/external/mesa3d/src/gallium/state_trackers/d3d1x/d3d1xshader/include/ |
dxbc.h | 121 int dxbc_parse_signature(dxbc_chunk_signature* sig, D3D11_SIGNATURE_PARAMETER_DESC** params);
|
/external/chromium_org/third_party/boringssl/src/crypto/dsa/ |
dsa_test.c | 108 unsigned char sig[256]; local 163 DSA_sign(0, str1, 20, sig, &siglen, dsa); 164 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1) {
|
/external/chromium_org/third_party/libvpx/source/libvpx/vp9/decoder/ |
vp9_dthread.c | 64 int sig = 1; local 69 sig = 0; 74 if (sig) {
|
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/util/ |
u_cpu_detect.c | 93 sigill_handler(int sig) 96 signal (sig, SIG_DFL); 97 raise (sig);
|
/external/chromium_org/third_party/sqlite/src/test/ |
threadtest1.c | 191 pthread_cond_t sig = PTHREAD_COND_INITIALIZER; variable 242 pthread_cond_signal(&sig); 280 pthread_cond_wait(&sig, &lock);
|
/external/chromium_org/third_party/webrtc/base/ |
sslstreamadapter_unittest.cc | 109 virtual void OnEventIn(rtc::StreamInterface *stream, int sig, 113 if (sig & mask) { 114 LOG(LS_INFO) << "SSLDummyStream::OnEvent side=" << side_ << " sig=" 115 << sig << " forwarding upward"; local 116 PostEvent(sig & mask, 0); 121 virtual void OnEventOut(rtc::StreamInterface *stream, int sig, 123 if (sig & rtc::SE_WRITE) { 124 LOG(LS_INFO) << "SSLDummyStream::OnEvent side=" << side_ << " sig=" 125 << sig << " forwarding upward"; local 127 PostEvent(sig & rtc::SE_WRITE, 0) [all...] |
/external/libvpx/libvpx/vp9/decoder/ |
vp9_dthread.c | 64 int sig = 1; local 69 sig = 0; 74 if (sig) {
|
/external/mesa3d/src/gallium/auxiliary/util/ |
u_cpu_detect.c | 93 sigill_handler(int sig) 96 signal (sig, SIG_DFL); 97 raise (sig);
|
/external/openssl/crypto/dsa/ |
dsa.h | 141 DSA_SIG *sig, DSA *dsa); 204 DSA_SIG *sig,DSA *dsa); 221 unsigned char *sig, unsigned int *siglen, DSA *dsa);
|
/external/openssl/include/openssl/ |
dsa.h | 141 DSA_SIG *sig, DSA *dsa); 204 DSA_SIG *sig,DSA *dsa); 221 unsigned char *sig, unsigned int *siglen, DSA *dsa);
|
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
evp.h | 270 /* EVP_DigestVerifyFinal verifies that |sig_len| bytes of |sig| are a valid 276 OPENSSL_EXPORT int EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, 302 * |EVP_SignUpdate|, using the key |pkey|, and writes it to |sig|. On entry, 303 * |sig| must point to at least |EVP_PKEY_size(pkey)| bytes of space. The 310 OPENSSL_EXPORT int EVP_SignFinal(const EVP_MD_CTX *ctx, uint8_t *sig, 335 /* EVP_VerifyFinal verifies that |sig_len| bytes of |sig| are a valid 343 OPENSSL_EXPORT int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig, 438 /* EVP_PKEY_sign signs |data_len| bytes from |data| using |ctx|. If |sig| is 441 * space available at |sig|. If sufficient, the signature will be written to 442 * |sig| and |*sig_len| updated with the true length [all...] |
/external/openssl/apps/ |
pkeyutl.c | 101 unsigned char *buf_in = NULL, *buf_out = NULL, *sig = NULL; local 298 siglen = bio_to_mem(&sig, keysize * 10, sigbio); 332 rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen, 383 if (sig) 384 OPENSSL_free(sig);
|
/external/openssl/crypto/evp/ |
evp_locl.h | 307 int (*sign)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 312 const unsigned char *sig, size_t siglen, 318 const unsigned char *sig, size_t siglen); 321 int (*signctx)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 325 int (*verifyctx)(EVP_PKEY_CTX *ctx, const unsigned char *sig,int siglen,
|
/external/libunwind/tests/ |
ia64-test-nat-asm.S | 110 setf.sig f2 = r4 120 getf.sig r4 = f2 // restore r4 386 (p6) setf.sig f31 = r5 // save r5 in f31 if it's a NaT 390 setf.sig f32 = r6 // save r6 in f32 (fph partition) 405 setf.sig f4 = r4 420 (p6) getf.sig r5 = f31 422 getf.sig r6 = f32
|
/external/dnsmasq/src/ |
dnsmasq.c | 63 static void sig_handler(int sig); 712 static void sig_handler(int sig) 718 if (sig == SIGTERM) 724 if (sig == SIGALRM) 732 if (sig == SIGHUP) 734 else if (sig == SIGCHLD) 736 else if (sig == SIGALRM) 738 else if (sig == SIGTERM) 740 else if (sig == SIGUSR1) 742 else if (sig == SIGUSR2 [all...] |
/external/jdiff/src/jdiff/ |
APIComparator.java | 636 String sig = methodDiff.newSignature_; local 637 if (sig.compareTo("void") == 0) 638 sig = ""; 641 String link2 = "<a href=\"" + fqName + HTMLReportGenerator.reportFileExt + "#" + fqName + "." + newMethod.name_ + "_changed(" + sig + ")\" class=\"hiddenlink\">"; 642 String id = pkgDiff.name_ + "." + classDiff.name_ + ".dmethod." + newMethod.name_ + "(" + HTMLReportGenerator.simpleName(sig) + ")"; 644 link2 + HTMLReportGenerator.simpleName(methodDiff.newType_) + " <b>" + newMethod.name_ + "(" + HTMLReportGenerator.simpleName(sig) + ")</b></a>"; 852 String sig = m.getSignature(); local [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
p_rsa_asn1.c | 385 const ASN1_STRING *sig, int indent, ASN1_PCTX *pctx) { 402 } else if (!sig && BIO_puts(bp, "\n") <= 0) { 406 if (sig) { 407 return X509_signature_dump(bp, sig, indent); 672 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, 689 ASN1_BIT_STRING *sig) {
|
evp_ctx.c | 251 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len, 262 return ctx->pmeth->sign(ctx, sig, sig_len, data, data_len); 283 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len, 294 return ctx->pmeth->verify(ctx, sig, sig_len, data, data_len);
|
/external/openssl/crypto/rsa/ |
rsa_ameth.c | 386 const ASN1_STRING *sig, 403 else if (!sig && BIO_puts(bp, "\n") <= 0) 405 if (sig) 406 return X509_signature_dump(bp, sig, indent); 461 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig, 569 ASN1_BIT_STRING *sig)
|
/external/chromium_org/net/ssl/ |
openssl_platform_key_mac.cc | 364 uint8_t* sig, 377 ex_data, &out_len, sig, ECDSA_size(ec_key), digest, digest_len); 386 const uint8_t* sig,
|
/external/chromium_org/third_party/tcmalloc/chromium/src/ |
profile-handler.cc | 211 static void SignalHandler(int sig, siginfo_t* sinfo, void* ucontext); 488 void ProfileHandler::SignalHandler(int sig, siginfo_t* sinfo, void* ucontext) { 501 (*it)->callback(sig, sinfo, ucontext, (*it)->callback_arg);
|
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
profile-handler.cc | 211 static void SignalHandler(int sig, siginfo_t* sinfo, void* ucontext); 488 void ProfileHandler::SignalHandler(int sig, siginfo_t* sinfo, void* ucontext) { 501 (*it)->callback(sig, sinfo, ucontext, (*it)->callback_arg);
|
/external/lzma/CPP/7zip/Archive/ |
LzmaHandler.cpp | 58 const Byte *sig = buf + (isThereFilter ? 1 : 0);
local 60 LzmaProps[i] = sig[i];
61 Size = GetUi64(sig + 5);
|
/external/chromium_org/third_party/boringssl/src/crypto/x509/ |
t_x509.c | 304 int X509_signature_print(BIO *bp, X509_ALGOR *sigalg, ASN1_STRING *sig) 319 return ameth->sig_print(bp, sigalg, sig, 9, 0); 322 if (sig) 323 return X509_signature_dump(bp, sig, 9);
|
/external/ipsec-tools/src/racoon/ |
eaytest.c | 92 rsa_verify_with_pubkey(src, sig, pubkey_txt) 93 vchar_t *src, *sig; 106 error = eay_check_rsasign(src, sig, evp->pkey.rsa); 118 vchar_t *priv, *sig; local 163 sig = eay_get_x509sign(&src, priv); 164 if (sig == NULL) { 170 PVDUMP(sig); 173 if (rsa_verify_with_pubkey (&src, sig, pubkey) != 0) { 183 if (rsa_verify_with_pubkey (&src, sig, pubkey_wrong) != 0)
|