/system/core/adb/ |
H A D | adb_auth.h | 34 int adb_auth_sign(void *key, void *token, size_t token_size, void *sig); 39 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } argument 44 static inline int adb_auth_sign(void* key, void *token, size_t token_size, void *sig) { return 0; } argument 49 int adb_auth_verify(void *token, void *sig, int siglen);
|
H A D | adb_auth_client.c | 139 int adb_auth_verify(void *token, void *sig, int siglen) argument 153 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE);
|
H A D | adb_auth_host.c | 346 int adb_auth_sign(void *node, void *token, size_t token_size, void *sig) argument 351 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) {
|
/system/core/toolbox/ |
H A D | kill.c | 102 unsigned int sig = SIGTERM; local 122 sig = strtol(arg, &endptr, 10); 124 sig = name_to_signal(arg); 125 if (sig == SENTINEL) { 137 int err = kill(pid, sig);
|
H A D | newfs_msdos.c | 139 u_int8_t sig; /* extended boot signature */ member in struct:bsx 667 mk1(bsx->sig, 0x29);
|
/system/extras/fatblock/ |
H A D | fatblock.c | 133 static void signal_handler(int sig) argument 135 WARN("received signal %d\n", sig);
|
/system/netd/ |
H A D | main.cpp | 40 static void sigchld_handler(int sig); 146 static void sigchld_handler(int sig) { argument
|
/system/core/debuggerd/ |
H A D | tombstone.c | 62 static bool signal_has_address(int sig) { argument 63 switch (sig) { 74 static const char *get_signame(int sig) argument 76 switch(sig) { 178 static void dump_fault_addr(log_t* log, pid_t tid, int sig) argument 185 } else if (signal_has_address(sig)) { 187 sig, get_signame(sig), 188 si.si_code, get_sigcode(sig, si.si_code), 192 sig, get_signam [all...] |
/system/core/libcorkscrew/ |
H A D | backtrace.c | 43 extern int tgkill(int tgid, int tid, int sig); 65 static int tgkill(int tgid, int tid, int sig) { argument 66 return syscall(__NR_tgkill, tgid, tid, sig);
|
/system/extras/latencytop/ |
H A D | latencytop.c | 57 static void signal_handler(int sig); 407 static void signal_handler(int sig) { argument
|
/system/security/keystore/ |
H A D | IKeystoreService.cpp | 785 const void* sig; local 787 sig = data.readInplace(sigSize); 789 sig = NULL; 792 bool ret = verify(name, (const uint8_t*) in, (size_t) inSize, (const uint8_t*) sig,
|
/system/core/toolbox/cp/ |
H A D | cp.c | 99 progress(int sig __unused)
|
/system/vold/ |
H A D | VolumeManager.cpp | 83 unsigned char sig[MD5_DIGEST_LENGTH]; local 100 MD5(reinterpret_cast<const unsigned char*>(id), strlen(id), sig); local 104 *p++ = digits[sig[i] >> 4]; 105 *p++ = digits[sig[i] & 0x0F];
|