/external/libedit/examples/ |
wtc1.c | 31 sig(int i) function 122 (void)signal(SIGINT, sig); 123 (void)signal(SIGQUIT, sig); 124 (void)signal(SIGHUP, sig); 125 (void)signal(SIGTERM, sig);
|
/external/libvpx/libvpx/vp9/decoder/ |
vp9_dthread.c | 64 int sig = 1; local 69 sig = 0; 74 if (sig) {
|
/external/mesa3d/src/glsl/ |
ir_clone.cpp | 287 const ir_function_signature *const sig = local 290 ir_function_signature *sig_copy = sig->clone(mem_ctx, ht); 295 (void *)const_cast<ir_function_signature *>(sig)); 401 ir_function_signature *sig = local 403 if (sig != NULL) 404 ir->callee = sig;
|
ir_function_detect_recursion.cpp | 136 function(ir_function_signature *sig) 137 : sig(sig) 162 ir_function_signature *sig; member in class:function 188 function *get_function(ir_function_signature *sig) 190 function *f = (function *) hash_table_find(this->function_hash, sig); 192 f = new(mem_ctx) function(sig); 193 hash_table_insert(this->function_hash, f, sig); 199 virtual ir_visitor_status visit_enter(ir_function_signature *sig) 201 this->current = this->get_function(sig); [all...] |
/external/mockito/cglib-and-asm/src/org/mockito/cglib/proxy/ |
InterfaceMaker.java | 49 * @param sig the method signature to add to the interface 52 public void add(Signature sig, Type[] exceptions) { 53 signatures.put(sig, exceptions); 111 Signature sig = (Signature)it.next(); local 112 Type[] exceptions = (Type[])signatures.get(sig); 114 sig,
|
/external/openssh/ |
key.c | 138 u_char *sig; local 145 if ((r = sshkey_sign(key, &sig, &siglen, 154 *sigp = sig;
|
/external/toybox/toys/pending/ |
getty.c | 125 sighandler_t sig = signal(SIGHUP, SIG_IGN); local 127 signal(SIGHUP, sig);
|
/external/valgrind/coregrind/m_sigframe/ |
sigframe-arm-linux.c | 80 struct sigframe sig; member in struct:rt_sigframe 197 offsetof(struct rt_sigframe, sig)); 205 (Addr)rsf, offsetof(struct rt_sigframe, sig)); 207 build_sigframe(tst, &rsf->sig, siginfo, siguc, 210 tst->arch.vex.guest_R2 = (Addr)&rsf->sig.uc; 261 mc = &frame->sig.uc.uc_mcontext; 262 priv = &frame->sig.vp; 264 tst->sig_mask = frame->sig.uc.uc_sigmask; 272 /*tst->sig_mask.sig[0] = frame->uc.uc_mcontext.oldmask; 273 tst->sig_mask.sig[1] = frame->uc.uc_mcontext._unused[3] [all...] |
sigframe-arm64-linux.c | 77 struct sigframe sig; member in struct:rt_sigframe 183 offsetof(struct rt_sigframe, sig)); 192 (Addr)rsf, offsetof(struct rt_sigframe, sig)); 194 build_sigframe(tst, &rsf->sig, siginfo, siguc, 197 tst->arch.vex.guest_X2 = (Addr)&rsf->sig.uc; 236 //mc = &frame->sig.uc.uc_mcontext; 237 priv = &frame->sig.vp; 239 tst->sig_mask = frame->sig.uc.uc_sigmask;
|
/external/valgrind/none/tests/ |
faultstatus.c | 35 int sig; member in struct:test 53 static int testsig(int sig, int want) 55 if (sig != want) { 56 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig); 87 static void handler(int sig, siginfo_t *si, void *uc) 91 ok = ok && testsig(sig, cur_test->sig); 155 #define T(n, sig, code, addr) { test##n, sig, code, addr }
|
/external/valgrind/none/tests/mips32/ |
round_fpu64.c | 97 int sig; member in struct:test 101 static void handler(int sig)
|
/external/valgrind/none/tests/x86/ |
faultstatus.c | 15 int sig; member in struct:test 33 static int testsig(int sig, int want) 35 if (sig != want) { 36 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig); 61 static void handler(int sig, siginfo_t *si, void *uc) 65 ok = ok && testsig(sig, cur_test->sig); 134 #define T(n, sig, code, addr) { test##n, sig, code, addr }
|
/external/vboot_reference/firmware/lib/ |
vboot_common.c | 43 uint8_t *GetSignatureData(VbSignature *sig) 45 return (uint8_t *)sig + sig->sig_offset; 48 const uint8_t *GetSignatureDataC(const VbSignature *sig) 50 return (const uint8_t *)sig + sig->sig_offset; 96 const VbSignature *sig) 99 sig, sizeof(VbSignature), 100 sig->sig_offset, sig->sig_size) 190 const VbSignature *sig; local 311 const VbSignature *sig = &preamble->preamble_signature; local 398 const VbSignature *sig = &preamble->preamble_signature; local [all...] |
/external/vboot_reference/firmware/lib21/ |
common.c | 176 int vb2_verify_signature(const struct vb2_signature *sig, uint32_t size) 183 if (sig->c.magic != VB2_MAGIC_SIGNATURE) 187 rv = vb2_verify_common_header(sig, size); 196 if (sig->c.struct_version_major != VB2_SIGNATURE_VERSION_MAJOR) 200 if (sig->c.fixed_size < sizeof(*sig)) 204 rv = vb2_verify_common_member(sig, &min_offset, 205 sig->sig_offset, sig->sig_size); 210 expect_sig_size = vb2_sig_size(sig->sig_alg, sig->hash_alg) 345 struct vb2_signature *sig; local 381 struct vb2_signature *sig; local [all...] |
/external/vboot_reference/tests/ |
vb20_common2_tests.c | 78 const struct vb2_signature *sig) 86 uint32_t sig_total_size = sig->sig_offset + sig->sig_size; 98 memcpy(sig2, sig, sig_total_size); 101 0, "vb2_verify_data() bad sig alg"); 104 memcpy(sig2, sig, sig_total_size); 111 memcpy(sig2, sig, sig_total_size); 116 memcpy(sig2, sig, sig_total_size); 120 memcpy(sig2, sig, sig_total_size); 123 0, "vb2_verify_data() wrong sig size") 144 struct vb2_signature *sig = NULL; local [all...] |
vb21_host_sig_tests.c | 46 struct vb2_signature *sig, *sig2; local 82 TEST_SUCC(vb2_sign_data(&sig, test_data, test_size, prik, NULL), 84 TEST_PTR_NEQ(sig, NULL, " sig_ptr"); 85 TEST_EQ(0, strcmp(vb2_common_desc(sig), test_desc), " desc"); 86 TEST_EQ(0, memcmp(&sig->guid, &test_guid, sizeof(test_guid)), " guid"); 87 TEST_EQ(sig->data_size, test_size, " data_size"); 88 TEST_SUCC(vb2_sig_size_for_key(&size, prik, NULL), "Sig size"); 89 TEST_EQ(size, sig->c.total_size, " size"); 90 TEST_SUCC(vb2_verify_data(test_data, test_size, sig, pubk, &wb), 92 free(sig); [all...] |
/frameworks/multidex/library/test/src/android/support/multidex/ |
ZipEntryReader.java | 52 int sig = in.getInt(); local 53 if (sig != CENSIG) {
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/vp8/encoder/arm/neon/ |
denoising_neon.c | 65 unsigned char *sig = signal->thismb; local 80 const uint8x16_t v_sig = vld1q_u8(sig); 154 sig += sig_stride;
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/vp8/encoder/ |
denoising.c | 59 unsigned char *sig = signal->thismb; local 86 diff = mc_running_avg_y[c] - sig[c]; 106 if ((sig[c] + adjustment) > 255) 109 running_avg_y[c] = sig[c] + adjustment; 115 if ((sig[c] - adjustment) < 0) 118 running_avg_y[c] = sig[c] - adjustment; 126 sig += sig_stride;
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/vp8/encoder/x86/ |
denoising_sse2.c | 30 unsigned char *sig = signal->thismb; local 54 const __m128i v_sig = _mm_loadu_si128((__m128i *)(&sig[0])); 98 sig += sig_stride;
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/vp9/decoder/ |
vp9_dthread.c | 64 int sig = 1; local 69 sig = 0; 74 if (sig) {
|
/libcore/luni/src/test/java/libcore/java/security/ |
SignatureTest.java | 356 private void test_Signature(Signature sig, KeyPair keyPair) throws Exception { 357 sig.initSign(keyPair.getPrivate()); 358 sig.update(DATA); 359 byte[] signature = sig.sign(); 360 assertNotNull(sig.getAlgorithm(), signature); 361 assertTrue(sig.getAlgorithm(), signature.length > 0); 363 sig.initVerify(keyPair.getPublic()); 364 sig.update(DATA); 365 assertTrue(sig.getAlgorithm(), sig.verify(signature)) 439 Signature sig = Signature.getInstance("SHA256withRSA"); local 920 Signature sig = Signature.getInstance("SHA1withRSA"); local 933 Signature sig = Signature.getInstance("SHA256withRSA"); local 946 Signature sig = Signature.getInstance("SHA384withRSA"); local 959 Signature sig = Signature.getInstance("SHA512withRSA"); local 972 Signature sig = Signature.getInstance("MD5withRSA"); local 990 Signature sig = Signature.getInstance("SHA1withRSA"); local 1009 Signature sig = Signature.getInstance("SHA1withRSA"); local 1026 Signature sig = Signature.getInstance("SHA1withRSA"); local 1051 Signature sig = Signature.getInstance("SHA1withRSA"); local 1083 Signature sig = Signature.getInstance("SHA1withRSA"); local 1107 Signature sig = Signature.getInstance("SHA1withRSA"); local 1130 Signature sig = Signature.getInstance("SHA1withRSA"); local 1145 Signature sig = Signature.getInstance("SHA1withRSA"); local 1169 Signature sig = Signature.getInstance("SHA224withRSA"); local 1193 Signature sig = Signature.getInstance("SHA256withRSA"); local 1216 Signature sig = Signature.getInstance("SHA384withRSA"); local 1239 Signature sig = Signature.getInstance("SHA512withRSA"); local 1262 Signature sig = Signature.getInstance("MD5withRSA"); local 1285 Signature sig = Signature.getInstance("NONEwithRSA"); local 1309 Signature sig = Signature.getInstance("NONEwithRSA"); local 1321 Signature sig = Signature.getInstance("NONEwithRSA"); local 1342 Signature sig = Signature.getInstance("NONEwithRSA"); local 1365 Signature sig = Signature.getInstance("NONEwithRSA"); local 1387 Signature sig = Signature.getInstance("NONEwithRSA"); local 1407 Signature sig = Signature.getInstance("NONEwithRSA"); local 1421 Signature sig = Signature.getInstance("NONEwithRSA"); local 1573 Signature sig = Signature.getInstance("SHA1withDSA"); local 1592 Signature sig = Signature.getInstance("SHA1withDSA"); local 1603 Signature sig = Signature.getInstance("SHA224withDSA"); local 1622 Signature sig = Signature.getInstance("SHA224withDSA"); local 1633 Signature sig = Signature.getInstance("SHA256withDSA"); local 1652 Signature sig = Signature.getInstance("SHA256withDSA"); local [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
SignatureTest.java | 1197 Signature sig = (provider != null) local 1215 Signature sig = (provider != null) local 1233 Signature sig = (provider != null) local 1274 Signature sig = (provider != null) local [all...] |
/frameworks/base/core/java/android/os/ |
RecoverySystem.java | 266 // fall back to the cert algorithm if the sig one 272 Signature sig = Signature.getInstance(alg); local 273 sig.initVerify(cert); 290 sig.update(buffer, 0, read); 312 if (!sig.verify(sigInfo.getEncryptedDigest())) {
|
/cts/tests/tests/content/src/android/content/pm/cts/ |
SignatureTest.java | 44 String sig = null; local 47 Signature signature = new Signature(sig); 70 byte[] sig = null; 73 Signature signature = new Signature(sig);
|