/external/mesa3d/src/glsl/ |
ir_validate.cpp | 181 ir_instruction *sig = (ir_instruction *) node; local 183 if (sig->ir_type != ir_type_function_signature) {
|
link_functions.cpp | 78 ir_function_signature *sig = local 81 if (sig != NULL) { 82 ir->callee = sig; 89 sig = find_matching_signature(name, &ir->actual_parameters, shader_list, 91 if (sig == NULL) { 146 foreach_list_const(node, &sig->parameters) { 156 foreach_list_const(node, &sig->body) { 259 ir_function_signature *sig = f->matching_signature(actual_parameters); local 261 if ((sig == NULL) || !sig->is_defined [all...] |
opt_constant_variable.cpp | 202 ir_function_signature *sig = local 204 if (do_constant_variable(&sig->body))
|
/external/openssh/ |
auth2-hostbased.c | 64 u_char *pkblob, *sig; local 77 sig = packet_get_string(&slen); 84 buffer_append(&b, sig, slen); 142 PRIVSEP(key_verify(key, sig, slen, buffer_ptr(&b), 155 free(sig);
|
ssh-rsa.c | 45 u_char digest[SSH_DIGEST_MAX_LENGTH], *sig = NULL; local 72 if ((sig = malloc(slen)) == NULL) { 77 if (RSA_sign(nid, digest, dlen, sig, &len, key->rsa) != 1) { 83 memmove(sig + diff, sig, len); 84 explicit_bzero(sig, diff); 95 (ret = sshbuf_put_string(b, sig, slen)) != 0) 110 if (sig != NULL) { 111 explicit_bzero(sig, slen); 112 free(sig); [all...] |
/external/valgrind/none/tests/amd64/ |
faultstatus.c | 14 int sig; member in struct:test 30 static int testsig(int sig, int want) 32 if (sig != want) { 33 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig); 58 static void handler(int sig, siginfo_t *si, void *uc) 62 ok = ok && testsig(sig, cur_test->sig); 116 #define T(n, sig, code, addr) { test##n, sig, code, addr }
|
/external/vboot_reference/cgpt/ |
cgpt.h | 39 uint8_t sig[2]; // 0x55, 0xaa member in struct:pmbr
|
/external/vboot_reference/firmware/lib/include/ |
vboot_audio_private.h | 20 uint8_t sig[4]; /* "$SND" */ member in struct:VbDevMusic
|
/external/vboot_reference/host/lib/ |
host_signature.c | 25 VbSignature* sig = (VbSignature*)malloc(sizeof(VbSignature) + sig_size); local 26 if (!sig) 29 sig->sig_offset = sizeof(VbSignature); 30 sig->sig_size = sig_size; 31 sig->data_size = data_size; 32 return sig; 36 void SignatureInit(VbSignature* sig, uint8_t* sig_data, 38 sig->sig_offset = OffsetOf(sig, sig_data); 39 sig->sig_size = sig_size 57 VbSignature* sig; local 82 VbSignature* sig = NULL; local 116 VbSignature* sig; local 261 VbSignature* sig; local [all...] |
/external/vboot_reference/host/lib21/ |
host_signature.c | 225 struct vb2_signature *sig = NULL; local 228 rv = vb2_sign_data(&sig, buf, sig_offset, key, desc); 232 if (sig_offset + sig->c.total_size > c->total_size) { 233 free(sig); 237 memcpy(buf + sig_offset, sig, sig->c.total_size); 238 free(sig); 253 struct vb2_signature *sig = NULL; local 255 rv = vb2_sign_data(&sig, buf, sig_offset, key_list[i], NULL); 259 if (sig_next + sig->c.total_size > c->total_size) [all...] |
/external/vboot_reference/tests/ |
rsa_utility_tests.c | 30 const uint8_t* sig, 136 uint8_t sig[4]; local 142 TEST_EQ(RSAVerifyBinary_f(NULL, &key, buf, sizeof(buf), sig, 0), 145 TEST_EQ(RSAVerifyBinary_f(keybuf, NULL, buf, sizeof(buf), sig, 0), 150 TEST_EQ(RSAVerifyBinary_f(NULL, &key, buf, sizeof(buf), sig, kNumAlgorithms), 154 TEST_EQ(RSAVerifyBinary_f(NULL, NULL, buf, sizeof(buf), sig, kNumAlgorithms), 158 TEST_EQ(RSAVerifyBinary_f(keybuf, NULL, buf, sizeof(buf), sig, 3), 164 TEST_EQ(RSAVerifyBinary_f(NULL, &key, buf, sizeof(buf), sig, 0), 174 uint8_t sig[4]; local 180 TEST_EQ(RSAVerifyBinaryWithDigest_f(NULL, &key, digest, sig, 0) [all...] |
vboot_common2_tests.c | 48 VbSignature *sig; local 51 sig = CalculateSignature(test_data, test_size, private_key); 52 TEST_PTR_NEQ(sig, 0, "VerifyData() calculate signature"); 57 if (!sig || !rsa) 60 TEST_EQ(VerifyData(test_data, test_size, sig, rsa), 0, 63 sig->sig_size -= 16; 64 TEST_EQ(VerifyData(test_data, test_size, sig, rsa), 1, 65 "VerifyData() wrong sig size"); 66 sig->sig_size += 16; 68 TEST_EQ(VerifyData(test_data, test_size - 1, sig, rsa), 1 83 VbSignature *sig; local 111 VbSignature *sig = CalculateSignature((const uint8_t *)h, local [all...] |
vboot_common3_tests.c | 110 "KeyBlockVerify() sig off end"); 116 "KeyBlockVerify() sig too small"); 121 "KeyBlockVerify() sig mismatch"); 159 VbSignature *sig = CalculateSignature( local 162 SignatureCopy(&h->preamble_signature, sig); 163 free(sig); 226 "VerifyFirmwarePreamble() sig off end"); 232 "VerifyFirmwarePreamble() sig too small"); 237 "VerifyFirmwarePreamble() sig mismatch"); 239 /* Check that we signed header, kernel subkey, and body sig */ [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/x509/ |
X509Util.java | 228 Signature sig; local 235 sig = X509Util.getSignatureInstance(sigName); 239 sig.initSign(key, random); 243 sig.initSign(key); 246 sig.update(object.toASN1Primitive().getEncoded(ASN1Encoding.DER)); 248 return sig.sign(); 260 Signature sig; local 267 sig = X509Util.getSignatureInstance(sigName, provider); 271 sig.initSign(key, random); 275 sig.initSign(key) [all...] |
/dalvik/libdex/ |
DexDebugInfo.cpp | 38 const char* sig = *pSig; local 40 if (*sig == '(') 41 sig++; 43 if (*sig == 'L') { 45 while (*++sig != ';') 47 *pSig = sig+1; 50 if (*sig == '[') { 52 while (*++sig == '[') 54 if (*sig == 'L') { 55 while (*++sig != ';' [all...] |
/external/bison/lib/ |
fatal-signal.c | 29 #include "sig-handler.h" 142 int sig = fatal_signals[i]; local 143 if (saved_sigactions[sig].sa_handler == SIG_IGN) 144 saved_sigactions[sig].sa_handler = SIG_DFL; 145 sigaction (sig, &saved_sigactions[sig], NULL); 152 fatal_signal_handler (int sig) 174 raise (sig); 194 int sig = fatal_signals[i]; local 196 if (!(sig < sizeof (saved_sigactions) / sizeof (saved_sigactions[0])) [all...] |
sigprocmask.c | 67 signal_nothrow (int sig, handler_t handler) 73 result = signal (sig, handler); 95 ext_signal (int sig, handler_t handler) 97 switch (sig) 106 return signal (sig, handler); 114 sigismember (const sigset_t *set, int sig) 116 if (sig >= 0 && sig < NSIG) 119 if (sig == SIGABRT_COMPAT) 120 sig = SIGABRT 208 int sig; local 253 int sig; local 267 int sig; local [all...] |
/external/boringssl/src/crypto/dsa/ |
dsa.c | 172 DSA_SIG *sig; local 173 sig = OPENSSL_malloc(sizeof(DSA_SIG)); 174 if (!sig) { 177 sig->r = NULL; 178 sig->s = NULL; 179 return sig; 182 void DSA_SIG_free(DSA_SIG *sig) { 183 if (!sig) { 187 BN_free(sig->r); 188 BN_free(sig->s) [all...] |
dsa_test.c | 192 uint8_t sig[256]; local 242 !DSA_sign(0, fips_digest, sizeof(fips_digest), sig, &siglen, dsa)) { 245 if (DSA_verify(0, fips_digest, sizeof(fips_digest), sig, siglen, dsa) == 1) { 257 static int test_verify(const uint8_t *sig, size_t sig_len, int expect) { 264 int ret = DSA_verify(0, fips_digest, sizeof(fips_digest), sig, sig_len, dsa);
|
/external/boringssl/src/crypto/evp/ |
evp_extra_test.cc | 356 std::vector<uint8_t> sig; local 357 sig.resize(sig_len); 358 if (!EVP_DigestSignFinal(md_ctx.get(), bssl::vector_data(&sig), &sig_len)) { 361 sig.resize(sig_len); 367 !EVP_DigestVerifyFinal(md_ctx.get(), bssl::vector_data(&sig), sig_len)) { 412 std::vector<uint8_t> sig; local 413 sig.resize(sig_len); 414 if (!EVP_DigestSignFinal(md_ctx, bssl::vector_data(&sig), &sig_len)) { 417 sig.resize(sig_len); 424 !EVP_DigestVerifyFinal(md_ctx_verify.get(), bssl::vector_data(&sig), [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/ec/ |
SignatureSpi.java | 323 BigInteger[] sig = new BigInteger[2]; local 325 sig[0] = ASN1Integer.getInstance(s.getObjectAt(0)).getValue(); 326 sig[1] = ASN1Integer.getInstance(s.getObjectAt(1)).getValue(); 328 return sig; 381 // BigInteger[] sig = new BigInteger[2]; 389 // sig[0] = new BigInteger(1, first); 390 // sig[1] = new BigInteger(1, second); 392 // return sig;
|
/external/compiler-rt/lib/asan/ |
asan_win.cc | 221 SignalContext sig = SignalContext::Create(exception_record, context); local 222 ReportSIGSEGV(description, sig);
|
/external/ipsec-tools/src/racoon/ |
session.c | 104 static int set_signal __P((int sig, RETSIGTYPE (*func) __P((int)))); 331 signal_handler(sig) 332 int sig; 337 sigreq[sig]++; 405 int sig; local 413 for (sig = 0; sig <= NSIG; sig++) { 414 if (sigreq[sig] == 0) 417 sigreq[sig]-- [all...] |
/external/javassist/src/main/javassist/bytecode/ |
ClassFilePrinter.java | 129 String sig = sa.getSignature(); local 130 out.println("signature: " + sig); 134 s = SignatureAttribute.toClassSignature(sig).toString(); 136 s = SignatureAttribute.toMethodSignature(sig).toString(); 138 s = SignatureAttribute.toFieldSignature(sig).toString();
|
/external/libedit/examples/ |
tc1.c | 75 static void sig(int); 87 sig(int i) function 141 (void) signal(SIGINT, sig); 142 (void) signal(SIGQUIT, sig); 143 (void) signal(SIGHUP, sig); 144 (void) signal(SIGTERM, sig);
|