Searched refs:seeds (Results 1 – 8 of 8) sorted by relevance
116 u32 seeds[4]; in prandom_seed_full_state() local118 get_random_bytes(&seeds, sizeof(seeds)); in prandom_seed_full_state()119 state->s1 = __seed(seeds[0], 2U); in prandom_seed_full_state()120 state->s2 = __seed(seeds[1], 8U); in prandom_seed_full_state()121 state->s3 = __seed(seeds[2], 16U); in prandom_seed_full_state()122 state->s4 = __seed(seeds[3], 128U); in prandom_seed_full_state()
16 static unsigned int seeds[3]; variable81 if (rand_r(&seeds[0]) % 50 == 0) { in tagged_iteration_fn()114 if (rand_r(&seeds[1]) % 50 == 0) { in untagged_iteration_fn()141 pgoff = rand_r(&seeds[2]) % MAX_IDX; in remove_entries_fn()176 seeds[i] = rand(); in iteration_test()
33 This step initializes the dump process, generates cryptographic seeds
125 interface has a privately owned buffer pool which it seeds with kernel allocated
606 const u16 *seeds = sunxi_nfc_randomizer_page_seeds; in sunxi_nfc_randomizer_state() local614 seeds = sunxi_nfc_randomizer_ecc512_seeds; in sunxi_nfc_randomizer_state()616 seeds = sunxi_nfc_randomizer_ecc1024_seeds; in sunxi_nfc_randomizer_state()619 return seeds[page % mod]; in sunxi_nfc_randomizer_state()
139 in the dedicated interface buffer pool. The driver initializes and seeds these
190 Key Derivation Service (KDS) and derived from seeds allocated to
82 and storage seeds, which can be used to derive asymmetric keys.
Completed in 23 milliseconds