/external/jmonkeyengine/engine/src/core-plugins/com/jme3/audio/plugins/ |
WAVLoader.java | 129 int sig = in.readInt(); local 130 if (sig != i_RIFF)
|
/external/mesa3d/src/glsl/ |
opt_constant_variable.cpp | 189 ir_function_signature *sig = local 191 if (do_constant_variable(&sig->body))
|
ir_reader.cpp | 292 ir_function_signature *sig = f->exact_matching_signature(&hir_parameters); local 293 if (sig == NULL && skip_body) { 295 sig = new(ctx) ir_function_signature(return_type); 296 sig->is_builtin = true; 297 f->add_signature(sig); 298 } else if (sig != NULL) { 299 const char *badvar = sig->qualifiers_match(&hir_parameters); 306 if (sig->return_type != return_type) { 316 assert(sig != NULL); 318 sig->replace_parameters(&hir_parameters) [all...] |
/external/openssl/crypto/objects/ |
obj_xref.c | 70 DECLARE_OBJ_BSEARCH_CMP_FN(nid_triple, nid_triple, sig); 71 IMPLEMENT_OBJ_BSEARCH_CMP_FN(nid_triple, nid_triple, sig);
|
/external/openssl/crypto/pem/ |
pem_seal.c | 145 int PEM_SealFinal(PEM_ENCODE_SEAL_CTX *ctx, unsigned char *sig, int *sigl, 174 *sigl=EVP_EncodeBlock(sig,s,i);
|
/external/qemu/ |
qemu-thread.c | 170 void qemu_thread_signal(QemuThread *thread, int sig) 174 err = pthread_kill(thread->thread, sig);
|
/external/bluetooth/bluez/compat/ |
msdun.c | 51 static void sig_alarm(int sig)
|
/external/kernel-headers/original/asm-arm/ |
signal.h | 20 unsigned long sig[_NSIG_WORDS]; member in struct:__anon7647
|
/external/openssh/ |
auth2-pubkey.c | 73 u_char *pkblob, *sig; local 114 sig = packet_get_string(&slen); 143 PRIVSEP(key_verify(key, sig, slen, buffer_ptr(&b), 147 xfree(sig);
|
/external/valgrind/main/coregrind/ |
m_vki.c | 72 vg_assert( 8 * sizeof(set.sig[0]) == _VKI_NSIG_BPW );
|
/external/valgrind/main/none/tests/ |
thread-exits.c | 36 static void handler(int sig)
|
/frameworks/base/core/java/android/os/ |
RecoverySystem.java | 257 // fall back to the cert algorithm if the sig one 263 Signature sig = Signature.getInstance(alg); local 264 sig.initVerify(cert); 281 sig.update(buffer, 0, read); 303 if (!sig.verify(sigInfo.getEncryptedDigest())) {
|
/cts/tests/tests/webkitsecurity/generate/ |
postprocess.py | 98 sig = " private static final String TEST_PATH = \"" 100 if line.startswith(sig): 101 return line[len(sig):].strip()[:-2]
|
/external/openssl/crypto/dsa/ |
dsa.h | 136 DSA_SIG *sig, DSA *dsa); 199 DSA_SIG *sig,DSA *dsa); 216 unsigned char *sig, unsigned int *siglen, DSA *dsa);
|
/external/openssl/include/openssl/ |
dsa.h | 136 DSA_SIG *sig, DSA *dsa); 199 DSA_SIG *sig,DSA *dsa); 216 unsigned char *sig, unsigned int *siglen, DSA *dsa);
|
/external/webkit/Source/WebCore/bridge/jni/ |
JNIUtility.h | 58 jmethodID getMethodID(jobject, const char* name, const char* sig); 186 static T callJNIMethodV(jobject obj, const char* name, const char* sig, va_list args) 194 jmethodID mid = env->GetMethodID(cls, name, sig);
|
/external/webkit/Tools/DumpRenderTree/qt/ |
main.cpp | 124 static NO_RETURN void crashHandler(int sig) 126 fprintf(stderr, "%s\n", strsignal(sig)); 128 exit(128 + sig);
|
/libcore/luni/src/main/java/java/util/zip/ |
ZipInputStream.java | 199 int sig = Memory.peekInt(hdrBuf, 0, ByteOrder.LITTLE_ENDIAN); local 200 if (sig != (int) EXTSIG) { 201 throw new ZipException(String.format("unknown format (EXTSIG=%x)", sig));
|
/external/openssl/apps/ |
pkeyutl.c | 101 unsigned char *buf_in = NULL, *buf_out = NULL, *sig = NULL; local 298 siglen = bio_to_mem(&sig, keysize * 10, sigbio); 332 rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen, 383 if (sig) 384 OPENSSL_free(sig);
|
/external/openssl/crypto/evp/ |
evp_locl.h | 307 int (*sign)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 312 const unsigned char *sig, size_t siglen, 318 const unsigned char *sig, size_t siglen); 321 int (*signctx)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 325 int (*verifyctx)(EVP_PKEY_CTX *ctx, const unsigned char *sig,int siglen,
|
/external/qemu/hw/ |
usb-msd.c | 54 uint32_t sig; member in struct:usb_msd_cbw 64 uint32_t sig; member in struct:usb_msd_csw 164 csw.sig = cpu_to_le32(0x53425355); 372 if (le32_to_cpu(cbw.sig) != 0x43425355) { 374 le32_to_cpu(cbw.sig));
|
/external/wpa_supplicant_8/hostapd/ |
main.c | 355 static void handle_term(int sig, void *signal_ctx) 357 wpa_printf(MSG_DEBUG, "Signal %d received - terminating", sig); 377 static void handle_reload(int sig, void *signal_ctx) 381 sig); 386 static void handle_dump_state(int sig, void *signal_ctx)
|
/ndk/sources/host-tools/make-3.81/ |
make.h | 124 # define sigmask(sig) (1 << ((sig) - 1)) 367 # define kill(pid,sig) w32_kill(pid,sig) 370 extern int kill(int pid, int sig);
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
X509CertificateObject.java | 633 byte[] sig = this.getSignature(); 635 buf.append(" Signature: ").append(new String(Hex.encode(sig, 0, 20))).append(nl); 636 for (int i = 20; i < sig.length; i += 20) 638 if (i < sig.length - 20) 640 buf.append(" ").append(new String(Hex.encode(sig, i, 20))).append(nl); 644 buf.append(" ").append(new String(Hex.encode(sig, i, sig.length - i))).append(nl);
|
/external/strace/ |
signal.c | 47 #define sigmask(sig) (1UL << ((sig) - 1)) 270 signame(sig) 271 int sig; 274 if (sig >= 0 && sig < nsignals) { 275 return signalent[sig]; 277 } else if (sig >= __SIGRTMIN && sig <= __SIGRTMAX) { 278 sprintf(buf, "SIGRT_%ld", (long)(sig - __SIGRTMIN)) [all...] |