/libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
RandomImpl.java | 36 protected void engineSetSeed(byte[] seed) {
|
/packages/apps/Gallery2/jni/filters/ |
kmeans.h | 89 unsigned int seed) { 93 srand(seed); 210 int iterations, unsigned int seed){ 213 initialPickHeuristicRandom<T>(k, values, len, dimension, stride, initialPicks, seed);
|
/external/compiler-rt/lib/asan/tests/ |
asan_noinst_test.cc | 54 u32 seed = my_rand(); local 74 size_t idx = my_rand_r(&seed) % vec.size(); 80 size_t size = my_rand_r(&seed) % 1000 + 1; 81 switch ((my_rand_r(&seed) % 128)) { 86 size_t alignment = 1 << (my_rand_r(&seed) % 10 + 1); 163 u32 seed = my_rand(); local 169 void *p = __asan::asan_malloc(1 + (my_rand_r(&seed) % 4000), &stack);
|
/external/libvpx/libvpx/examples/ |
decode_with_partial_drops.c | 47 // partition boundaries where possible. The following example will seed the RNG 48 // with the seed 123 and drop approximately 5% of the pieces. Pieces which 204 unsigned int seed; local 227 seed = (m > 0) ? m : (unsigned int)time(NULL); 228 srand(seed);thrown_frame = 0; 229 printf("Seed: %u\n", seed);
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/examples/ |
decode_with_partial_drops.c | 47 // partition boundaries where possible. The following example will seed the RNG 48 // with the seed 123 and drop approximately 5% of the pieces. Pieces which 204 unsigned int seed; local 227 seed = (m > 0) ? m : (unsigned int)time(NULL); 228 srand(seed);thrown_frame = 0; 229 printf("Seed: %u\n", seed);
|
/external/chromium_org/third_party/angle/src/third_party/murmurhash/ |
MurmurHash3.cpp | 95 uint32_t seed, void * out ) 100 uint32_t h1 = seed; 151 uint32_t seed, void * out ) 156 uint32_t h1 = seed; 157 uint32_t h2 = seed; 158 uint32_t h3 = seed; 159 uint32_t h4 = seed; 256 const uint32_t seed, void * out ) 261 uint64_t h1 = seed; 262 uint64_t h2 = seed; [all...] |
/external/chromium_org/third_party/smhasher/src/ |
MurmurHash3.cpp | 95 uint32_t seed, void * out ) 100 uint32_t h1 = seed; 151 uint32_t seed, void * out ) 156 uint32_t h1 = seed; 157 uint32_t h2 = seed; 158 uint32_t h3 = seed; 159 uint32_t h4 = seed; 256 const uint32_t seed, void * out ) 261 uint64_t h1 = seed; 262 uint64_t h2 = seed; [all...] |
Spooky.h | 55 uint64 *hash1, // in/out: in seed 1, out hash value 1 56 uint64 *hash2); // in/out: in seed 2, out hash value 2 64 uint64 seed) // seed 66 uint64 hash1 = seed; 67 Hash128(message, length, &hash1, &seed); 77 uint32 seed) // seed 79 uint64 hash1 = seed, hash2 = seed; [all...] |
/external/chromium_org/tools/gyp/pylib/gyp/ |
MSVSNew.py | 25 random.seed() 37 def MakeGuid(name, seed='msvs_new'): 42 seed: Seed for MD5 hash. 44 A GUID-line string calculated from the name and seed. 47 name and seed. This means the same name/seed will always generate the same 52 # Calculate a MD5 signature for the seed and name. 53 d = _new_md5(str(seed) + str(name)).hexdigest().upper() 102 self.guid = MakeGuid(self.path, seed='msvs_folder' [all...] |
/cts/tests/tests/media/src/android/media/cts/ |
MediaPlayerFlakyNetworkTest.java | 95 private void doPlayStreams(int seed, float probability) throws Throwable { 96 Random random = new Random(seed); 97 createHttpServer(seed, probability); 209 private void createHttpServer(int seed, final float probability) throws Throwable { 210 final Random random = new Random(seed);
|
/external/chromium_org/chrome/android/java/src/org/chromium/chrome/browser/ |
WebappAuthenticator.java | 187 // Versions of SecureRandom from Android <= 4.3 do not seed themselves as 195 byte[] seed = getRandomBytes(MAC_KEY_BYTE_COUNT); 196 if (seed == null) { 199 random.setSeed(seed); 239 // random seed and generated a key from it. If not, there is a problem with the
|
/external/chromium_org/third_party/openssl/openssl/apps/ |
progs.h | 230 {FUNC_TYPE_CIPHER,"seed",enc_main}, 299 {FUNC_TYPE_CIPHER,"seed-cbc",enc_main}, 302 {FUNC_TYPE_CIPHER,"seed-ecb",enc_main}, 305 {FUNC_TYPE_CIPHER,"seed-cfb",enc_main}, 308 {FUNC_TYPE_CIPHER,"seed-ofb",enc_main},
|
/external/openssl/apps/ |
progs.h | 230 {FUNC_TYPE_CIPHER,"seed",enc_main}, 299 {FUNC_TYPE_CIPHER,"seed-cbc",enc_main}, 302 {FUNC_TYPE_CIPHER,"seed-ecb",enc_main}, 305 {FUNC_TYPE_CIPHER,"seed-cfb",enc_main}, 308 {FUNC_TYPE_CIPHER,"seed-ofb",enc_main},
|
/external/pixman/test/ |
utils-prng.h | 48 * void prng_srand_r (prng_t *prng, uint32_t seed); 51 * numbers is deterministic and only depends on "seed". Any two generators 52 * initialized with the same seed will produce exactly the same sequence. 162 /* Set the 32-bit seed for PRNG */ 163 void prng_srand_r (prng_t *prng, uint32_t seed);
|
/external/wpa_supplicant_8/src/eap_common/ |
eap_fast_common.c | 73 u8 seed[2 * TLS_RANDOM_LEN]; local 85 os_memcpy(seed, server_random, TLS_RANDOM_LEN); 86 os_memcpy(seed + TLS_RANDOM_LEN, client_random, TLS_RANDOM_LEN); 89 seed, sizeof(seed), master_secret, TLS_MASTER_SECRET_LEN);
|
/frameworks/base/media/mca/filterpacks/java/android/filterpacks/imageproc/ |
LomoishFilter.java | 46 "uniform vec2 seed;\n" + 109 " float dither = rand(v_texcoord + seed);\n" + 170 float seed[] = { mRandom.nextFloat(), mRandom.nextFloat() }; local 171 mProgram.setHostValue("seed", seed);
|
/ndk/tests/device/issue42891-boost-1_52/jni/boost/boost/test/impl/ |
framework.ipp | 431 unsigned int seed = static_cast<unsigned int>( std::time( 0 ) ); 432 BOOST_TEST_MESSAGE( "Test cases order is shuffled using seed: " << seed ); 433 std::srand( seed ); 437 BOOST_TEST_MESSAGE( "Test cases order is shuffled using seed: " << runtime_config::random_seed() );
|
/system/extras/tests/ext4/ |
rand_emmc_perf.c | 192 unsigned int seed; local 250 if (read(fd2, &seed, sizeof(seed)) != sizeof(seed)) { 254 srand(seed);
|
/external/chromium_org/third_party/freetype/src/psaux/ |
t1decode.c | 374 FT_Fixed seed; local 383 /* compute random seed from stack address of parameter */ 384 seed = (FT_Fixed)( ( (FT_PtrDist)(char*)&seed ^ 388 seed = ( seed ^ ( seed >> 10 ) ^ ( seed >> 20 ) ) & 0xFFFFL; 389 if ( seed == 0 ) 390 seed = 0x7384 [all...] |
/external/freetype/src/psaux/ |
t1decode.c | 374 FT_Fixed seed; local 383 /* compute random seed from stack address of parameter */ 384 seed = (FT_Fixed)( ( (FT_PtrDist)(char*)&seed ^ 388 seed = ( seed ^ ( seed >> 10 ) ^ ( seed >> 20 ) ) & 0xFFFFL; 389 if ( seed == 0 ) 390 seed = 0x7384 [all...] |
/external/libxml2/ |
dict.c | 72 xmlDictComputeFastKey(name, len, (dict)->seed) : \ 73 xmlDictComputeBigKey(name, len, (dict)->seed)) 79 xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed) : \ 80 xmlDictComputeBigQKey(prefix, plen, name, len, (dict)->seed))) 84 xmlDictComputeFastKey(name, len, (dict)->seed) 86 xmlDictComputeFastQKey(prefix, plen, name, len, (dict)->seed) 125 int seed; member in struct:_xmlDict 375 xmlDictComputeBigKey(const xmlChar* data, int namelen, int seed) { 381 hash = seed; 408 const xmlChar *name, int len, int seed) [all...] |
/external/pdfium/core/src/fxge/fx_freetype/fxft2.5.01/src/psaux/ |
t1decode.c | 374 FT_Fixed seed; local 383 /* compute random seed from stack address of parameter */ 384 seed = (FT_Fixed)( ( (FT_PtrDist)(char*)&seed ^ 388 seed = ( seed ^ ( seed >> 10 ) ^ ( seed >> 20 ) ) & 0xFFFFL; 389 if ( seed == 0 ) 390 seed = 0x7384 [all...] |
/external/chromium_org/courgette/third_party/ |
bsdiff_create.cc | 258 // a triple for the part of |newbuf| surrounding a 'seed' match near 259 // |lastscan|. We are searching for a second match that will be the 'seed' of 264 // seed. Continue scanning. It is likely that this match will become 267 // 2. We find match which does much better than extending the current seed 268 // old match. Emit a triple for the current seed and take this match as 269 // the new seed for a new triple. By 'much better' we remove 8 mismatched 270 // bytes by taking the new seed. 280 // ssssssssss Seed at |lastscan| 282 // mmmmmmmm New match will start new seed case (2). 284 // bbbb |lenb| = scan back from new seed |scan| [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 53 u8 seed[2 * TLS_RANDOM_LEN]; local 61 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 62 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 66 "master secret", seed, 2 * TLS_RANDOM_LEN, 76 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 77 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 83 "key expansion", seed, 2 * TLS_RANDOM_LEN, 516 * @server_random_first: seed is 0 = client_random|server_random, 525 u8 seed[2 * TLS_RANDOM_LEN]; local 531 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN) [all...] |
tlsv1_server.c | 60 u8 seed[2 * TLS_RANDOM_LEN]; local 68 os_memcpy(seed, conn->client_random, TLS_RANDOM_LEN); 69 os_memcpy(seed + TLS_RANDOM_LEN, conn->server_random, 73 "master secret", seed, 2 * TLS_RANDOM_LEN, 83 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN); 84 os_memcpy(seed + TLS_RANDOM_LEN, conn->client_random, TLS_RANDOM_LEN); 89 "key expansion", seed, 2 * TLS_RANDOM_LEN, 462 * @server_random_first: seed is 0 = client_random|server_random, 471 u8 seed[2 * TLS_RANDOM_LEN]; local 477 os_memcpy(seed, conn->server_random, TLS_RANDOM_LEN) [all...] |