/system/core/libbacktrace/ |
H A D | thread_utils.c | 25 int tgkill(int tgid, int tid, int sig) { argument 26 return syscall(__NR_tgkill, tgid, tid, sig);
|
/system/core/toolbox/upstream-netbsd/lib/libutil/ |
H A D | raise_default_signal.c | 49 * raise_default_signal sig 50 * Raise the default signal handler for sig, by 64 raise_default_signal(int sig) argument 80 (sigaddset(&mask, sig) == -1)) 89 if (sigaction(sig, &act, &origact) == -1) 94 if ((raise(sig) == -1) || 104 (void)sigaction(sig, &origact, NULL);
|
/system/core/libmincrypt/ |
H A D | dsa_sig.c | 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) { argument 82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) { 86 seq_len = sig[1]; 91 r_len = sig[3]; 98 if ((r_len < 1) || (r_len > seq_len - 5) || (sig[4 + r_len] != 0x02)) { 101 s_len = sig[5 + r_len]; 117 if (!trim_to_p256_bytes(r_bytes, &sig[4], r_len) 118 || !trim_to_p256_bytes(s_bytes, &sig[6 + r_len], s_len)) {
|
/system/core/adb/ |
H A D | adb_auth.h | 42 unsigned char* sig); 47 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } argument 53 size_t token_size, unsigned char* sig) { 62 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen); 52 adb_auth_sign(void* key, const unsigned char* token, size_t token_size, unsigned char* sig) argument
|
H A D | adb_auth_client.cpp | 142 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen) argument 155 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE);
|
H A D | adb_auth_host.cpp | 348 unsigned char* sig) 358 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) { 347 adb_auth_sign(void *node, const unsigned char* token, size_t token_size, unsigned char* sig) argument
|
/system/core/libmemunreachable/tests/ |
H A D | ThreadCapture_test.cpp | 284 const int sig = SIGUSR1; local 303 sigaction(sig, &act, NULL); 306 sigaddset(&set, sig); 324 syscall(SYS_tgkill, child, tid, sig);
|
/system/extras/verity/ |
H A D | BootSignature.java | 143 public void setSignature(byte[] sig, AlgorithmIdentifier algId) { argument 145 signature = new DEROctetString(sig);
|
/system/core/libziparchive/ |
H A D | zip_writer.cc | 380 const uint32_t sig = DataDescriptor::kOptSignature; local 381 if (fwrite(&sig, sizeof(sig), 1, file_) != 1) {
|
/system/extras/latencytop/ |
H A D | latencytop.c | 58 static void signal_handler(int sig); 408 static void signal_handler(int sig) { argument
|
/system/keymaster/ |
H A D | keymaster0_engine.cpp | 271 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 275 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); 361 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 392 memcpy(sig, signature.get(), signature_length);
|
H A D | keymaster1_engine.cpp | 339 int Keymaster1Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 358 memcpy(sig, output.data, *sig_len);
|
H A D | android_keymaster_test_utils.cpp | 306 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), local 311 nullptr /* input */, &sig, &out_params, &out_tmp);
|
/system/security/keystore-engine/ |
H A D | android_engine.cpp | 233 * the resulting signature (an ASN.1 encoded blob) to |sig|. It returns one on 235 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 276 memcpy(sig, reply, reply_len);
|
/system/bt/stack/avdt/ |
H A D | avdt_msg.c | 1128 static UINT8 avdt_msg_prs_rej(tAVDT_MSG *p_msg, UINT8 *p, UINT8 sig) argument 1130 if ((sig == AVDT_SIG_SETCONFIG) || (sig == AVDT_SIG_RECONFIG)) 1135 else if ((sig == AVDT_SIG_START) || (sig == AVDT_SIG_SUSPEND)) 1208 UINT8 sig; local 1280 /* label, sig id, msg type are in hdr of p_curr_msg */ 1283 sig = (UINT8) p_ccb->p_curr_msg->event; 1284 AVDT_TRACE_DEBUG("avdt_msg_send label:%d, msg:%d, sig:%d", label, msg, sig); 1696 UINT8 sig = 0; local [all...] |
/system/core/debuggerd/ |
H A D | tombstone.cpp | 59 static bool signal_has_si_addr(int sig) { argument 60 switch (sig) { 72 static const char* get_signame(int sig) { argument 73 switch(sig) {
|
/system/core/logd/ |
H A D | LogKlog.cpp | 599 uint64_t sig = strtoll(start + sizeof(klogd_message) - 1, NULL, 10); local 600 if (sig == signature.nsec()) {
|
/system/core/toolbox/ |
H A D | newfs_msdos.c | 139 u_int8_t sig; /* extended boot signature */ member in struct:bsx 685 mk1(bsx->sig, 0x29);
|
/system/security/keystore/ |
H A D | IKeystoreService.cpp | 1589 const void* sig; local 1591 sig = data.readInplace(sigSize); 1593 sig = NULL; 1596 bool ret = verify(name, (const uint8_t*) in, (size_t) inSize, (const uint8_t*) sig,
|
H A D | key_store_service.cpp | 1132 keymaster_blob_t sig = {signature, signatureLength}; local 1149 &sig, &outParams, &output);
|
/system/vold/ |
H A D | VolumeManager.cpp | 223 unsigned char sig[MD5_DIGEST_LENGTH]; local 240 MD5(reinterpret_cast<const unsigned char*>(id), strlen(id), sig); local 244 *p++ = digits[sig[i] >> 4]; 245 *p++ = digits[sig[i] & 0x0F];
|
/system/tpm/trunks/ |
H A D | tpm_generated.h | 1428 TPM2B_PUBLIC_KEY_RSA sig; member in struct:trunks::TPMS_SIGNATURE_RSASSA 1433 TPM2B_PUBLIC_KEY_RSA sig; member in struct:trunks::TPMS_SIGNATURE_RSAPSS
|