/system/core/libbacktrace/ |
H A D | thread_utils.c | 25 int tgkill(int tgid, int tid, int sig) { argument 26 return syscall(__NR_tgkill, tgid, tid, sig);
|
/system/chre/platform/linux/ |
H A D | init.cc | 48 extern "C" void signalHandler(int sig) { argument 49 (void) sig;
|
/system/core/toolbox/upstream-netbsd/lib/libutil/ |
H A D | raise_default_signal.c | 49 * raise_default_signal sig 50 * Raise the default signal handler for sig, by 64 raise_default_signal(int sig) argument 80 (sigaddset(&mask, sig) == -1)) 89 if (sigaction(sig, &act, &origact) == -1) 94 if ((raise(sig) == -1) || 104 (void)sigaction(sig, &origact, NULL);
|
/system/core/libunwindstack/include/unwindstack/ |
H A D | UcontextArm64.h | 45 uint64_t sig; // unsigned long member in struct:unwindstack::arm64_sigset_t
|
/system/iot/attestation/atap/test/ |
H A D | fake_atap_ops.cpp | 74 uint8_t sig[ATAP_SIGNATURE_LEN_MAX], 72 auth_key_sign(const uint8_t* nonce, uint32_t nonce_len, uint8_t sig[ATAP_SIGNATURE_LEN_MAX], uint32_t* sig_len) argument
|
/system/core/libmemunreachable/tests/ |
H A D | ThreadCapture_test.cpp | 281 const int sig = SIGUSR1; local 301 sigaction(sig, &act, NULL); 304 sigaddset(&set, sig); 322 syscall(SYS_tgkill, child, tid, sig);
|
/system/extras/simpleperf/ |
H A D | IOEventLoop.cpp | 108 bool IOEventLoop::AddSignalEvent(int sig, argument 110 return AddEvent(sig, EV_SIGNAL | EV_PERSIST, nullptr, callback) != nullptr; 115 for (auto sig : sigs) { 116 if (!AddSignalEvent(sig, callback)) {
|
/system/extras/verity/ |
H A D | BootSignature.java | 148 public void setSignature(byte[] sig, AlgorithmIdentifier algId) { argument 150 signature = new DEROctetString(sig);
|
/system/core/adb/ |
H A D | adbd_auth.cpp | 49 bool adbd_auth_verify(const char* token, size_t token_size, const std::string& sig) { argument 83 reinterpret_cast<const uint8_t*>(sig.c_str()), sig.size(),
|
/system/core/debuggerd/libdebuggerd/ |
H A D | utility.cpp | 278 const char* get_signame(int sig) { argument 279 switch (sig) {
|
/system/extras/latencytop/ |
H A D | latencytop.c | 56 static void signal_handler(int sig); 397 static void signal_handler(int sig) { argument
|
/system/iot/attestation/atap/ops/ |
H A D | atap_ops_provider.cpp | 94 uint8_t sig[ATAP_SIGNATURE_LEN_MAX], 98 ->auth_key_sign(nonce, nonce_len, sig, sig_len); 91 forward_auth_key_sign(AtapOps* ops, const uint8_t* nonce, uint32_t nonce_len, uint8_t sig[ATAP_SIGNATURE_LEN_MAX], uint32_t* sig_len) argument
|
/system/keymaster/legacy_support/ |
H A D | keymaster0_engine.cpp | 253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); 343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 374 memcpy(sig, signature.get(), signature_length);
|
H A D | keymaster1_engine.cpp | 334 int Keymaster1Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 353 memcpy(sig, output.data, *sig_len);
|
/system/security/keystore/ |
H A D | keystore_attestation_id.cpp | 51 std::vector<uint8_t> signature2SHA256(const content::pm::Signature& sig) { argument 53 SHA256(sig.data().data(), sig.data().size(), digest_buffer.data()); 204 for (auto sig = pinfo.sigs_begin(); sig != pinfo.sigs_end(); ++sig) { 205 signature_digests.push_back(signature2SHA256(*sig));
|
/system/security/keystore-engine/ |
H A D | android_engine.cpp | 143 * the resulting signature (an ASN.1 encoded blob) to |sig|. It returns one on 145 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, argument 175 memcpy(sig, &reply[0], reply_len);
|
/system/core/libziparchive/ |
H A D | zip_writer.cc | 438 const uint32_t sig = DataDescriptor::kOptSignature; local 439 if (fwrite(&sig, sizeof(sig), 1, file_) != 1) {
|
/system/bt/stack/avdt/ |
H A D | avdt_msg.cc | 980 static uint8_t avdt_msg_prs_rej(tAVDT_MSG* p_msg, uint8_t* p, uint8_t sig) { argument 981 if ((sig == AVDT_SIG_SETCONFIG) || (sig == AVDT_SIG_RECONFIG)) { 984 } else if ((sig == AVDT_SIG_START) || (sig == AVDT_SIG_SUSPEND)) { 1048 uint8_t sig; local 1119 /* label, sig id, msg type are in hdr of p_curr_msg */ 1122 sig = (uint8_t)p_ccb->p_curr_msg->event; 1123 AVDT_TRACE_DEBUG("avdt_msg_send label:%d, msg:%d, sig:%d", label, msg, sig); 1501 uint8_t sig = 0; local [all...] |
/system/core/logd/ |
H A D | LogKlog.cpp | 561 uint64_t sig = strtoll(start + strlen(klogdStr), nullptr, 10); local 562 if (sig == signature.nsec()) {
|
/system/core/toolbox/ |
H A D | newfs_msdos.c | 139 u_int8_t sig; /* extended boot signature */ member in struct:bsx 685 mk1(bsx->sig, 0x29);
|
/system/keymaster/tests/ |
H A D | android_keymaster_test_utils.cpp | 312 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), local 316 keymaster_error_t error = device()->finish(device(), op_handle_, &additional_params, &inp, &sig,
|
/system/tpm/trunks/ |
H A D | tpm_generated.h | 1460 TPM2B_PUBLIC_KEY_RSA sig; member in struct:trunks::TPMS_SIGNATURE_RSASSA 1465 TPM2B_PUBLIC_KEY_RSA sig; member in struct:trunks::TPMS_SIGNATURE_RSAPSS
|