/external/strace/ |
wait.c | 51 # define W_STOPCODE(sig) ((sig) << 8 | 0x7f) 54 # define W_EXITCODE(ret, sig) ((ret) << 8 | (sig)) 74 int sig = WSTOPSIG(status); local 76 signame(sig & 0x7f), 77 sig & 0x80 ? " | 0x80" : ""); 78 status &= ~W_STOPCODE(sig);
|
/external/tcpdump/ |
signature.c | 123 uint8_t sig[16]; local 137 strlen(ndo->ndo_sigsecret), sig); 139 if (memcmp(rcvsig, sig, sizeof(sig)) == 0) { 144 for (i = 0; i < sizeof(sig); ++i) { 145 ND_PRINT((ndo, "%02x", sig[i]));
|
/external/valgrind/coregrind/m_gdbserver/ |
signals.c | 208 const char *target_signal_to_name (enum target_signal sig) 210 if ((sig >= TARGET_SIGNAL_FIRST) && (sig <= TARGET_SIGNAL_LAST) 211 && signals[sig].name != NULL) 212 return signals[sig].name; 222 enum target_signal sig; local 230 for (sig = TARGET_SIGNAL_HUP; 231 sig < TARGET_SIGNAL_LAST; 232 sig = (enum target_signal) ((int) sig + 1) [all...] |
/external/vboot_reference/firmware/lib21/ |
api.c | 46 const struct vb2_signature *sig = NULL; local 63 sig = (const struct vb2_signature *) 66 if (!memcmp(guid, &sig->guid, sizeof(*guid))) 69 hash_offset += sig->c.total_size; 90 sd->hash_tag = vb2_offset_of(ctx->workbuf, sig); 91 sd->hash_remaining_size = sig->data_size; 94 *size = sig->data_size; 97 rv = vb2ex_hwcrypto_digest_init(sig->hash_alg, sig->data_size); 100 sig->hash_alg) 126 const struct vb2_signature *sig; local [all...] |
/prebuilts/go/darwin-x86/src/runtime/ |
sigqueue.go | 10 // via struct sig, below. 14 // Synchronization between sigsend and signal_recv is based on the sig.state 16 // sigReceiving means that signal_recv is blocked on sig.Note and there are no 18 // sigSending means that sig.mask *may* contain new pending signals, 22 // When signal_recv is unblocked, it resets sig.Note and rechecks sig.mask. 24 // unnecessary rechecks of sig.mask, but it cannot lead to missed signals 33 var sig struct { var 52 if !sig.inuse || s < 0 || int(s) >= 32*len(sig.wanted) || sig.wanted[s/32]&bit == 0 [all...] |
sigqueue_plan9.go | 11 var sig struct { var 74 if !sig.inuse { 79 if !sig.q.push(s) { 83 lock(&sig.lock) 84 if sig.sleeping { 85 sig.sleeping = false 86 notewakeup(&sig.note) 88 unlock(&sig.lock) 97 note := sig.q.pop() 102 lock(&sig.lock [all...] |
/prebuilts/go/linux-x86/src/runtime/ |
sigqueue.go | 10 // via struct sig, below. 14 // Synchronization between sigsend and signal_recv is based on the sig.state 16 // sigReceiving means that signal_recv is blocked on sig.Note and there are no 18 // sigSending means that sig.mask *may* contain new pending signals, 22 // When signal_recv is unblocked, it resets sig.Note and rechecks sig.mask. 24 // unnecessary rechecks of sig.mask, but it cannot lead to missed signals 33 var sig struct { var 52 if !sig.inuse || s < 0 || int(s) >= 32*len(sig.wanted) || sig.wanted[s/32]&bit == 0 [all...] |
sigqueue_plan9.go | 11 var sig struct { var 74 if !sig.inuse { 79 if !sig.q.push(s) { 83 lock(&sig.lock) 84 if sig.sleeping { 85 sig.sleeping = false 86 notewakeup(&sig.note) 88 unlock(&sig.lock) 97 note := sig.q.pop() 102 lock(&sig.lock [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
SignedObjectTest.java | 38 Signature sig = Signature.getInstance("SHA1withDSA"); local 49 SignedObject so = new SignedObject(prop, tkp.getPrivate(), sig); 54 assertTrue("verify() failed", so.verify(tkp.getPublic(), sig));
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
JcaContentVerifierProviderBuilder.java | 89 Signature sig = helper.createSignature(algorithm); local 91 sig.initVerify(certificate.getPublicKey()); 93 stream = new SignatureOutputStream(sig); 159 Signature sig = helper.createSignature(algorithm); 161 sig.initVerify(publicKey); 163 return new SignatureOutputStream(sig); 295 private Signature sig; 297 SignatureOutputStream(Signature sig) 299 this.sig = sig; [all...] |
/external/libdaemon/libdaemon/ |
dexec.c | 178 int sig; local 180 if ((sig = daemon_signal_next()) < 0) { 187 if (sig != SIGCHLD) {
|
/external/libpng/contrib/gregbook/ |
readpng.c | 86 /* return value = 0 for success, 1 for bad sig, 2 for bad IHDR, 4 for no mem */ 90 uch sig[8]; local 96 fread(sig, 1, 8, infile); 97 if (png_sig_cmp(sig, 0, 8))
|
/external/mesa3d/src/glsl/ |
ir_function.cpp | 143 ir_function_signature *const sig = local 146 switch (parameter_lists_match(& sig->parameters, actual_parameters)) { 149 return sig; 152 match = sig; 209 ir_function_signature *const sig = local 212 if (parameter_lists_match_exact(&sig->parameters, actual_parameters)) 213 return sig;
|
lower_output_reads.cpp | 131 ir_function_signature *sig = (ir_function_signature *) closure; local 132 sig->body.push_tail(copy(sig, (ir_variable *) key, (ir_variable *) data)); 143 output_read_remover::visit_leave(ir_function_signature *sig) 145 if (strcmp(sig->function_name(), "main") != 0) 148 hash_table_call_foreach(replacements, emit_main_copy, sig);
|
/external/valgrind/none/tests/mips32/ |
SignalException.c | 13 int sig; member in struct:test 21 static int testsig(int sig, int want) 23 if (sig != want) { 24 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig); 39 static void handler(int sig, siginfo_t *si, void *uc) 43 ok = ok && testsig(sig, curr_test->sig); 88 #define T(n, sig, code) { test##n, sig, code }
|
/external/vboot_reference/firmware/lib20/ |
common.c | 14 uint8_t *vb2_signature_data(struct vb2_signature *sig) 16 return (uint8_t *)sig + sig->sig_offset; 60 const struct vb2_signature *sig) 63 sig, sizeof(*sig), 64 sig->sig_offset, sig->sig_size); 68 struct vb2_signature *sig, 72 uint8_t *sig_data = vb2_signature_data(sig); 138 struct vb2_signature *sig; local 207 struct vb2_signature *sig = &preamble->preamble_signature; local [all...] |
/external/vboot_reference/tests/ |
vb20_rsa_padding_tests.c | 47 uint8_t sig[RSA1024NUMBYTES]; local 55 Memcpy(sig, signatures[0], sizeof(sig)); 56 TEST_SUCC(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb), 57 "RSA Padding Test valid sig"); 62 Memcpy(sig, signatures[i], sizeof(sig)); 63 if (!vb2_rsa_verify_digest(key, sig, 80 uint8_t sig[RSA1024NUMBYTES]; local 86 Memcpy(sig, signatures[0], sizeof(sig)) [all...] |
vb2_rsa_utility_tests.c | 31 int vb2_check_padding(const uint8_t *sig, const struct vb2_public_key *key); 38 uint8_t sig[RSA1024NUMBYTES]; local 45 /* Crypto algorithm to sig algorithm mapping */ 57 /* Sig size */ 59 "Sig size RSA1024"); 61 "Sig size RSA2048"); 63 "Sig size RSA4096"); 65 "Sig size RSA8192"); 67 "Sig size invalid algorithm"); 69 "Sig size no signing algorithm") [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
SignedObjectTest.java | 51 Signature sig = Signature.getInstance("SHA1withDSA"); local 62 SignedObject so = new SignedObject(prop, tkp.getPrivate(), sig); 67 assertTrue("verify() failed", so.verify(tkp.getPublic(), sig));
|
Signature2Test.java | 188 Signature sig = Signature.getInstance("DSA"); local 190 sig.getParameters(); 211 Signature sig = Signature.getInstance("DSA"); local 214 sig.getParameter("r"); 215 sig.getParameter("s"); 243 Signature sig = Signature.getInstance("DSA"); local 244 sig.initSign(getDsaKeys().getPrivate(), new SecureRandom()); 250 Signature sig = Signature.getInstance("DSA"); local 251 sig.initSign(getRsaKeys().getPrivate(), new SecureRandom()); 303 Signature sig = Signature.getInstance("DSA") local 320 Signature sig = Signature.getInstance("DSA"); local 337 Signature sig = Signature.getInstance("DSA"); local 355 Signature sig = Signature.getInstance("DSA"); local 373 Signature sig = Signature.getInstance("DSA"); local 406 Signature sig = Signature.getInstance("DSA"); local 417 Signature sig = Signature.getInstance("DSA"); local 435 Signature sig = Signature.getInstance("DSA"); local 456 Signature sig = Signature.getInstance("DSA"); local [all...] |
SignatureTest.java | 122 Signature sig = getTestSignature(); local 123 sig.initVerify((PublicKey)null); 142 Signature sig = getTestSignature(); local 143 sig.initVerify(new MyCertificate()); 197 Signature sig = getTestSignature(); local 198 sig.initSign(null, null); 354 Signature sig = getTestSignature(); local 355 sig.update((byte) 42); 383 Signature sig = getTestSignature(); local 384 sig.update(b) 391 Signature sig = getTestSignature(); local 478 Signature sig = getTestSignature(); local 500 Signature sig = getTestSignature(); local [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 206 Signature sig = Signature.getInstance(sigAlg.getAlgorithm().getId(), local 208 sig.initVerify(pubkey); 209 sig.update(content.getBytes()); 211 return sig.verify(sigBits); 226 Signature sig = Signature.getInstance(sigAlg.getAlgorithm().getId(), local 231 sig.initSign(priv_key, rand); 235 sig.initSign(priv_key); 245 sig.update(new DERSequence(pkac).getEncoded(ASN1Encoding.DER)); 252 sigBits = sig.sign();
|
/external/mockito/cglib-and-asm/src/org/mockito/cglib/proxy/ |
MethodInterceptorGenerator.java | 88 Signature sig = method.getSignature(); local 94 sigMap.put(sig.toString(), methodProxyField); 118 if (sig.getArgumentTypes().length == 0) { 126 e.unbox_or_zero(sig.getReturnType()); 180 Signature sig = method.getSignature(); local 183 e.push(sig.getName()); 187 e.push(sig.getDescriptor()); 199 Signature sig = method.getSignature(); local 208 e.push(sig.getDescriptor()); 209 e.push(sig.getName()) [all...] |
/build/tools/signtos/ |
SignTos.java | 225 Signature sig = Signature.getInstance(getSignatureAlgorithm(signingKey)); local 226 sig.initSign(signingKey); 245 sig.update(buffer, 0, bytesRead); 251 sig.sign(sigBlock, 1, sigBlock.length - 1);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/ |
SignedObjectTest.java | 44 private Signature sig; field in class:SignedObjectTest 50 sig = Signature.getInstance("SHA1withDSA"); 63 o = new SignedObject(prop, tkp.getPrivate(), sig); 90 if (!test.verify(tkp.getPublic(), sig)) {
|