/system/core/libbacktrace/ |
H A D | thread_utils.c | 25 int tgkill(int tgid, int tid, int sig) { argument 26 return syscall(__NR_tgkill, tgid, tid, sig);
|
H A D | thread_utils.h | 28 int tgkill(int tgid, int tid, int sig);
|
/system/chre/platform/linux/ |
H A D | init.cc | 34 extern "C" void signalHandler(int sig) { argument 35 (void) sig;
|
/system/core/toolbox/upstream-netbsd/lib/libutil/ |
H A D | raise_default_signal.c | 49 * raise_default_signal sig 50 * Raise the default signal handler for sig, by 64 raise_default_signal(int sig) argument 80 (sigaddset(&mask, sig) == -1)) 89 if (sigaction(sig, &act, &origact) == -1) 94 if ((raise(sig) == -1) || 104 (void)sigaction(sig, &origact, NULL);
|
/system/core/adb/ |
H A D | adb_auth.h | 52 bool adbd_auth_verify(const char* token, size_t token_size, const char* sig, int sig_len);
|
H A D | adbd_auth.cpp | 49 bool adbd_auth_verify(const char* token, size_t token_size, const char* sig, int sig_len) { argument 83 reinterpret_cast<const uint8_t*>(sig), sig_len, key) == 1);
|
H A D | adb_auth_host.cpp | 302 static int adb_auth_sign(RSA* key, const char* token, size_t token_size, char* sig) { argument 310 reinterpret_cast<uint8_t*>(sig), &len, key)) {
|
/system/bt/stack/avdt/ |
H A D | avdt_msg.cc | 971 static uint8_t avdt_msg_prs_rej(tAVDT_MSG* p_msg, uint8_t* p, uint8_t sig) { argument 972 if ((sig == AVDT_SIG_SETCONFIG) || (sig == AVDT_SIG_RECONFIG)) { 975 } else if ((sig == AVDT_SIG_START) || (sig == AVDT_SIG_SUSPEND)) { 1039 uint8_t sig; local 1110 /* label, sig id, msg type are in hdr of p_curr_msg */ 1113 sig = (uint8_t)p_ccb->p_curr_msg->event; 1114 AVDT_TRACE_DEBUG("avdt_msg_send label:%d, msg:%d, sig:%d", label, msg, sig); 1494 uint8_t sig = 0; local [all...] |
H A D | avdt_defs.h | 170 #define AVDT_MSG_PRS_SIG(p, sig) \ 172 (sig) = (*(p)++) & 0x3F; \ 217 #define AVDT_MSG_BLD_SIG(p, sig) \ 219 *(p)++ = (uint8_t)(sig); \
|
/system/security/keystore/ |
H A D | keystore_attestation_id.cpp | 46 static std::vector<uint8_t> signature2SHA256(const content::pm::Signature& sig) { argument 48 SHA256(sig.data().data(), sig.data().size(), digest_buffer.data()); 188 for (auto sig = pinfo.sigs_begin(); sig != pinfo.sigs_end(); ++sig) { 189 signature_digests.push_back(signature2SHA256(*sig));
|
/system/extras/simpleperf/ |
H A D | IOEventLoop.cpp | 93 bool IOEventLoop::AddSignalEvent(int sig, argument 95 return AddEvent(sig, EV_SIGNAL | EV_PERSIST, nullptr, callback) != nullptr; 100 for (auto sig : sigs) { 101 if (!AddSignalEvent(sig, callback)) {
|
H A D | IOEventLoop.h | 47 // Register a signal Event, so [callback] is called each time signal [sig] 49 bool AddSignalEvent(int sig, const std::function<bool()>& callback);
|
/system/update_engine/scripts/update_payload/ |
H A D | test_utils.py | 93 sig, _ = sign_process.communicate(input=data_sha256_hash) 97 return sig 115 sig = self.sigs.signatures.add() 117 sig.version = version 119 sig.data = data 356 sig = SignSha256(temp_payload_file.getvalue(), privkey_file_name) 358 sigs_gen.AddSig(1, sig)
|
H A D | checker.py | 37 _CHECK_PAYLOAD_SIG = 'payload-sig' 1162 for sig, sig_name in common.SignatureIter(sigs.signatures, 'signatures'): 1166 self._CheckMandatoryField(sig, 'version', sig_report, sig_name) 1167 self._CheckMandatoryField(sig, 'data', None, sig_name) 1168 sig_report.AddField('data len', len(sig.data)) 1171 if sig.version == 1: 1172 self._CheckSha256Signature(sig.data, pubkey_file_name, 1176 sig.version)
|
/system/keymaster/ |
H A D | keymaster0_engine.h | 75 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, 88 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
|
H A D | keymaster0_engine.cpp | 253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); 343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 374 memcpy(sig, signature.get(), signature_length);
|
H A D | keymaster1_engine.h | 107 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
|
H A D | keymaster1_engine.cpp | 335 int Keymaster1Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 354 memcpy(sig, output.data, *sig_len);
|
/system/core/libmemunreachable/tests/ |
H A D | ThreadCapture_test.cpp | 284 const int sig = SIGUSR1; local 303 sigaction(sig, &act, NULL); 306 sigaddset(&set, sig); 324 syscall(SYS_tgkill, child, tid, sig);
|
/system/extras/latencytop/ |
H A D | latencytop.c | 58 static void signal_handler(int sig); 408 static void signal_handler(int sig) { argument
|
/system/extras/verity/ |
H A D | BootSignature.java | 143 public void setSignature(byte[] sig, AlgorithmIdentifier algId) { argument 145 signature = new DEROctetString(sig);
|
/system/security/keystore-engine/ |
H A D | android_engine.cpp | 234 * the resulting signature (an ASN.1 encoded blob) to |sig|. It returns one on 236 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 266 memcpy(sig, &reply[0], reply_len);
|
/system/core/libziparchive/ |
H A D | zip_writer.cc | 437 const uint32_t sig = DataDescriptor::kOptSignature; local 438 if (fwrite(&sig, sizeof(sig), 1, file_) != 1) {
|
/system/core/logd/ |
H A D | LogKlog.cpp | 561 uint64_t sig = strtoll(start + strlen(klogdStr), nullptr, 10); local 562 if (sig == signature.nsec()) {
|
/system/tpm/trunks/ |
H A D | tpm_utility_impl.cc | 600 signature->resize(signature_out.signature.rsapss.sig.size); 602 StringFrom_TPM2B_PUBLIC_KEY_RSA(signature_out.signature.rsapss.sig)); 604 signature->resize(signature_out.signature.rsassa.sig.size); 606 StringFrom_TPM2B_PUBLIC_KEY_RSA(signature_out.signature.rsassa.sig)); 641 signature_in.signature.rsapss.sig = Make_TPM2B_PUBLIC_KEY_RSA(signature); 645 signature_in.signature.rsassa.sig = Make_TPM2B_PUBLIC_KEY_RSA(signature);
|