/openbmc/qemu/tests/image-fuzzer/qcow2/ |
H A D | fuzz.py | 19 import random 47 """Select a random integer number from the list of specified intervals. 53 r = random.randint(0, total - 1) + intervals[0][0] 60 """Generate random binary mask with ones in the specified bit ranges. 63 positions will be fuzzed. The limits are included. Random amount of bits 68 # Select random amount of random positions in bit_ranges 70 bit_numbers += random.sample(range(rng[0], rng[1] + 1), 71 random.randint(0, rng[1] - rng[0] + 1)) 98 """Return a random value from intervals not equal to the current. 106 """Return a random bit mask not equal to the current. [all …]
|
H A D | layout.py | 19 import random 87 This class allows to create qcow2 images with random valid structures and 93 """Create a random valid qcow2 image with the correct header and stored 113 self.bias = random.uniform(0.2, 0.5) 122 """Generate a random valid header.""" 125 ['>I', 4, random.randint(2, 3), 'version'], 151 random.getrandbits(2) 152 self.header['compatible_features'][0].value = random.getrandbits(1) 212 """Generate a random header extension for names of features used in 216 """Return random feature type and feature bit.""" [all …]
|
/openbmc/openbmc/poky/meta/recipes-core/initscripts/initscripts-1.0/ |
H A D | urandom | 12 # Short-Description: Save and restore the random seed 13 # Description: Save the random seed on shutdown and restore it on boot, 20 RANDOM_SEED_FILE=/var/lib/urandom/random-seed 27 test "$VERBOSE" != no && echo "Initializing random number generator..." 40 # Carry a random seed from shut-down to start-up; 41 # see documentation in linux/drivers/char/random.c 42 test "$VERBOSE" != no && echo "Saving random seed..."
|
/openbmc/qemu/crypto/ |
H A D | random-platform.c | 2 * QEMU Crypto random number provider 23 #include "crypto/random.h" 31 # include <sys/random.h> 33 /* This is -1 for getrandom(), or a file handle for /dev/{u,}random. */ 57 fd = open("/dev/random", O_RDONLY | O_CLOEXEC); in qcrypto_random_init() 60 error_setg_errno(errp, errno, "No /dev/urandom or /dev/random"); in qcrypto_random_init() 74 "Unable to read random bytes"); in qcrypto_random_bytes() 105 error_setg(errp, "Unexpected EOF reading random bytes"); in qcrypto_random_bytes() 108 error_setg_errno(errp, errno, "Unable to read random bytes"); in qcrypto_random_bytes()
|
/openbmc/openbmc/poky/meta/recipes-devtools/valgrind/valgrind/ |
H A D | avoid-neon-for-targets-which-don-t-support-it.patch | 6 The sh-mem-random.c test app tries to use neon loads and stores to 15 memcheck/tests/sh-mem-random.c | 2 +- 18 diff --git a/memcheck/tests/sh-mem-random.c b/memcheck/tests/sh-mem-random.c 20 --- a/memcheck/tests/sh-mem-random.c 21 +++ b/memcheck/tests/sh-mem-random.c
|
/openbmc/openbmc/poky/meta/recipes-core/glibc/glibc/ |
H A D | 0001-stdlib-Add-single-threaded-fast-path-to-rand.patch | 10 fast path. Bench-random-lock shows about 5x speedup on Neoverse V1. 17 stdlib/random.c | 7 +++++++ 20 diff --git a/stdlib/random.c b/stdlib/random.c 22 --- a/stdlib/random.c 23 +++ b/stdlib/random.c
|
/openbmc/openbmc/meta-openembedded/meta-perl/recipes-perl/libcrypt/ |
H A D | libcrypt-openssl-random-perl_0.17.bb | 1 SUMMARY = "Crypt::OpenSSL::Random - OpenSSL/LibreSSL pseudo-random number generator access" 3 HOMEPAGE = "https://metacpan.org/pod/Crypt::OpenSSL::Random" 8 SRC_URI = "${CPAN_MIRROR}/authors/id/R/RU/RURBAN/Crypt-OpenSSL-Random-${PV}.tar.gz" 11 S = "${WORKDIR}/Crypt-OpenSSL-Random-${PV}"
|
/openbmc/qemu/include/hw/misc/ |
H A D | nrf51_rng.h | 2 * nRF51 Random Number Generator 13 * + Named GPIO output "eep_valrdy": Event set when new random value is ready 16 * generation of random values. 18 * random values. 21 * + Stochastic properties of different configurations of the random source 23 * + Generation of unfiltered and filtered random values take at least the
|
/openbmc/openbmc/poky/meta/recipes-core/udev/eudev/ |
H A D | 0001-random-util.c-sync-dev_urandom-implementation-to-sys.patch | 4 Subject: [PATCH] random-util.c: sync dev_urandom implementation to 8 will never block regardless if the random pool is fully 13 48bff1053c17 ("random: opportunistically initialize on /dev/urandom reads"). 16 dev_urandom() will block if enough random pool is not supplied. 23 - Try to get random with calling getrandom(GRND_INSECURE) 40 src/shared/random-util.c | 70 ++++++++++++++++++---------------------- 58 diff --git a/src/shared/random-util.c b/src/shared/random-util.c 60 --- a/src/shared/random-util.c 61 +++ b/src/shared/random-util.c 73 - * kernel, regardless if the random pool is fully initialized
|
/openbmc/libcper/generator/sections/ |
H A D | gen-section-cxl-component.c | 2 * Functions for generating pseudo-random CXL component error sections. 12 //Generates a single pseudo-random CXL component error section, saving the resulting address to the… 17 //Create a random length for the CXL component event log. in generate_section_cxl_component() 18 //The logs attached here do not necessarily conform to the specification, and are simply random. in generate_section_cxl_component() 21 //Create random bytes. in generate_section_cxl_component()
|
H A D | gen-section-dmar.c | 2 * Functions for generating pseudo-random CPER DMAr error sections. 12 //Generates a single pseudo-random generic DMAr error section, saving the resulting address to the … 18 //Create random bytes. in generate_section_dmar_generic() 38 //Generates a single pseudo-random VT-d DMAr error section, saving the resulting address to the giv… 44 //Create random bytes. in generate_section_dmar_vtd() 64 //Generates a single pseudo-random IOMMU DMAr error section, saving the resulting address to the gi… 70 //Create random bytes. in generate_section_dmar_iommu()
|
H A D | gen-section-ccix-per.c | 2 * Functions for generating pseudo-random CCIX PER error sections. 12 //Generates a single pseudo-random CCIX PER error section, saving the resulting address to the given 17 //Create a random length for the CCIX PER log. in generate_section_ccix_per() 18 …The log attached here does not necessarily conform to the CCIX specification, and is simply random. in generate_section_ccix_per() 21 //Create random bytes. in generate_section_ccix_per()
|
H A D | gen-section-memory.c | 2 * Functions for generating pseudo-random CPER platform memory error sections. 12 //Generates a single pseudo-random platform memory error section, saving the resulting address to t… 17 //Create random bytes. in generate_section_memory() 43 //Generates a single pseudo-random memory 2 error section, saving the resulting address to the given 48 //Create random bytes. in generate_section_memory2()
|
H A D | gen-section-cxl-protocol.c | 2 * Functions for generating pseudo-random CXL protocol error sections. 12 //Generates a single pseudo-random CXL protocol error section, saving the resulting address to the … 17 //Create a random length for the CXL DVSEC and CXL error log. in generate_section_cxl_protocol() 18 //The logs attached here do not necessarily conform to the specification, and are simply random. in generate_section_cxl_protocol() 22 //Create random bytes. in generate_section_cxl_protocol()
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 160 # Get random username and user privilege level. 161 ${username}= Generate Random String 8 [LETTERS] 162 ${privilege_level}= Evaluate random.choice(${list_user_privilege}) random 176 # Get random username and user privilege level. 177 ${username}= Generate Random String 8 [LETTERS] 178 ${privilege_level}= Evaluate random.choice(${list_user_privilege}) random 214 # Get random username, user privilege level and account status. 215 ${username}= Generate Random String 8 [LETTERS] 216 ${privilege_level}= Evaluate random.choice(${list_user_privilege}) random 217 ${initial_account_status}= Evaluate random.choice([True, False]) random [all …]
|
/openbmc/phosphor-dbus-interfaces/yaml/xyz/openbmc_project/Inventory/Item/ |
H A D | Dimm.interface.yaml | 129 Dynamic Random Access Memory. 132 Enhanced Dynamic Random Access Memory. 135 Video Random Access Memory. 138 Static Random Access Memory. 141 Random Access Memory. 159 Cached Dynamic Random Access Memory. 162 Three Dimensional Random Access Memory. 165 Synchronous Dynamic Random Access Memory. 168 Double Data Rate Synchronous Graphics Random-Access Memory. 171 Direct Rambus Dynamic Random Access Memory.
|
/openbmc/openbmc-test-automation/openpower/localuser/ |
H A D | test_ipmi_redfish_user.robot | 28 # Create IPMI user with random id and username. 29 ${random_userid}= Evaluate random.randint(2, 15) modules=random 30 ${random_username}= Generate Random String 8 [LETTERS] 44 ${random_username}= Generate Random String 8 [LETTERS] 70 ${random_username}= Generate Random String 8 [LETTERS] 98 ${random_username}= Generate Random String 8 [LETTERS] 125 ${random_username}= Generate Random String 8 [LETTERS] 163 Create IPMI Random User With Password And Privilege 164 [Documentation] Create random IPMI user with given password and privilege 173 ${random_username}= Generate Random String 8 [LETTERS] [all …]
|
/openbmc/openbmc-test-automation/pldm/ |
H A D | test_pldm_bios_attributes.robot | 30 ${random_attr}= Generate Random String 8 [LETTERS][NUMBERS] 46 ${random_str}= Generate Random String 8 [LETTERS][NUMBERS] 64 ${enum_attr}= Evaluate random.choice(${attr_handles}) modules=random 82 ${int_attr}= Evaluate random.choice(${attr_handles}) modules=random 101 ${str_attr}= Evaluate random.choice(${attr_handles}) modules=random 103 ${random_value}= Generate Random String ${count} [LETTERS][NUMBERS] 117 ... attribute handle with random values with in the range. 140 ... attribute handle with random values with in the range. 164 ... attribute handle with random values with in the range of
|
H A D | test_redfish_bios_attributes.robot | 32 ${random_str}= Generate Random String 8 [LETTERS][NUMBERS] 44 ${enum_attr}= Evaluate random.choice(${attr_handles}) modules=random 57 ${int_attr}= Evaluate random.choice(${attr_handles}) modules=random 72 ${str_attr}= Evaluate random.choice(${attr_handles}) modules=random 74 ${random_value}= Generate Random String ${count} [LETTERS][NUMBERS] 82 ... attribute handle with random values with in the range using Redfish. 104 ... attribute handle with random values with in the range using Redfish.
|
/openbmc/openbmc-test-automation/redfish/account_service/ |
H A D | test_ipmi_redfish_user.robot | 33 ${random_username}= Generate Random String 8 [LETTERS] 53 ${random_username}= Generate Random String 8 [LETTERS] 78 ${random_username}= Generate Random String 8 [LETTERS] 113 ${random_username}= Generate Random String 8 [LETTERS] 134 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 151 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 171 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 189 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 207 ${username} ${userid}= IPMI Create Random User Plus Password And Privilege 235 ${random_username}= Generate Random Strin [all...] |
/openbmc/qemu/hw/misc/ |
H A D | max78000_trng.c | 2 * MAX78000 True Random Number Generator 15 #include "qemu/guest-random.h" 32 * When interrupts are enabled, reading random data should cause a in max78000_trng_read() 33 * new interrupt to be generated; since there's always a random number in max78000_trng_read() 59 * This device models random number generation as taking 0 time. in max78000_trng_write() 60 * A new random number is always available, so the condition for the in max78000_trng_write()
|
/openbmc/openbmc/poky/meta/recipes-support/rng-tools/rng-tools/ |
H A D | init | 15 echo -n "Starting random number generator daemon" 20 echo -n "Stopping random number generator daemon" 30 echo -n "Stopping random number generator daemon" 33 echo -n "Starting random number generator daemon"
|
/openbmc/openbmc/poky/bitbake/lib/bs4/ |
H A D | diagnose.py | 15 import random 152 "Generate a random word-like string." 159 s += random.choice(t) 163 "Generate a random sentence-like string." 164 return " ".join(rword(random.randint(4,9)) for i in range(length)) 171 choice = random.randint(0,3) 174 tag_name = random.choice(tag_names) 177 elements.append(rsentence(random.randint(1,4))) 180 tag_name = random.choice(tag_names)
|
/openbmc/openbmc-test-automation/lib/ |
H A D | pldm_utils.py | 8 import random 143 Get random integer or string values for BIOS attribute values based on the count. 149 @return Random attribute value based on BIOS attribute type Integer 159 map(str, (random.randint(0, 255) for _ in range(4))) 165 map(str, (random.randint(0, 255) for _ in range(4))) 172 random.choice(data) for _ in range(int(count)) 178 random.choice(data) for _ in range(int(count)) 182 attr_random_value = str(random.randint(0, int(count))) 185 attr_random_value = random.randint(0, int(count)) 298 value = random.choice(valid_values)
|
/openbmc/openbmc-test-automation/ipmi/dcmi/ |
H A D | test_dcmi_asset_tag.robot | 23 ${random_string}= Generate Random String 63 35 ${random_string}= Generate Random String 64 46 ${random_string}= Generate Random String 63 68 ${random_string}= Generate Random String ${17} 96 ${random_int}= Evaluate random.randint(1, 17) modules=random 97 ${random_string}= Generate Random String ${random_int}
|