/external/bison/lib/ |
sigprocmask.c | 67 signal_nothrow (int sig, handler_t handler) 73 result = signal (sig, handler); 95 ext_signal (int sig, handler_t handler) 97 switch (sig) 106 return signal (sig, handler); 114 sigismember (const sigset_t *set, int sig) 116 if (sig >= 0 && sig < NSIG) 119 if (sig == SIGABRT_COMPAT) 120 sig = SIGABRT 208 int sig; local 253 int sig; local 267 int sig; local [all...] |
sigaction.c | 84 sigaction_handler (int sig) 90 if (sig < 0 || NSIG <= sig || !action_array[sig].sa_handler) 93 if (sig == SIGABRT) 106 handler = action_array[sig].sa_handler; 107 if ((action_array[sig].sa_flags & SA_RESETHAND) == 0) 108 signal (sig, sigaction_handler); 110 action_array[sig].sa_handler = NULL; 113 mask = action_array[sig].sa_mask [all...] |
raise.c | 36 raise_nothrow (int sig) 42 result = raise (sig); 67 rpl_raise (int sig) 70 if (sig == SIGPIPE) 75 return raise_nothrow (sig); 77 return kill (getpid (), sig);
|
/external/valgrind/memcheck/tests/ |
signal2.stdout.exp | 1 installing sig handler 3 caught sig segv
|
/external/tcpdump/ |
setsignal.c | 69 (*setsignal (int sig, RETSIGTYPE (*func)(int)))(int) 76 if (sig == SIGCHLD) 78 if (sigaction(sig, &new, &old) < 0) 84 return (sigset(sig, func)); 86 return (signal(sig, func));
|
/external/vboot_reference/tests/futility/ |
test_create.sh | 16 for sig in rsa1024 rsa2048 rsa4096 rsa8192; do 19 "${TESTKEYS}/key_${sig}.pem" "${TMP}_key_${sig}.${hash}" 20 cmp "${TESTKEYS}/key_${sig}.${hash}.vbprivk" \ 21 "${TMP}_key_${sig}.${hash}.vbprivk" 22 cmp "${TESTKEYS}/key_${sig}.${hash}.vbpubk" \ 23 "${TMP}_key_${sig}.${hash}.vbpubk" 30 for sig in rsa1024 rsa2048 rsa4096 rsa8192; do 33 "${TESTKEYS}/key_${sig}.pem" "${TMP}_key_${sig}.${hash} [all...] |
/external/libevent/ |
signal.c | 113 static void __cdecl evsig_handler(int sig); 123 evsig_base_n_signals_added = base->sig.ev_n_signals_added; 124 evsig_base_fd = base->sig.ev_signal_pair[0]; 154 ev_uint8_t sig = signals[i]; local 155 if (sig < NSIG) 156 ncaught[sig]++; 177 AF_UNIX, SOCK_STREAM, 0, base->sig.ev_signal_pair) == -1) { 188 evutil_make_socket_closeonexec(base->sig.ev_signal_pair[0]); 189 evutil_make_socket_closeonexec(base->sig.ev_signal_pair[1]); 190 base->sig.sh_old = NULL 218 struct evsig_info *sig = &base->sig; local 278 struct evsig_info *sig = &base->sig; local 325 struct evsig_info *sig = &base->sig; local [all...] |
/bionic/libc/bionic/ |
raise.cpp | 33 int raise(int sig) { 34 int rc = pthread_kill(pthread_self(), sig);
|
pthread_kill.cpp | 35 extern "C" int tgkill(int tgid, int tid, int sig); 37 int pthread_kill(pthread_t t, int sig) { 45 return (tgkill(getpid(), thread->tid, sig) == -1) ? errno : 0;
|
siginterrupt.c | 32 int siginterrupt(int sig, int flag) 36 (void) sigaction(sig, NULL, &act); 43 return sigaction(sig, &act, NULL);
|
/bionic/libc/upstream-openbsd/lib/libc/compat-43/ |
killpg.c | 38 killpg(pid_t pgid, int sig) 44 return (kill(-pgid, sig));
|
/system/core/libbacktrace/ |
thread_utils.c | 25 int tgkill(int tgid, int tid, int sig) { 26 return syscall(__NR_tgkill, tgid, tid, sig);
|
thread_utils.h | 28 int tgkill(int tgid, int tid, int sig);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
Signature2Test.java | 90 Signature sig = Signature.getInstance("DSA"); local 92 sig.getParameters(); 102 Signature sig = Signature.getInstance("DSA"); local 105 sig.getParameter("r"); 106 sig.getParameter("s"); 138 Signature sig = Signature.getInstance("DSA"); local 141 sig.setParameter("r", BigInteger.ONE); 142 sig.setParameter("s", BigInteger.ONE); 154 Signature sig = Signature.getInstance("DSA"); local 159 sig.setParameter(spec) 171 Signature sig = Signature.getInstance("DSA"); local 189 Signature sig = Signature.getInstance("DSA"); local 200 Signature sig = Signature.getInstance("DSA"); local 211 Signature sig = Signature.getInstance("DSA"); local 221 Signature sig = Signature.getInstance("DSA"); local [all...] |
/external/vboot_reference/tests/ |
vb20_rsa_padding_tests.c | 47 uint8_t sig[RSA1024NUMBYTES]; local 55 Memcpy(sig, signatures[0], sizeof(sig)); 56 TEST_SUCC(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb), 57 "RSA Padding Test valid sig"); 62 Memcpy(sig, signatures[i], sizeof(sig)); 63 if (!vb2_rsa_verify_digest(key, sig, 80 uint8_t sig[RSA1024NUMBYTES]; local 86 Memcpy(sig, signatures[0], sizeof(sig)) [all...] |
/prebuilts/go/darwin-x86/src/os/signal/ |
signal_plan9.go | 14 // In sig.s; jumps to runtime. 33 func signum(sig os.Signal) int { 34 switch sig := sig.(type) { 36 n, ok := sigtab[sig] 42 sigtab[sig] = n 50 func enableSignal(sig int) { 51 signal_enable(uint32(sig)) 54 func disableSignal(sig int) { 55 signal_disable(uint32(sig)) [all...] |
/prebuilts/go/linux-x86/src/os/signal/ |
signal_plan9.go | 14 // In sig.s; jumps to runtime. 33 func signum(sig os.Signal) int { 34 switch sig := sig.(type) { 36 n, ok := sigtab[sig] 42 sigtab[sig] = n 50 func enableSignal(sig int) { 51 signal_enable(uint32(sig)) 54 func disableSignal(sig int) { 55 signal_disable(uint32(sig)) [all...] |
/system/extras/simpleperf/ |
scoped_signal_handler.h | 27 for (auto& sig : signums) { 28 sig_t old_handler = signal(sig, handler); 29 saved_signal_handlers_.push_back(std::make_pair(sig, old_handler));
|
/external/junit/src/org/junit/experimental/theories/ |
ParameterSupplier.java | 7 public abstract List<PotentialAssignment> getValueSources(ParameterSignature sig);
|
/external/ltrace/testsuite/ltrace.main/ |
signals.c | 24 int sig; local 30 sig = SIGUSR1; 37 if(sigaction(sig,&act,NULL) < 0) 45 sigqueue(pid,sig,mysigval);
|
/external/ltrace/testsuite/ltrace.torture/ |
signals.c | 22 int sig; local 26 sig = SIGUSR1; 33 if(sigaction(sig,&act,NULL) < 0) 41 sigqueue(pid,sig,mysigval);
|
/external/valgrind/include/ |
pub_tool_signals.h | 45 typedef void (*fault_catcher_t)(Int sig, Addr addr);
|
/system/core/include/mincrypt/ |
dsa_sig.h | 36 // Returns 0 if input sig is not a valid ASN.1 sequence 37 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int);
|
/external/vboot_reference/host/lib/ |
host_signature.c | 25 VbSignature* sig = (VbSignature*)malloc(sizeof(VbSignature) + sig_size); local 26 if (!sig) 29 sig->sig_offset = sizeof(VbSignature); 30 sig->sig_size = sig_size; 31 sig->data_size = data_size; 32 return sig; 36 void SignatureInit(VbSignature* sig, uint8_t* sig_data, 38 sig->sig_offset = OffsetOf(sig, sig_data); 39 sig->sig_size = sig_size 57 VbSignature* sig; local 82 VbSignature* sig = NULL; local 116 VbSignature* sig; local 261 VbSignature* sig; local [all...] |
/system/core/libmincrypt/ |
dsa_sig.c | 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) { 82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) { 86 seq_len = sig[1]; 91 r_len = sig[3]; 98 if ((r_len < 1) || (r_len > seq_len - 5) || (sig[4 + r_len] != 0x02)) { 101 s_len = sig[5 + r_len]; 117 if (!trim_to_p256_bytes(r_bytes, &sig[4], r_len) 118 || !trim_to_p256_bytes(s_bytes, &sig[6 + r_len], s_len)) {
|