Searched refs:sig (Results 1 - 25 of 33) sorted by relevance

12

/system/core/libbacktrace/
H A Dthread_utils.c25 int tgkill(int tgid, int tid, int sig) { argument
26 return syscall(__NR_tgkill, tgid, tid, sig);
H A Dthread_utils.h28 int tgkill(int tgid, int tid, int sig);
/system/chre/platform/linux/
H A Dinit.cc34 extern "C" void signalHandler(int sig) { argument
35 (void) sig;
/system/core/toolbox/upstream-netbsd/lib/libutil/
H A Draise_default_signal.c49 * raise_default_signal sig
50 * Raise the default signal handler for sig, by
64 raise_default_signal(int sig) argument
80 (sigaddset(&mask, sig) == -1))
89 if (sigaction(sig, &act, &origact) == -1)
94 if ((raise(sig) == -1) ||
104 (void)sigaction(sig, &origact, NULL);
/system/core/adb/
H A Dadb_auth.h52 bool adbd_auth_verify(const char* token, size_t token_size, const char* sig, int sig_len);
H A Dadbd_auth.cpp49 bool adbd_auth_verify(const char* token, size_t token_size, const char* sig, int sig_len) { argument
83 reinterpret_cast<const uint8_t*>(sig), sig_len, key) == 1);
H A Dadb_auth_host.cpp302 static int adb_auth_sign(RSA* key, const char* token, size_t token_size, char* sig) { argument
310 reinterpret_cast<uint8_t*>(sig), &len, key)) {
/system/bt/stack/avdt/
H A Davdt_msg.cc971 static uint8_t avdt_msg_prs_rej(tAVDT_MSG* p_msg, uint8_t* p, uint8_t sig) { argument
972 if ((sig == AVDT_SIG_SETCONFIG) || (sig == AVDT_SIG_RECONFIG)) {
975 } else if ((sig == AVDT_SIG_START) || (sig == AVDT_SIG_SUSPEND)) {
1039 uint8_t sig; local
1110 /* label, sig id, msg type are in hdr of p_curr_msg */
1113 sig = (uint8_t)p_ccb->p_curr_msg->event;
1114 AVDT_TRACE_DEBUG("avdt_msg_send label:%d, msg:%d, sig:%d", label, msg, sig);
1494 uint8_t sig = 0; local
[all...]
H A Davdt_defs.h170 #define AVDT_MSG_PRS_SIG(p, sig) \
172 (sig) = (*(p)++) & 0x3F; \
217 #define AVDT_MSG_BLD_SIG(p, sig) \
219 *(p)++ = (uint8_t)(sig); \
/system/security/keystore/
H A Dkeystore_attestation_id.cpp46 static std::vector<uint8_t> signature2SHA256(const content::pm::Signature& sig) { argument
48 SHA256(sig.data().data(), sig.data().size(), digest_buffer.data());
188 for (auto sig = pinfo.sigs_begin(); sig != pinfo.sigs_end(); ++sig) {
189 signature_digests.push_back(signature2SHA256(*sig));
/system/extras/simpleperf/
H A DIOEventLoop.cpp93 bool IOEventLoop::AddSignalEvent(int sig, argument
95 return AddEvent(sig, EV_SIGNAL | EV_PERSIST, nullptr, callback) != nullptr;
100 for (auto sig : sigs) {
101 if (!AddSignalEvent(sig, callback)) {
H A DIOEventLoop.h47 // Register a signal Event, so [callback] is called each time signal [sig]
49 bool AddSignalEvent(int sig, const std::function<bool()>& callback);
/system/update_engine/scripts/update_payload/
H A Dtest_utils.py93 sig, _ = sign_process.communicate(input=data_sha256_hash)
97 return sig
115 sig = self.sigs.signatures.add()
117 sig.version = version
119 sig.data = data
356 sig = SignSha256(temp_payload_file.getvalue(), privkey_file_name)
358 sigs_gen.AddSig(1, sig)
H A Dchecker.py37 _CHECK_PAYLOAD_SIG = 'payload-sig'
1162 for sig, sig_name in common.SignatureIter(sigs.signatures, 'signatures'):
1166 self._CheckMandatoryField(sig, 'version', sig_report, sig_name)
1167 self._CheckMandatoryField(sig, 'data', None, sig_name)
1168 sig_report.AddField('data len', len(sig.data))
1171 if sig.version == 1:
1172 self._CheckSha256Signature(sig.data, pubkey_file_name,
1176 sig.version)
/system/keymaster/
H A Dkeymaster0_engine.h75 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
88 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
H A Dkeymaster0_engine.cpp253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key);
343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
374 memcpy(sig, signature.get(), signature_length);
H A Dkeymaster1_engine.h107 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
H A Dkeymaster1_engine.cpp335 int Keymaster1Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
354 memcpy(sig, output.data, *sig_len);
/system/core/libmemunreachable/tests/
H A DThreadCapture_test.cpp284 const int sig = SIGUSR1; local
303 sigaction(sig, &act, NULL);
306 sigaddset(&set, sig);
324 syscall(SYS_tgkill, child, tid, sig);
/system/extras/latencytop/
H A Dlatencytop.c58 static void signal_handler(int sig);
408 static void signal_handler(int sig) { argument
/system/extras/verity/
H A DBootSignature.java143 public void setSignature(byte[] sig, AlgorithmIdentifier algId) { argument
145 signature = new DEROctetString(sig);
/system/security/keystore-engine/
H A Dandroid_engine.cpp234 * the resulting signature (an ASN.1 encoded blob) to |sig|. It returns one on
236 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
266 memcpy(sig, &reply[0], reply_len);
/system/core/libziparchive/
H A Dzip_writer.cc437 const uint32_t sig = DataDescriptor::kOptSignature; local
438 if (fwrite(&sig, sizeof(sig), 1, file_) != 1) {
/system/core/logd/
H A DLogKlog.cpp561 uint64_t sig = strtoll(start + strlen(klogdStr), nullptr, 10); local
562 if (sig == signature.nsec()) {
/system/tpm/trunks/
H A Dtpm_utility_impl.cc600 signature->resize(signature_out.signature.rsapss.sig.size);
602 StringFrom_TPM2B_PUBLIC_KEY_RSA(signature_out.signature.rsapss.sig));
604 signature->resize(signature_out.signature.rsassa.sig.size);
606 StringFrom_TPM2B_PUBLIC_KEY_RSA(signature_out.signature.rsassa.sig));
641 signature_in.signature.rsapss.sig = Make_TPM2B_PUBLIC_KEY_RSA(signature);
645 signature_in.signature.rsassa.sig = Make_TPM2B_PUBLIC_KEY_RSA(signature);

Completed in 2630 milliseconds

12