymaster4Device.cpp247 params.seed.setToExternal(const_cast<uint8_t*>(response.params.seed.data), in getHmacSharingParameters()
248 response.params.seed.data_length); in getHmacSharingParameters()
262 request.params_array.params_array[i].seed = {params[i].seed.data(), params[i].seed.size()}; in computeSharedHmac()
/system/netd/bpf_progs/
Dbpf_net_helpers.h33 __wsum seed) = (void*)BPF_FUNC_csum_diff;
/system/core/trusty/keymaster/4.0/
DTrustyKeymaster4Device.cpp277 params.seed.setToExternal(const_cast<uint8_t*>(response.params.seed.data), in getHmacSharingParameters()
278 response.params.seed.data_length); in getHmacSharingParameters()
291 request.params_array.params_array[i].seed = {params[i].seed.data(), params[i].seed.size()}; in computeSharedHmac()
/system/update_engine/payload_consumer/
Ddelta_performer_unittest.cc903 unsigned int seed = time(nullptr); in TEST_F() local
910 uint64_t manifest_size = rand_r(&seed) % 256; in TEST_F()
911 uint32_t metadata_signature_size = rand_r(&seed) % 256; in TEST_F()
938 unsigned int seed = time(nullptr); in TEST_F() local
950 uint32_t metadata_signature_size = rand_r(&seed) % 256; in TEST_F()
971 unsigned int seed = time(nullptr); in TEST_F() local
978 uint64_t manifest_size = rand_r(&seed) % 256; in TEST_F()
/system/keymaster/include/keymaster/
Dandroid_keymaster_messages.h698 HmacSharingParameters() : seed({}) { memset(nonce, 0, sizeof(nonce)); } in HmacSharingParameters()
700 seed = move(other.seed); in HmacSharingParameters()
704 void SetSeed(KeymasterBlob&& value) { seed = move(value); } in SetSeed()
710 KeymasterBlob seed{};
/system/keymaster/android_keymaster/
Dandroid_keymaster_messages.cpp583 return blob_size(seed) + sizeof(nonce); in SerializedSize()
587 buf = serialize_blob(seed, buf, end); in Serialize()
592 return deserialize_blob(&seed, buf_ptr, end) && in Deserialize()
/system/core/adb/
Dtest_adb.py807 random.seed(0)
Dtest_device.py1751 random.seed(0)
/system/keymaster/tests/
Dandroid_keymaster_test.cpp4362 ASSERT_EQ(ToByteString(paramsVec[0].seed), ToByteString(paramsVec[1].seed)) in TEST_F()
4469 finally([&]() { params[param_to_tweak].seed.data = nullptr; }); in TEST_F()