/openbmc/linux/tools/testing/selftests/powerpc/signal/ |
H A D | sigfuz.c | 153 ucp->uc_mcontext.gp_regs[PT_MSR] = random(); in trap_signal_handler() 155 ucp->uc_mcontext.gp_regs[PT_NIP] = random(); in trap_signal_handler() 157 ucp->uc_link->uc_mcontext.gp_regs[PT_MSR] = random(); in trap_signal_handler() 159 ucp->uc_link->uc_mcontext.gp_regs[PT_NIP] = random(); in trap_signal_handler() 161 ucp->uc_mcontext.gp_regs[PT_TRAP] = random(); in trap_signal_handler() 162 ucp->uc_mcontext.gp_regs[PT_DSISR] = random(); in trap_signal_handler() 163 ucp->uc_mcontext.gp_regs[PT_DAR] = random(); in trap_signal_handler() 164 ucp->uc_mcontext.gp_regs[PT_ORIG_R3] = random(); in trap_signal_handler() 165 ucp->uc_mcontext.gp_regs[PT_XER] = random(); in trap_signal_handler() 166 ucp->uc_mcontext.gp_regs[PT_RESULT] = random(); in trap_signal_handler() [all …]
|
/openbmc/linux/arch/x86/lib/ |
H A D | kaslr.c | 56 unsigned long raw, random = get_boot_seed(); in kaslr_get_random_long() local 68 random ^= raw; in kaslr_get_random_long() 78 random ^= raw; in kaslr_get_random_long() 85 random ^= i8254(); in kaslr_get_random_long() 90 : "=a" (random), "=d" (raw) in kaslr_get_random_long() 91 : "a" (random), "rm" (mix_const)); in kaslr_get_random_long() 92 random += raw; in kaslr_get_random_long() 97 return random; in kaslr_get_random_long()
|
/openbmc/linux/tools/testing/selftests/powerpc/stringloops/ |
H A D | memcmp.c | 105 s1[j] = random(); in testcase() 107 rand_s1 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase() 108 rand_s2 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase() 112 change = random() % comp_size; in testcase() 113 rand_s2[change] = random() & 0xff; in testcase() 131 s1[j] = random(); in testcase() 133 rand_s1 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase() 134 rand_s2 += random() % MAX_OFFSET_DIFF_S1_S2; in testcase() 139 change = random() % comp_size; in testcase() 140 s2[change] = random() & 0xff; in testcase()
|
H A D | strlen.c | 69 c = random() & 0x7f; in testcase() 82 c = random() & 0x7f; in testcase() 96 c = random() & 0x7f; in testcase()
|
/openbmc/linux/arch/s390/boot/ |
H A D | kaslr.c | 57 unsigned long seed, random; in get_random() local 66 cpacf_trng(NULL, 0, (u8 *) &random, sizeof(random)); in get_random() 71 cpacf_prno(CPACF_PRNO_SHA512_DRNG_GEN, &prno, (u8 *) &random, in get_random() 72 sizeof(random), NULL, 0); in get_random() 83 random = seed; in get_random() 84 cpacf_kmc(CPACF_KMC_PRNG, prng.parm_block, (u8 *) &random, in get_random() 85 (u8 *) &random, sizeof(random)); in get_random() 90 *value = random % limit; in get_random()
|
/openbmc/qemu/tests/image-fuzzer/qcow2/ |
H A D | fuzz.py | 19 import random 53 r = random.randint(0, total - 1) + intervals[0][0] 70 bit_numbers += random.sample(range(rng[0], rng[1] + 1), 71 random.randint(0, rng[1] - rng[0] + 1)) 118 return validator(current, random.choice, sequences) 149 return random.choice(fuzz_values) 339 random.choice([selector(current, constraints), current]) 340 is_cow = random.randint(0, 1) 350 random.choice([selector(current, constraints), current]) 351 is_compressed = random.randint(0, 1) [all …]
|
H A D | layout.py | 19 import random 113 self.bias = random.uniform(0.2, 0.5) 125 ['>I', 4, random.randint(2, 3), 'version'], 151 random.getrandbits(2) 152 self.header['compatible_features'][0].value = random.getrandbits(1) 217 return (random.randint(0, 2), random.randint(0, 63)) 277 cluster_descriptor += random.randint(0, 1) 295 l1_offset = random.randint(1, 3) * self.cluster_size 300 guest_clusters = random.sample(range(self.image_size // 423 block_clusters = set([random.choice(list(set(range(1, 4)) - [all …]
|
/openbmc/openbmc/poky/meta/recipes-support/libgcrypt/files/ |
H A D | 0002-libgcrypt-fix-building-error-with-O2-in-sysroot-path.patch | 4 Subject: [PATCH] random:cipher: handle substitution in sed command 10 * random/Makefile.am (o_flag_munging): Likewise. 14 Makefile.am of cipher and random 21 random/Makefile.am | 2 +- 37 diff --git a/random/Makefile.am b/random/Makefile.am 39 --- a/random/Makefile.am 40 +++ b/random/Makefile.am
|
/openbmc/openbmc/poky/meta/recipes-devtools/valgrind/valgrind/ |
H A D | avoid-neon-for-targets-which-don-t-support-it.patch | 6 The sh-mem-random.c test app tries to use neon loads and stores to 15 memcheck/tests/sh-mem-random.c | 2 +- 18 diff --git a/memcheck/tests/sh-mem-random.c b/memcheck/tests/sh-mem-random.c 20 --- a/memcheck/tests/sh-mem-random.c 21 +++ b/memcheck/tests/sh-mem-random.c
|
/openbmc/openbmc-test-automation/lib/ |
H A D | pldm_utils.py | 8 import random 159 map(str, (random.randint(0, 255) for _ in range(4))) 165 map(str, (random.randint(0, 255) for _ in range(4))) 172 random.choice(data) for _ in range(int(count)) 178 random.choice(data) for _ in range(int(count)) 182 attr_random_value = str(random.randint(0, int(count))) 185 attr_random_value = random.randint(0, int(count)) 298 value = random.choice(valid_values)
|
/openbmc/openbmc/poky/meta/recipes-core/udev/eudev/ |
H A D | 0001-random-util.c-sync-dev_urandom-implementation-to-sys.patch | 4 Subject: [PATCH] random-util.c: sync dev_urandom implementation to 8 will never block regardless if the random pool is fully 13 48bff1053c17 ("random: opportunistically initialize on /dev/urandom reads"). 16 dev_urandom() will block if enough random pool is not supplied. 23 - Try to get random with calling getrandom(GRND_INSECURE) 40 src/shared/random-util.c | 70 ++++++++++++++++++---------------------- 58 diff --git a/src/shared/random-util.c b/src/shared/random-util.c 60 --- a/src/shared/random-util.c 61 +++ b/src/shared/random-util.c 73 - * kernel, regardless if the random pool is fully initialized
|
/openbmc/openbmc/poky/bitbake/lib/bs4/ |
H A D | diagnose.py | 15 import random 160 s += random.choice(t) 165 return " ".join(rword(random.randint(4,9)) for i in range(length)) 172 choice = random.randint(0,3) 175 tag_name = random.choice(tag_names) 178 elements.append(rsentence(random.randint(1,4))) 181 tag_name = random.choice(tag_names)
|
/openbmc/linux/arch/powerpc/mm/nohash/ |
H A D | kaslr_booke.c | 286 unsigned long offset, random; in kaslr_choose_location() local 295 random = get_boot_seed(dt_ptr); in kaslr_choose_location() 299 random = rotate_xor(random, &seed, sizeof(seed)); in kaslr_choose_location() 306 random = rotate_xor(random, &seed, sizeof(seed)); in kaslr_choose_location() 338 index = random & 0xFF; in kaslr_choose_location() 342 offset = random % (SZ_64M - kernel_sz); in kaslr_choose_location()
|
/openbmc/u-boot/test/py/tests/ |
H A D | test_sf.py | 7 import random 68 sf_params['speed'] = random.randint(speed[0], speed[1]) 121 pattern = random.randint(0, 0xFF) 155 pattern = int(random.random() * 0xFF)
|
/openbmc/openbmc/poky/bitbake/contrib/ |
H A D | bbparse-torture.py | 9 import random 66 wait_time = random.random() * max_wait_time
|
/openbmc/openbmc-test-automation/gui/gui_test/security_and_access_menu/ |
H A D | test_user_management_sub_menu.robot | 160 # Get random username and user privilege level. 162 ${privilege_level}= Evaluate random.choice(${list_user_privilege}) random 176 # Get random username and user privilege level. 178 ${privilege_level}= Evaluate random.choice(${list_user_privilege}) random 214 # Get random username, user privilege level and account status. 216 ${privilege_level}= Evaluate random.choice(${list_user_privilege}) random 217 ${initial_account_status}= Evaluate random.choice([True, False]) random 256 # Get random username, user privilege level and account status. 258 ${privilege_level}= Evaluate random.choice(${list_user_privilege}) random 259 ${initial_account_status}= Evaluate random.choice([True, False]) random
|
/openbmc/openbmc-test-automation/pldm/ |
H A D | test_redfish_bios_attributes.robot | 44 ${enum_attr}= Evaluate random.choice(${attr_handles}) modules=random 57 ${int_attr}= Evaluate random.choice(${attr_handles}) modules=random 72 ${str_attr}= Evaluate random.choice(${attr_handles}) modules=random 82 ... attribute handle with random values with in the range using Redfish. 104 ... attribute handle with random values with in the range using Redfish.
|
H A D | test_pldm_bios_attributes.robot | 64 ${enum_attr}= Evaluate random.choice(${attr_handles}) modules=random 82 ${int_attr}= Evaluate random.choice(${attr_handles}) modules=random 101 ${str_attr}= Evaluate random.choice(${attr_handles}) modules=random 117 ... attribute handle with random values with in the range. 140 ... attribute handle with random values with in the range. 164 ... attribute handle with random values with in the range of
|
/openbmc/qemu/crypto/ |
H A D | meson.build | 67 util_ss.add(gcrypt, files('random-gcrypt.c')) 69 util_ss.add(gnutls, files('random-gnutls.c')) 71 util_ss.add(files('random-none.c')) 73 util_ss.add(files('random-platform.c'))
|
/openbmc/qemu/tests/image-fuzzer/ |
H A D | runner.py | 25 import random 131 self.seed = str(random.randint(0, sys.maxsize)) 132 random.seed(self.seed) 179 backing_file_fmt = random.choice(['raw', 'vmdk', 'vdi', 'qcow2', 182 backing_file_size = random.randint(MIN_BACKING_FILE_SIZE, 219 start = random.randrange(0, img_size + 1, sector_size) 220 end = random.randrange(start, img_size + 1, sector_size)
|
/openbmc/linux/Documentation/admin-guide/ |
H A D | hw_random.rst | 2 Hardware random number generators 24 /dev/random special files. 30 and read() system calls, you can read random data from 36 data before assuming it is truly random. 63 using thermal noise generated from inherently random quantum 64 mechanical properties of silicon. When not generating new random
|
/openbmc/openbmc/meta-security/recipes-ids/samhain/files/ |
H A D | samhain-samhainrc-fix-files-dirs-path.patch | 45 -file = /var/lib/random-seed 46 +file = /var/lib/urandom/random-seed 50 @@ -176,7 +175,7 @@ file = /var/lib/random-seed
|
/openbmc/google-ipmi-sys/ |
H A D | gbmc-psu-hardreset.target | 6 Conflicts=systemd-random-seed.service 7 After=systemd-random-seed.service
|
/openbmc/qemu/tests/qemu-iotests/ |
H A D | 147 | 23 import random 107 nbd_port = random.randrange(NBD_PORT_START, NBD_PORT_END) 178 nbd_port = random.randrange(NBD_PORT_START, NBD_PORT_END) 203 nbd_port = random.randrange(NBD_PORT_START, NBD_PORT_END) 230 nbd_port = random.randrange(NBD_IPV6_PORT_START, NBD_IPV6_PORT_END)
|
/openbmc/libcper/generator/ |
H A D | README.md | 3 This project allows you to generate pseudo-random CPER records for software 22 The generator is not completely random within the bounds of the specification, 31 specification, and are simply random bytes.
|