Searched defs:sig (Results 1 - 22 of 22) sorted by relevance

/system/core/libbacktrace/
H A Dthread_utils.c25 int tgkill(int tgid, int tid, int sig) { argument
26 return syscall(__NR_tgkill, tgid, tid, sig);
/system/chre/platform/linux/
H A Dinit.cc48 extern "C" void signalHandler(int sig) { argument
49 (void) sig;
/system/core/toolbox/upstream-netbsd/lib/libutil/
H A Draise_default_signal.c49 * raise_default_signal sig
50 * Raise the default signal handler for sig, by
64 raise_default_signal(int sig) argument
80 (sigaddset(&mask, sig) == -1))
89 if (sigaction(sig, &act, &origact) == -1)
94 if ((raise(sig) == -1) ||
104 (void)sigaction(sig, &origact, NULL);
/system/core/libunwindstack/include/unwindstack/
H A DUcontextArm64.h45 uint64_t sig; // unsigned long member in struct:unwindstack::arm64_sigset_t
/system/iot/attestation/atap/test/
H A Dfake_atap_ops.cpp74 uint8_t sig[ATAP_SIGNATURE_LEN_MAX],
72 auth_key_sign(const uint8_t* nonce, uint32_t nonce_len, uint8_t sig[ATAP_SIGNATURE_LEN_MAX], uint32_t* sig_len) argument
/system/core/libmemunreachable/tests/
H A DThreadCapture_test.cpp281 const int sig = SIGUSR1; local
301 sigaction(sig, &act, NULL);
304 sigaddset(&set, sig);
322 syscall(SYS_tgkill, child, tid, sig);
/system/extras/simpleperf/
H A DIOEventLoop.cpp108 bool IOEventLoop::AddSignalEvent(int sig, argument
110 return AddEvent(sig, EV_SIGNAL | EV_PERSIST, nullptr, callback) != nullptr;
115 for (auto sig : sigs) {
116 if (!AddSignalEvent(sig, callback)) {
/system/extras/verity/
H A DBootSignature.java148 public void setSignature(byte[] sig, AlgorithmIdentifier algId) { argument
150 signature = new DEROctetString(sig);
/system/core/adb/
H A Dadbd_auth.cpp49 bool adbd_auth_verify(const char* token, size_t token_size, const std::string& sig) { argument
83 reinterpret_cast<const uint8_t*>(sig.c_str()), sig.size(),
/system/core/debuggerd/libdebuggerd/
H A Dutility.cpp278 const char* get_signame(int sig) { argument
279 switch (sig) {
/system/extras/latencytop/
H A Dlatencytop.c56 static void signal_handler(int sig);
397 static void signal_handler(int sig) { argument
/system/iot/attestation/atap/ops/
H A Datap_ops_provider.cpp94 uint8_t sig[ATAP_SIGNATURE_LEN_MAX],
98 ->auth_key_sign(nonce, nonce_len, sig, sig_len);
91 forward_auth_key_sign(AtapOps* ops, const uint8_t* nonce, uint32_t nonce_len, uint8_t sig[ATAP_SIGNATURE_LEN_MAX], uint32_t* sig_len) argument
/system/keymaster/legacy_support/
H A Dkeymaster0_engine.cpp253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key);
343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
374 memcpy(sig, signature.get(), signature_length);
H A Dkeymaster1_engine.cpp334 int Keymaster1Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
353 memcpy(sig, output.data, *sig_len);
/system/security/keystore/
H A Dkeystore_attestation_id.cpp51 std::vector<uint8_t> signature2SHA256(const content::pm::Signature& sig) { argument
53 SHA256(sig.data().data(), sig.data().size(), digest_buffer.data());
204 for (auto sig = pinfo.sigs_begin(); sig != pinfo.sigs_end(); ++sig) {
205 signature_digests.push_back(signature2SHA256(*sig));
/system/security/keystore-engine/
H A Dandroid_engine.cpp143 * the resulting signature (an ASN.1 encoded blob) to |sig|. It returns one on
145 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument
175 memcpy(sig, &reply[0], reply_len);
/system/core/libziparchive/
H A Dzip_writer.cc438 const uint32_t sig = DataDescriptor::kOptSignature; local
439 if (fwrite(&sig, sizeof(sig), 1, file_) != 1) {
/system/bt/stack/avdt/
H A Davdt_msg.cc980 static uint8_t avdt_msg_prs_rej(tAVDT_MSG* p_msg, uint8_t* p, uint8_t sig) { argument
981 if ((sig == AVDT_SIG_SETCONFIG) || (sig == AVDT_SIG_RECONFIG)) {
984 } else if ((sig == AVDT_SIG_START) || (sig == AVDT_SIG_SUSPEND)) {
1048 uint8_t sig; local
1119 /* label, sig id, msg type are in hdr of p_curr_msg */
1122 sig = (uint8_t)p_ccb->p_curr_msg->event;
1123 AVDT_TRACE_DEBUG("avdt_msg_send label:%d, msg:%d, sig:%d", label, msg, sig);
1501 uint8_t sig = 0; local
[all...]
/system/core/logd/
H A DLogKlog.cpp561 uint64_t sig = strtoll(start + strlen(klogdStr), nullptr, 10); local
562 if (sig == signature.nsec()) {
/system/core/toolbox/
H A Dnewfs_msdos.c139 u_int8_t sig; /* extended boot signature */ member in struct:bsx
685 mk1(bsx->sig, 0x29);
/system/keymaster/tests/
H A Dandroid_keymaster_test_utils.cpp312 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), local
316 keymaster_error_t error = device()->finish(device(), op_handle_, &additional_params, &inp, &sig,
/system/tpm/trunks/
H A Dtpm_generated.h1460 TPM2B_PUBLIC_KEY_RSA sig; member in struct:trunks::TPMS_SIGNATURE_RSASSA
1465 TPM2B_PUBLIC_KEY_RSA sig; member in struct:trunks::TPMS_SIGNATURE_RSAPSS

Completed in 2179 milliseconds