/external/openssl/apps/ |
rand.c | 70 * -rand file:file - PRNG seed files 174 BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
rsa.c | 84 * -seed - encrypt output if PEM format 216 BIO_printf(bio_err," -seed encrypt PEM output with cbc seed\n");
|
app_rand.c | 199 /* If we did not manage to read the seed file, 200 * we should not write a low-entropy seed file back --
|
/external/openssl/crypto/des/ |
des_old.c | 215 long length,int out_count,_ossl_old_des_cblock *seed) 218 out_count, seed);
|
/external/openssl/crypto/rand/ |
rand_nw.c | 130 /* the FAQ indicates we need to provide at least 20 bytes (160 bits) of seed 145 * Applications can agument the seed material by adding additional
|
rand.h | 83 void (*seed)(const void *buf, int num); member in struct:rand_meth_st
|
/external/speex/libspeex/ |
nb_celp.h | 156 spx_int32_t seed; /** Seed used for random number generation */ member in struct:DecState
|
cb_search.c | 520 spx_int32_t *seed 605 spx_int32_t *seed 611 exc[i]=SHL32(EXTEND32(speex_rand(1, seed)),SIG_SHIFT);
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_openssl.c | 105 int fips186_2_prf(const u8 *seed, size_t seed_len, u8 *x, size_t xlen) 118 os_memcpy(xkey, seed, seed_len);
|
/frameworks/base/media/libstagefright/omx/tests/ |
OMXHarness.cpp | 769 " -s(eed) Set the random seed\n" 789 unsigned long seed = 0xdeadbeef; local 800 fprintf(stderr, "Malformed seed.\n"); 804 seed = x; 826 "with \"%s -s %lu\"\n", me, seed); 828 srand(seed);
|
/external/bluetooth/glib/glib/ |
gtestutils.c | 184 g_print ("GTest: random seed: %s\n", string2); 342 else if (strcmp ("--seed", argv[i]) == 0 || strncmp ("--seed=", argv[i], 7) == 0) 362 " -seed=RANDOMSEED Provide a random seed to reproduce test\n" 408 * <term><option>--seed=<replaceable>RANDOMSEED</replaceable></option></term> 410 * provide a random seed to reproduce test runs using random numbers. 497 /* setup random seed string */ 501 /* parse args, sets up mode, changes seed, etc. */ 517 /* check rand seed */ [all...] |
/external/wpa_supplicant/ |
tlsv1_client.c | 1079 u8 seed[2 * TLS_RANDOM_LEN]; local 1087 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 1088 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 1091 "master secret", seed, 2 * TLS_RANDOM_LEN, 1101 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 1102 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 1106 "key expansion", seed, 2 * TLS_RANDOM_LEN, 2156 u8 seed[2 * TLS_RANDOM_LEN]; local [all...] |
/external/openssl/crypto/asn1/ |
t_pkey.c | 302 const unsigned char *seed; local 400 if ((seed = EC_GROUP_get0_seed(x)) != NULL) 468 if (seed && !print_bin(bp, "Seed:", seed, seed_len, off))
|
/external/v8/src/ |
platform-linux.cc | 77 // Seed the random number generator. 79 // to an unsigned. Going directly can cause an overflow and the seed to be 80 // set to all ones. The seed will be identical for different instances that 82 uint64_t seed = static_cast<uint64_t>(TimeCurrentMillis()); local 83 srandom(static_cast<unsigned int>(seed));
|
stub-cache.h | 246 static int SecondaryOffset(String* name, Code::Flags flags, int seed) { 247 // Use the seed from the primary cache in the secondary cache. 254 uint32_t key = seed - string_low32bits + iflags;
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_sha1.c | 32 const u8 seed[] = { local 133 seed, sizeof(seed), buf, sizeof(master_secret)); 141 seed, sizeof(seed), buf, sizeof(key_block));
|
/external/openssl/crypto/ec/ |
ec_curve.c | 87 const unsigned char *seed;/* the seed (optional) */ member in struct:ec_curve_data_st 515 * the seed used here is slightly different than the 537 /* The seed here was used to created the curve parameters in normal [all...] |
/dalvik/libcore/luni/src/test/java/tests/api/java/util/ |
RandomTest.java | 59 assertTrue("Values from randoms with same seed don't match", r 315 "Reseting a random to its old seed did not result in the same chain of values as it gave before",
|
/external/opencore/protocols/systems/3g-324m_pvterminal/h245/se/include/ |
msd.h | 92 // seed the random number generator 93 RandGen.Seed(OsclTickCount::TickCount());
|
/external/openssl/crypto/objects/ |
objects.txt | [all...] |
/external/bluetooth/glib/tests/ |
queue-test.c | 197 random_test (int seed) 230 g_print ("seed: %d\n", seed); 232 g_random_set_seed (seed);
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_prng.h | 187 /* Slow RNG you **might** be able to use to seed a PRNG with. Be careful as this
|
/external/elfutils/lib/ |
fixedsizehash.h | 45 extern size_t next_prime (size_t seed);
|
/external/opencore/codecs_v2/audio/gsm_amr/amr_wb/dec/src/ |
lagconceal.cpp | 51 int16 * seed, 143 int16 * seed, 222 D = noise_gen_amrwb(seed); /* D={-1, ...,1} */ 307 D = noise_gen_amrwb(seed); /* D={-1,.., 1} */
|
/external/openssl/crypto/evp/ |
evp_err.c | 160 {ERR_REASON(EVP_R_SEED_KEY_SETUP_FAILED) ,"seed key setup failed"},
|