/third_party/skia/gm/ |
H A D | quadpaths.cpp | 102 SkRandom rand; variable 232 SkRandom rand; variable
|
H A D | trickycubicstrokes.cpp | 105 SkRandom rand; in draw_test() local 161 strokePaint.setColor(rand.nextU() | 0xff808080); in draw_test()
|
/third_party/rust/crates/nix/test/sys/ |
H A D | test_uio.rs | 3 use rand::distributions::Alphanumeric; 4 use rand::{thread_rng, Rng};
|
/third_party/node/deps/openssl/openssl/include/openssl/ |
H A D | evp.h | 1244 int EVP_RAND_up_ref(EVP_RAND *rand); 1245 void EVP_RAND_free(EVP_RAND *rand); 1246 const char *EVP_RAND_get0_name(const EVP_RAND *rand); 1248 int EVP_RAND_is_a(const EVP_RAND *rand, const char *name); 1249 const OSSL_PROVIDER *EVP_RAND_get0_provider(const EVP_RAND *rand); 1250 int EVP_RAND_get_params(EVP_RAND *rand, OSSL_PARAM params[]); 1252 EVP_RAND_CTX *EVP_RAND_CTX_new(EVP_RAND *rand, EVP_RAND_CTX *parent); 1257 const OSSL_PARAM *EVP_RAND_gettable_params(const EVP_RAND *rand); 1258 const OSSL_PARAM *EVP_RAND_gettable_ctx_params(const EVP_RAND *rand); 1259 const OSSL_PARAM *EVP_RAND_settable_ctx_params(const EVP_RAND *rand); [all...] |
/third_party/openssl/include/openssl/ |
H A D | evp.h | 1242 int EVP_RAND_up_ref(EVP_RAND *rand); 1243 void EVP_RAND_free(EVP_RAND *rand); 1244 const char *EVP_RAND_get0_name(const EVP_RAND *rand); 1246 int EVP_RAND_is_a(const EVP_RAND *rand, const char *name); 1247 const OSSL_PROVIDER *EVP_RAND_get0_provider(const EVP_RAND *rand); 1248 int EVP_RAND_get_params(EVP_RAND *rand, OSSL_PARAM params[]); 1250 EVP_RAND_CTX *EVP_RAND_CTX_new(EVP_RAND *rand, EVP_RAND_CTX *parent); 1255 const OSSL_PARAM *EVP_RAND_gettable_params(const EVP_RAND *rand); 1256 const OSSL_PARAM *EVP_RAND_gettable_ctx_params(const EVP_RAND *rand); 1257 const OSSL_PARAM *EVP_RAND_settable_ctx_params(const EVP_RAND *rand); [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/vm/ |
H A D | userfaultfd.c | 361 struct random_data rand; in locking_thread() local 373 bzero(&rand, sizeof(rand)); in locking_thread() 375 if (initstate_r(seed, randstate, sizeof(randstate), &rand)) { in locking_thread() 387 if (random_r(&rand, &rand_nr)) { in locking_thread() 393 if (random_r(&rand, &rand_nr)) { in locking_thread()
|
/third_party/skia/tests/ |
H A D | PictureTest.cpp | 73 static void rand_op(SkCanvas* canvas, SkRandom& rand) { in rand_op() argument 77 SkScalar unit = rand.nextUScalar1(); in rand_op() 319 SkRandom rand; in test_peephole() local 324 SkRandom rand2(rand); // remember the seed in test_peephole() 329 rand_op(canvas, rand); in test_peephole() 333 rand = rand2; in test_peephole()
|
H A D | StreamTest.cpp | 351 SkRandom rand; in stream_peek_test() local 357 size_t size = rand.nextRangeU(1, maxSize); in stream_peek_test() 381 SkRandom rand(kSeed << 1); in DEF_TEST() 387 size_t size = rand.nextRangeU(1, sizeof(buffer)); in DEF_TEST()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_sim_db.c | 46 u8 rand[EAP_SIM_MAX_CHAL][GSM_RAND_LEN]; member 50 u8 rand[EAP_AKA_RAND_LEN]; member 510 if (hexstr2bin(start, entry->u.sim.rand[num_chal], in eap_sim_db_sim_resp_auth() 568 if (hexstr2bin(start, entry->u.aka.rand, EAP_AKA_RAND_LEN)) in eap_sim_db_aka_resp_auth() 968 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); in eap_sim_db_get_gsm_triplets() 1431 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); in eap_sim_db_get_aka_auth()
|
H A D | eap_server_sim.c | 28 u8 rand[EAP_SIM_MAX_CHAL][GSM_RAND_LEN]; member 235 eap_sim_msg_add(msg, EAP_SIM_AT_RAND, 0, (u8 *) data->rand, in eap_sim_build_challenge() 542 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm); in eap_sim_process_start() 859 os_memcpy(id + 1, data->rand, data->num_chal * GSM_RAND_LEN); in eap_sim_get_session_id()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_sim_db.c | 46 u8 rand[EAP_SIM_MAX_CHAL][GSM_RAND_LEN]; member 50 u8 rand[EAP_AKA_RAND_LEN]; member 510 if (hexstr2bin(start, entry->u.sim.rand[num_chal], in eap_sim_db_sim_resp_auth() 568 if (hexstr2bin(start, entry->u.aka.rand, EAP_AKA_RAND_LEN)) in eap_sim_db_aka_resp_auth() 968 os_memcpy(_rand, entry->u.sim.rand, num_chal * GSM_RAND_LEN); in eap_sim_db_get_gsm_triplets() 1431 os_memcpy(_rand, entry->u.aka.rand, EAP_AKA_RAND_LEN); in eap_sim_db_get_aka_auth()
|
H A D | eap_server_sim.c | 28 u8 rand[EAP_SIM_MAX_CHAL][GSM_RAND_LEN]; member 235 eap_sim_msg_add(msg, EAP_SIM_AT_RAND, 0, (u8 *) data->rand, in eap_sim_build_challenge() 542 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm); in eap_sim_process_start() 861 os_memcpy(id + 1, data->rand, data->num_chal * GSM_RAND_LEN); in eap_sim_get_session_id()
|
/kernel/linux/linux-5.10/mm/ |
H A D | slab_common.c | 863 unsigned int rand; in freelist_randomize() local 871 rand = prandom_u32_state(state); in freelist_randomize() 872 rand %= (i + 1); in freelist_randomize() 873 swap(list[i], list[rand]); in freelist_randomize()
|
/kernel/linux/linux-6.6/tools/testing/selftests/net/mptcp/ |
H A D | mptcp_sockopt.c | 302 _olen = rand() % olen; in do_getsockopt_bogus_sf_data() 570 len = rand() % (sizeof(buf) - 1); in connect_one_server() 576 buf[i] = rand() % 26; in connect_one_server() 725 tos_in = rand() & 0xfc; in test_ip_tos_sockopt()
|
/third_party/backends/sanei/ |
H A D | sanei_ir.c | 596 irand = rand () % itop; in sanei_ir_spectral_clean() 940 if (rand () % 2 == 0) /* chose index */ in sanei_ir_manhattan_dist() 964 if (rand () % 2 == 0) /* chose index */ in sanei_ir_manhattan_dist() 976 if (rand () % 2 == 0) /* chose index */ in sanei_ir_manhattan_dist()
|
/third_party/icu/ohos_icu4j/src/main/tests/ohos/global/icu/dev/test/rbbi/ |
H A D | RBBIMonkeyTest.java | 514 void set(BreakRules rules, ICU_Rand rand) { in set() argument 522 fRandomSeed = rand.getSeed(); // Save initial seed for use in error messages, in set() 527 int charClassIndex = rand.next() % rules.fCharClassList.size(); in set() 533 int charIndex = rand.next() % cclass.fSet.size(); in set()
|
/third_party/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/rbbi/ |
H A D | RBBIMonkeyTest.java | 511 void set(BreakRules rules, ICU_Rand rand) { in set() argument 519 fRandomSeed = rand.getSeed(); // Save initial seed for use in error messages, in set() 524 int charClassIndex = rand.next() % rules.fCharClassList.size(); in set() 530 int charIndex = rand.next() % cclass.fSet.size(); in set()
|
/third_party/libdrm/tests/exynos/ |
H A D | exynos_fimg2d_test.c | 214 x = rand() % (img_w / 2); in g2d_solid_fill_test() 215 y = rand() % (img_h / 2); in g2d_solid_fill_test() 216 w = rand() % (img_w - x); in g2d_solid_fill_test() 217 h = rand() % (img_h - y); in g2d_solid_fill_test()
|
/base/security/certificate_manager/services/cert_manager_standard/cert_manager_engine/main/core/src/ |
H A D | cert_manager_crypto_operation.c | 19 #include <openssl/rand.h>
|
/base/security/dlp_permission_service/test/fuzztest/dlp_permission/fuzzer/generatecert_fuzzer/ |
H A D | generatecert_fuzzer.cpp | 18 #include <openssl/rand.h>
|
/kernel/linux/linux-5.10/tools/testing/selftests/powerpc/math/ |
H A D | vsx_preempt.c | 79 varray[i][j] = rand(); in preempt_vsx_c()
|
H A D | vmx_signal.c | 86 varray[i][j] = rand(); in signal_vmx_c()
|
H A D | fpu_signal.c | 68 darray[i] = rand(); in signal_fpu_c()
|
/kernel/linux/linux-5.10/tools/testing/selftests/bpf/prog_tests/ |
H A D | queue_stack_map.c | 21 vals[i] = rand(); in test_queue_stack_map_by_type()
|
H A D | trampoline_count.c | 69 if (rand() % 2) { in test_trampoline_count()
|