HomeSort by relevance Sort by last modified time
    Searched refs:sig (Results 251 - 275 of 518) sorted by null

<<11121314151617181920>>

  /external/mesa3d/src/gallium/state_trackers/d3d1x/d3d1xshader/include/
dxbc.h 121 int dxbc_parse_signature(dxbc_chunk_signature* sig, D3D11_SIGNATURE_PARAMETER_DESC** params);
  /external/chromium_org/third_party/boringssl/src/crypto/dsa/
dsa_test.c 108 unsigned char sig[256]; local
163 DSA_sign(0, str1, 20, sig, &siglen, dsa);
164 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1) {
  /external/chromium_org/third_party/libvpx/source/libvpx/vp9/decoder/
vp9_dthread.c 64 int sig = 1; local
69 sig = 0;
74 if (sig) {
  /external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/util/
u_cpu_detect.c 93 sigill_handler(int sig)
96 signal (sig, SIG_DFL);
97 raise (sig);
  /external/chromium_org/third_party/sqlite/src/test/
threadtest1.c 191 pthread_cond_t sig = PTHREAD_COND_INITIALIZER; variable
242 pthread_cond_signal(&sig);
280 pthread_cond_wait(&sig, &lock);
  /external/chromium_org/third_party/webrtc/base/
sslstreamadapter_unittest.cc 109 virtual void OnEventIn(rtc::StreamInterface *stream, int sig,
113 if (sig & mask) {
114 LOG(LS_INFO) << "SSLDummyStream::OnEvent side=" << side_ << " sig="
115 << sig << " forwarding upward"; local
116 PostEvent(sig & mask, 0);
121 virtual void OnEventOut(rtc::StreamInterface *stream, int sig,
123 if (sig & rtc::SE_WRITE) {
124 LOG(LS_INFO) << "SSLDummyStream::OnEvent side=" << side_ << " sig="
125 << sig << " forwarding upward"; local
127 PostEvent(sig & rtc::SE_WRITE, 0)
    [all...]
  /external/libvpx/libvpx/vp9/decoder/
vp9_dthread.c 64 int sig = 1; local
69 sig = 0;
74 if (sig) {
  /external/mesa3d/src/gallium/auxiliary/util/
u_cpu_detect.c 93 sigill_handler(int sig)
96 signal (sig, SIG_DFL);
97 raise (sig);
  /external/openssl/crypto/dsa/
dsa.h 141 DSA_SIG *sig, DSA *dsa);
204 DSA_SIG *sig,DSA *dsa);
221 unsigned char *sig, unsigned int *siglen, DSA *dsa);
  /external/openssl/include/openssl/
dsa.h 141 DSA_SIG *sig, DSA *dsa);
204 DSA_SIG *sig,DSA *dsa);
221 unsigned char *sig, unsigned int *siglen, DSA *dsa);
  /external/chromium_org/third_party/boringssl/src/include/openssl/
evp.h 270 /* EVP_DigestVerifyFinal verifies that |sig_len| bytes of |sig| are a valid
276 OPENSSL_EXPORT int EVP_DigestVerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig,
302 * |EVP_SignUpdate|, using the key |pkey|, and writes it to |sig|. On entry,
303 * |sig| must point to at least |EVP_PKEY_size(pkey)| bytes of space. The
310 OPENSSL_EXPORT int EVP_SignFinal(const EVP_MD_CTX *ctx, uint8_t *sig,
335 /* EVP_VerifyFinal verifies that |sig_len| bytes of |sig| are a valid
343 OPENSSL_EXPORT int EVP_VerifyFinal(EVP_MD_CTX *ctx, const uint8_t *sig,
438 /* EVP_PKEY_sign signs |data_len| bytes from |data| using |ctx|. If |sig| is
441 * space available at |sig|. If sufficient, the signature will be written to
442 * |sig| and |*sig_len| updated with the true length
    [all...]
  /external/openssl/apps/
pkeyutl.c 101 unsigned char *buf_in = NULL, *buf_out = NULL, *sig = NULL; local
298 siglen = bio_to_mem(&sig, keysize * 10, sigbio);
332 rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen,
383 if (sig)
384 OPENSSL_free(sig);
  /external/openssl/crypto/evp/
evp_locl.h 307 int (*sign)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen,
312 const unsigned char *sig, size_t siglen,
318 const unsigned char *sig, size_t siglen);
321 int (*signctx)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen,
325 int (*verifyctx)(EVP_PKEY_CTX *ctx, const unsigned char *sig,int siglen,
  /external/libunwind/tests/
ia64-test-nat-asm.S 110 setf.sig f2 = r4
120 getf.sig r4 = f2 // restore r4
386 (p6) setf.sig f31 = r5 // save r5 in f31 if it's a NaT
390 setf.sig f32 = r6 // save r6 in f32 (fph partition)
405 setf.sig f4 = r4
420 (p6) getf.sig r5 = f31
422 getf.sig r6 = f32
  /external/dnsmasq/src/
dnsmasq.c 63 static void sig_handler(int sig);
712 static void sig_handler(int sig)
718 if (sig == SIGTERM)
724 if (sig == SIGALRM)
732 if (sig == SIGHUP)
734 else if (sig == SIGCHLD)
736 else if (sig == SIGALRM)
738 else if (sig == SIGTERM)
740 else if (sig == SIGUSR1)
742 else if (sig == SIGUSR2
    [all...]
  /external/jdiff/src/jdiff/
APIComparator.java 636 String sig = methodDiff.newSignature_; local
637 if (sig.compareTo("void") == 0)
638 sig = "";
641 String link2 = "<a href=\"" + fqName + HTMLReportGenerator.reportFileExt + "#" + fqName + "." + newMethod.name_ + "_changed(" + sig + ")\" class=\"hiddenlink\">";
642 String id = pkgDiff.name_ + "." + classDiff.name_ + ".dmethod." + newMethod.name_ + "(" + HTMLReportGenerator.simpleName(sig) + ")";
644 link2 + HTMLReportGenerator.simpleName(methodDiff.newType_) + " <b>" + newMethod.name_ + "(" + HTMLReportGenerator.simpleName(sig) + ")</b></a>";
852 String sig = m.getSignature(); local
    [all...]
  /external/chromium_org/third_party/boringssl/src/crypto/evp/
p_rsa_asn1.c 385 const ASN1_STRING *sig, int indent, ASN1_PCTX *pctx) {
402 } else if (!sig && BIO_puts(bp, "\n") <= 0) {
406 if (sig) {
407 return X509_signature_dump(bp, sig, indent);
672 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig,
689 ASN1_BIT_STRING *sig) {
evp_ctx.c 251 int EVP_PKEY_sign(EVP_PKEY_CTX *ctx, uint8_t *sig, size_t *sig_len,
262 return ctx->pmeth->sign(ctx, sig, sig_len, data, data_len);
283 int EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const uint8_t *sig, size_t sig_len,
294 return ctx->pmeth->verify(ctx, sig, sig_len, data, data_len);
  /external/openssl/crypto/rsa/
rsa_ameth.c 386 const ASN1_STRING *sig,
403 else if (!sig && BIO_puts(bp, "\n") <= 0)
405 if (sig)
406 return X509_signature_dump(bp, sig, indent);
461 X509_ALGOR *sigalg, ASN1_BIT_STRING *sig,
569 ASN1_BIT_STRING *sig)
  /external/chromium_org/net/ssl/
openssl_platform_key_mac.cc 364 uint8_t* sig,
377 ex_data, &out_len, sig, ECDSA_size(ec_key), digest, digest_len);
386 const uint8_t* sig,
  /external/chromium_org/third_party/tcmalloc/chromium/src/
profile-handler.cc 211 static void SignalHandler(int sig, siginfo_t* sinfo, void* ucontext);
488 void ProfileHandler::SignalHandler(int sig, siginfo_t* sinfo, void* ucontext) {
501 (*it)->callback(sig, sinfo, ucontext, (*it)->callback_arg);
  /external/chromium_org/third_party/tcmalloc/vendor/src/
profile-handler.cc 211 static void SignalHandler(int sig, siginfo_t* sinfo, void* ucontext);
488 void ProfileHandler::SignalHandler(int sig, siginfo_t* sinfo, void* ucontext) {
501 (*it)->callback(sig, sinfo, ucontext, (*it)->callback_arg);
  /external/lzma/CPP/7zip/Archive/
LzmaHandler.cpp 58 const Byte *sig = buf + (isThereFilter ? 1 : 0); local
60 LzmaProps[i] = sig[i];
61 Size = GetUi64(sig + 5);
  /external/chromium_org/third_party/boringssl/src/crypto/x509/
t_x509.c 304 int X509_signature_print(BIO *bp, X509_ALGOR *sigalg, ASN1_STRING *sig)
319 return ameth->sig_print(bp, sigalg, sig, 9, 0);
322 if (sig)
323 return X509_signature_dump(bp, sig, 9);
  /external/ipsec-tools/src/racoon/
eaytest.c 92 rsa_verify_with_pubkey(src, sig, pubkey_txt)
93 vchar_t *src, *sig;
106 error = eay_check_rsasign(src, sig, evp->pkey.rsa);
118 vchar_t *priv, *sig; local
163 sig = eay_get_x509sign(&src, priv);
164 if (sig == NULL) {
170 PVDUMP(sig);
173 if (rsa_verify_with_pubkey (&src, sig, pubkey) != 0) {
183 if (rsa_verify_with_pubkey (&src, sig, pubkey_wrong) != 0)

Completed in 923 milliseconds

<<11121314151617181920>>