/system/core/include/mincrypt/ |
H A D | dsa_sig.h | 36 // Returns 0 if input sig is not a valid ASN.1 sequence 37 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int);
|
/system/core/libbacktrace/ |
H A D | thread_utils.h | 24 int tgkill(int tgid, int tid, int sig);
|
H A D | thread_utils.c | 38 int tgkill(int tgid, int tid, int sig) { argument 39 return syscall(__NR_tgkill, tgid, tid, sig);
|
/system/core/libmincrypt/ |
H A D | dsa_sig.c | 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) { argument 82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) { 86 seq_len = sig[1]; 91 r_len = sig[3]; 98 if ((r_len < 1) || (r_len > seq_len - 5) || (sig[4 + r_len] != 0x02)) { 101 s_len = sig[5 + r_len]; 117 if (!trim_to_p256_bytes(r_bytes, &sig[4], r_len) 118 || !trim_to_p256_bytes(s_bytes, &sig[6 + r_len], s_len)) {
|
/system/core/adb/ |
H A D | adb_auth.h | 34 int adb_auth_sign(void *key, void *token, size_t token_size, void *sig); 39 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } argument 44 static inline int adb_auth_sign(void* key, void *token, size_t token_size, void *sig) { return 0; } argument 49 int adb_auth_verify(void *token, void *sig, int siglen);
|
H A D | adb_auth_client.c | 139 int adb_auth_verify(void *token, void *sig, int siglen) argument 153 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE);
|
H A D | adb_auth_host.c | 346 int adb_auth_sign(void *node, void *token, size_t token_size, void *sig) argument 351 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) {
|
/system/core/toolbox/upstream-netbsd/lib/libutil/ |
H A D | raise_default_signal.c | 49 * raise_default_signal sig 50 * Raise the default signal handler for sig, by 64 raise_default_signal(int sig) argument 80 (sigaddset(&mask, sig) == -1)) 89 if (sigaction(sig, &act, &origact) == -1) 94 if ((raise(sig) == -1) || 104 (void)sigaction(sig, &origact, NULL);
|
/system/core/toolbox/upstream-netbsd/bin/kill/ |
H A D | kill.c | 188 signame_to_signum(char *sig) argument 192 if (strncasecmp(sig, "sig", 3) == 0) 193 sig += 3; 195 if (!strcasecmp(sys_signame[n], sig)) 214 int sig; local 225 for (len = 0, sig = 1; sig < NSIG; sig++) { 226 name = sys_signame[sig]; [all...] |
/system/core/libmincrypt/test/ |
H A D | ecdsa_test.c | 233 #define CHECK_DSA_SIG(sig, good) do {\ 234 message = parsehex(sig, &mlen); \ 236 printf(#sig ": %s\n", result ? "good" : "bad"); \
|
/system/extras/verity/ |
H A D | BootSignature.java | 77 public void setSignature(byte[] sig) { argument 78 signature = new DEROctetString(sig);
|
/system/extras/latencytop/ |
H A D | latencytop.c | 57 static void signal_handler(int sig); 407 static void signal_handler(int sig) { argument
|
/system/core/debuggerd/ |
H A D | tombstone.cpp | 61 static bool signal_has_si_addr(int sig) { argument 62 switch (sig) { 74 static const char* get_signame(int sig) { argument 75 switch(sig) {
|
/system/core/toolbox/upstream-netbsd/bin/cp/ |
H A D | cp.c | 99 progress(int sig __unused)
|
/system/core/toolbox/upstream-netbsd/bin/rm/ |
H A D | rm.c | 621 progress(int sig __unused)
|
/system/security/keystore/ |
H A D | IKeystoreService.cpp | 844 const void* sig; local 846 sig = data.readInplace(sigSize); 848 sig = NULL; 851 bool ret = verify(name, (const uint8_t*) in, (size_t) inSize, (const uint8_t*) sig,
|
/system/vold/ |
H A D | VolumeManager.cpp | 190 unsigned char sig[MD5_DIGEST_LENGTH]; local 207 MD5(reinterpret_cast<const unsigned char*>(id), strlen(id), sig); local 211 *p++ = digits[sig[i] >> 4]; 212 *p++ = digits[sig[i] & 0x0F];
|
/system/core/toolbox/ |
H A D | newfs_msdos.c | 139 u_int8_t sig; /* extended boot signature */ member in struct:bsx 685 mk1(bsx->sig, 0x29);
|