HomeSort by relevance Sort by last modified time
    Searched defs:sig (Results 26 - 50 of 695) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/strace/
wait.c 51 # define W_STOPCODE(sig) ((sig) << 8 | 0x7f)
54 # define W_EXITCODE(ret, sig) ((ret) << 8 | (sig))
74 int sig = WSTOPSIG(status); local
76 signame(sig & 0x7f),
77 sig & 0x80 ? " | 0x80" : "");
78 status &= ~W_STOPCODE(sig);
  /external/tcpdump/
signature.c 123 uint8_t sig[16]; local
137 strlen(ndo->ndo_sigsecret), sig);
139 if (memcmp(rcvsig, sig, sizeof(sig)) == 0) {
144 for (i = 0; i < sizeof(sig); ++i) {
145 ND_PRINT((ndo, "%02x", sig[i]));
  /external/valgrind/coregrind/m_gdbserver/
signals.c 208 const char *target_signal_to_name (enum target_signal sig)
210 if ((sig >= TARGET_SIGNAL_FIRST) && (sig <= TARGET_SIGNAL_LAST)
211 && signals[sig].name != NULL)
212 return signals[sig].name;
222 enum target_signal sig; local
230 for (sig = TARGET_SIGNAL_HUP;
231 sig < TARGET_SIGNAL_LAST;
232 sig = (enum target_signal) ((int) sig + 1)
    [all...]
  /external/vboot_reference/firmware/lib21/
api.c 46 const struct vb2_signature *sig = NULL; local
63 sig = (const struct vb2_signature *)
66 if (!memcmp(guid, &sig->guid, sizeof(*guid)))
69 hash_offset += sig->c.total_size;
90 sd->hash_tag = vb2_offset_of(ctx->workbuf, sig);
91 sd->hash_remaining_size = sig->data_size;
94 *size = sig->data_size;
97 rv = vb2ex_hwcrypto_digest_init(sig->hash_alg, sig->data_size);
100 sig->hash_alg)
126 const struct vb2_signature *sig; local
    [all...]
  /prebuilts/go/darwin-x86/src/runtime/
sigqueue.go 10 // via struct sig, below.
14 // Synchronization between sigsend and signal_recv is based on the sig.state
16 // sigReceiving means that signal_recv is blocked on sig.Note and there are no
18 // sigSending means that sig.mask *may* contain new pending signals,
22 // When signal_recv is unblocked, it resets sig.Note and rechecks sig.mask.
24 // unnecessary rechecks of sig.mask, but it cannot lead to missed signals
33 var sig struct { var
52 if !sig.inuse || s < 0 || int(s) >= 32*len(sig.wanted) || sig.wanted[s/32]&bit == 0
    [all...]
sigqueue_plan9.go 11 var sig struct { var
74 if !sig.inuse {
79 if !sig.q.push(s) {
83 lock(&sig.lock)
84 if sig.sleeping {
85 sig.sleeping = false
86 notewakeup(&sig.note)
88 unlock(&sig.lock)
97 note := sig.q.pop()
102 lock(&sig.lock
    [all...]
  /prebuilts/go/linux-x86/src/runtime/
sigqueue.go 10 // via struct sig, below.
14 // Synchronization between sigsend and signal_recv is based on the sig.state
16 // sigReceiving means that signal_recv is blocked on sig.Note and there are no
18 // sigSending means that sig.mask *may* contain new pending signals,
22 // When signal_recv is unblocked, it resets sig.Note and rechecks sig.mask.
24 // unnecessary rechecks of sig.mask, but it cannot lead to missed signals
33 var sig struct { var
52 if !sig.inuse || s < 0 || int(s) >= 32*len(sig.wanted) || sig.wanted[s/32]&bit == 0
    [all...]
sigqueue_plan9.go 11 var sig struct { var
74 if !sig.inuse {
79 if !sig.q.push(s) {
83 lock(&sig.lock)
84 if sig.sleeping {
85 sig.sleeping = false
86 notewakeup(&sig.note)
88 unlock(&sig.lock)
97 note := sig.q.pop()
102 lock(&sig.lock
    [all...]
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
SignedObjectTest.java 38 Signature sig = Signature.getInstance("SHA1withDSA"); local
49 SignedObject so = new SignedObject(prop, tkp.getPrivate(), sig);
54 assertTrue("verify() failed", so.verify(tkp.getPublic(), sig));
  /external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/
JcaContentVerifierProviderBuilder.java 89 Signature sig = helper.createSignature(algorithm); local
91 sig.initVerify(certificate.getPublicKey());
93 stream = new SignatureOutputStream(sig);
159 Signature sig = helper.createSignature(algorithm);
161 sig.initVerify(publicKey);
163 return new SignatureOutputStream(sig);
295 private Signature sig;
297 SignatureOutputStream(Signature sig)
299 this.sig = sig;
    [all...]
  /external/libdaemon/libdaemon/
dexec.c 178 int sig; local
180 if ((sig = daemon_signal_next()) < 0) {
187 if (sig != SIGCHLD) {
  /external/libpng/contrib/gregbook/
readpng.c 86 /* return value = 0 for success, 1 for bad sig, 2 for bad IHDR, 4 for no mem */
90 uch sig[8]; local
96 fread(sig, 1, 8, infile);
97 if (png_sig_cmp(sig, 0, 8))
  /external/mesa3d/src/glsl/
ir_function.cpp 143 ir_function_signature *const sig = local
146 switch (parameter_lists_match(& sig->parameters, actual_parameters)) {
149 return sig;
152 match = sig;
209 ir_function_signature *const sig = local
212 if (parameter_lists_match_exact(&sig->parameters, actual_parameters))
213 return sig;
lower_output_reads.cpp 131 ir_function_signature *sig = (ir_function_signature *) closure; local
132 sig->body.push_tail(copy(sig, (ir_variable *) key, (ir_variable *) data));
143 output_read_remover::visit_leave(ir_function_signature *sig)
145 if (strcmp(sig->function_name(), "main") != 0)
148 hash_table_call_foreach(replacements, emit_main_copy, sig);
  /external/valgrind/none/tests/mips32/
SignalException.c 13 int sig; member in struct:test
21 static int testsig(int sig, int want)
23 if (sig != want) {
24 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig);
39 static void handler(int sig, siginfo_t *si, void *uc)
43 ok = ok && testsig(sig, curr_test->sig);
88 #define T(n, sig, code) { test##n, sig, code }
  /external/vboot_reference/firmware/lib20/
common.c 14 uint8_t *vb2_signature_data(struct vb2_signature *sig)
16 return (uint8_t *)sig + sig->sig_offset;
60 const struct vb2_signature *sig)
63 sig, sizeof(*sig),
64 sig->sig_offset, sig->sig_size);
68 struct vb2_signature *sig,
72 uint8_t *sig_data = vb2_signature_data(sig);
138 struct vb2_signature *sig; local
207 struct vb2_signature *sig = &preamble->preamble_signature; local
    [all...]
  /external/vboot_reference/tests/
vb20_rsa_padding_tests.c 47 uint8_t sig[RSA1024NUMBYTES]; local
55 Memcpy(sig, signatures[0], sizeof(sig));
56 TEST_SUCC(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
57 "RSA Padding Test valid sig");
62 Memcpy(sig, signatures[i], sizeof(sig));
63 if (!vb2_rsa_verify_digest(key, sig,
80 uint8_t sig[RSA1024NUMBYTES]; local
86 Memcpy(sig, signatures[0], sizeof(sig))
    [all...]
vb2_rsa_utility_tests.c 31 int vb2_check_padding(const uint8_t *sig, const struct vb2_public_key *key);
38 uint8_t sig[RSA1024NUMBYTES]; local
45 /* Crypto algorithm to sig algorithm mapping */
57 /* Sig size */
59 "Sig size RSA1024");
61 "Sig size RSA2048");
63 "Sig size RSA4096");
65 "Sig size RSA8192");
67 "Sig size invalid algorithm");
69 "Sig size no signing algorithm")
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
SignedObjectTest.java 51 Signature sig = Signature.getInstance("SHA1withDSA"); local
62 SignedObject so = new SignedObject(prop, tkp.getPrivate(), sig);
67 assertTrue("verify() failed", so.verify(tkp.getPublic(), sig));
Signature2Test.java 188 Signature sig = Signature.getInstance("DSA"); local
190 sig.getParameters();
211 Signature sig = Signature.getInstance("DSA"); local
214 sig.getParameter("r");
215 sig.getParameter("s");
243 Signature sig = Signature.getInstance("DSA"); local
244 sig.initSign(getDsaKeys().getPrivate(), new SecureRandom());
250 Signature sig = Signature.getInstance("DSA"); local
251 sig.initSign(getRsaKeys().getPrivate(), new SecureRandom());
303 Signature sig = Signature.getInstance("DSA") local
320 Signature sig = Signature.getInstance("DSA"); local
337 Signature sig = Signature.getInstance("DSA"); local
355 Signature sig = Signature.getInstance("DSA"); local
373 Signature sig = Signature.getInstance("DSA"); local
406 Signature sig = Signature.getInstance("DSA"); local
417 Signature sig = Signature.getInstance("DSA"); local
435 Signature sig = Signature.getInstance("DSA"); local
456 Signature sig = Signature.getInstance("DSA"); local
    [all...]
SignatureTest.java 122 Signature sig = getTestSignature(); local
123 sig.initVerify((PublicKey)null);
142 Signature sig = getTestSignature(); local
143 sig.initVerify(new MyCertificate());
197 Signature sig = getTestSignature(); local
198 sig.initSign(null, null);
354 Signature sig = getTestSignature(); local
355 sig.update((byte) 42);
383 Signature sig = getTestSignature(); local
384 sig.update(b)
391 Signature sig = getTestSignature(); local
478 Signature sig = getTestSignature(); local
500 Signature sig = getTestSignature(); local
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/
NetscapeCertRequest.java 206 Signature sig = Signature.getInstance(sigAlg.getAlgorithm().getId(), local
208 sig.initVerify(pubkey);
209 sig.update(content.getBytes());
211 return sig.verify(sigBits);
226 Signature sig = Signature.getInstance(sigAlg.getAlgorithm().getId(), local
231 sig.initSign(priv_key, rand);
235 sig.initSign(priv_key);
245 sig.update(new DERSequence(pkac).getEncoded(ASN1Encoding.DER));
252 sigBits = sig.sign();
  /external/mockito/cglib-and-asm/src/org/mockito/cglib/proxy/
MethodInterceptorGenerator.java 88 Signature sig = method.getSignature(); local
94 sigMap.put(sig.toString(), methodProxyField);
118 if (sig.getArgumentTypes().length == 0) {
126 e.unbox_or_zero(sig.getReturnType());
180 Signature sig = method.getSignature(); local
183 e.push(sig.getName());
187 e.push(sig.getDescriptor());
199 Signature sig = method.getSignature(); local
208 e.push(sig.getDescriptor());
209 e.push(sig.getName())
    [all...]
  /build/tools/signtos/
SignTos.java 225 Signature sig = Signature.getInstance(getSignatureAlgorithm(signingKey)); local
226 sig.initSign(signingKey);
245 sig.update(buffer, 0, bytesRead);
251 sig.sign(sigBlock, 1, sigBlock.length - 1);
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/
SignedObjectTest.java 44 private Signature sig; field in class:SignedObjectTest
50 sig = Signature.getInstance("SHA1withDSA");
63 o = new SignedObject(prop, tkp.getPrivate(), sig);
90 if (!test.verify(tkp.getPublic(), sig)) {

Completed in 883 milliseconds

12 3 4 5 6 7 8 91011>>