HomeSort by relevance Sort by last modified time
    Searched refs:sig (Results 1 - 25 of 1514) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/bison/lib/
sigprocmask.c 67 signal_nothrow (int sig, handler_t handler)
73 result = signal (sig, handler);
95 ext_signal (int sig, handler_t handler)
97 switch (sig)
106 return signal (sig, handler);
114 sigismember (const sigset_t *set, int sig)
116 if (sig >= 0 && sig < NSIG)
119 if (sig == SIGABRT_COMPAT)
120 sig = SIGABRT
208 int sig; local
253 int sig; local
267 int sig; local
    [all...]
sigaction.c 84 sigaction_handler (int sig)
90 if (sig < 0 || NSIG <= sig || !action_array[sig].sa_handler)
93 if (sig == SIGABRT)
106 handler = action_array[sig].sa_handler;
107 if ((action_array[sig].sa_flags & SA_RESETHAND) == 0)
108 signal (sig, sigaction_handler);
110 action_array[sig].sa_handler = NULL;
113 mask = action_array[sig].sa_mask
    [all...]
raise.c 36 raise_nothrow (int sig)
42 result = raise (sig);
67 rpl_raise (int sig)
70 if (sig == SIGPIPE)
75 return raise_nothrow (sig);
77 return kill (getpid (), sig);
  /external/valgrind/memcheck/tests/
signal2.stdout.exp 1 installing sig handler
3 caught sig segv
  /external/tcpdump/
setsignal.c 69 (*setsignal (int sig, RETSIGTYPE (*func)(int)))(int)
76 if (sig == SIGCHLD)
78 if (sigaction(sig, &new, &old) < 0)
84 return (sigset(sig, func));
86 return (signal(sig, func));
  /external/vboot_reference/tests/futility/
test_create.sh 16 for sig in rsa1024 rsa2048 rsa4096 rsa8192; do
19 "${TESTKEYS}/key_${sig}.pem" "${TMP}_key_${sig}.${hash}"
20 cmp "${TESTKEYS}/key_${sig}.${hash}.vbprivk" \
21 "${TMP}_key_${sig}.${hash}.vbprivk"
22 cmp "${TESTKEYS}/key_${sig}.${hash}.vbpubk" \
23 "${TMP}_key_${sig}.${hash}.vbpubk"
30 for sig in rsa1024 rsa2048 rsa4096 rsa8192; do
33 "${TESTKEYS}/key_${sig}.pem" "${TMP}_key_${sig}.${hash}
    [all...]
  /external/libevent/
signal.c 113 static void __cdecl evsig_handler(int sig);
123 evsig_base_n_signals_added = base->sig.ev_n_signals_added;
124 evsig_base_fd = base->sig.ev_signal_pair[0];
154 ev_uint8_t sig = signals[i]; local
155 if (sig < NSIG)
156 ncaught[sig]++;
177 AF_UNIX, SOCK_STREAM, 0, base->sig.ev_signal_pair) == -1) {
188 evutil_make_socket_closeonexec(base->sig.ev_signal_pair[0]);
189 evutil_make_socket_closeonexec(base->sig.ev_signal_pair[1]);
190 base->sig.sh_old = NULL
218 struct evsig_info *sig = &base->sig; local
278 struct evsig_info *sig = &base->sig; local
325 struct evsig_info *sig = &base->sig; local
    [all...]
  /bionic/libc/bionic/
raise.cpp 33 int raise(int sig) {
34 int rc = pthread_kill(pthread_self(), sig);
pthread_kill.cpp 35 extern "C" int tgkill(int tgid, int tid, int sig);
37 int pthread_kill(pthread_t t, int sig) {
45 return (tgkill(getpid(), thread->tid, sig) == -1) ? errno : 0;
siginterrupt.c 32 int siginterrupt(int sig, int flag)
36 (void) sigaction(sig, NULL, &act);
43 return sigaction(sig, &act, NULL);
  /bionic/libc/upstream-openbsd/lib/libc/compat-43/
killpg.c 38 killpg(pid_t pgid, int sig)
44 return (kill(-pgid, sig));
  /system/core/libbacktrace/
thread_utils.c 25 int tgkill(int tgid, int tid, int sig) {
26 return syscall(__NR_tgkill, tgid, tid, sig);
thread_utils.h 28 int tgkill(int tgid, int tid, int sig);
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
Signature2Test.java 90 Signature sig = Signature.getInstance("DSA"); local
92 sig.getParameters();
102 Signature sig = Signature.getInstance("DSA"); local
105 sig.getParameter("r");
106 sig.getParameter("s");
138 Signature sig = Signature.getInstance("DSA"); local
141 sig.setParameter("r", BigInteger.ONE);
142 sig.setParameter("s", BigInteger.ONE);
154 Signature sig = Signature.getInstance("DSA"); local
159 sig.setParameter(spec)
171 Signature sig = Signature.getInstance("DSA"); local
189 Signature sig = Signature.getInstance("DSA"); local
200 Signature sig = Signature.getInstance("DSA"); local
211 Signature sig = Signature.getInstance("DSA"); local
221 Signature sig = Signature.getInstance("DSA"); local
    [all...]
  /external/vboot_reference/tests/
vb20_rsa_padding_tests.c 47 uint8_t sig[RSA1024NUMBYTES]; local
55 Memcpy(sig, signatures[0], sizeof(sig));
56 TEST_SUCC(vb2_rsa_verify_digest(key, sig, test_message_sha1_hash, &wb),
57 "RSA Padding Test valid sig");
62 Memcpy(sig, signatures[i], sizeof(sig));
63 if (!vb2_rsa_verify_digest(key, sig,
80 uint8_t sig[RSA1024NUMBYTES]; local
86 Memcpy(sig, signatures[0], sizeof(sig))
    [all...]
  /system/extras/simpleperf/
scoped_signal_handler.h 27 for (auto& sig : signums) {
28 sig_t old_handler = signal(sig, handler);
29 saved_signal_handlers_.push_back(std::make_pair(sig, old_handler));
  /external/junit/src/org/junit/experimental/theories/
ParameterSupplier.java 7 public abstract List<PotentialAssignment> getValueSources(ParameterSignature sig);
  /external/ltrace/testsuite/ltrace.main/
signals.c 24 int sig; local
30 sig = SIGUSR1;
37 if(sigaction(sig,&act,NULL) < 0)
45 sigqueue(pid,sig,mysigval);
  /external/ltrace/testsuite/ltrace.torture/
signals.c 22 int sig; local
26 sig = SIGUSR1;
33 if(sigaction(sig,&act,NULL) < 0)
41 sigqueue(pid,sig,mysigval);
  /external/valgrind/include/
pub_tool_signals.h 45 typedef void (*fault_catcher_t)(Int sig, Addr addr);
  /system/core/include/mincrypt/
dsa_sig.h 36 // Returns 0 if input sig is not a valid ASN.1 sequence
37 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int);
  /external/vboot_reference/host/lib/
host_signature.c 25 VbSignature* sig = (VbSignature*)malloc(sizeof(VbSignature) + sig_size); local
26 if (!sig)
29 sig->sig_offset = sizeof(VbSignature);
30 sig->sig_size = sig_size;
31 sig->data_size = data_size;
32 return sig;
36 void SignatureInit(VbSignature* sig, uint8_t* sig_data,
38 sig->sig_offset = OffsetOf(sig, sig_data);
39 sig->sig_size = sig_size
57 VbSignature* sig; local
82 VbSignature* sig = NULL; local
116 VbSignature* sig; local
261 VbSignature* sig; local
    [all...]
  /system/core/libmincrypt/
dsa_sig.c 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) {
82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) {
86 seq_len = sig[1];
91 r_len = sig[3];
98 if ((r_len < 1) || (r_len > seq_len - 5) || (sig[4 + r_len] != 0x02)) {
101 s_len = sig[5 + r_len];
117 if (!trim_to_p256_bytes(r_bytes, &sig[4], r_len)
118 || !trim_to_p256_bytes(s_bytes, &sig[6 + r_len], s_len)) {
  /external/compiler-rt/lib/asan/
asan_posix.cc 41 SignalContext sig = SignalContext::Create(siginfo, context); local
46 bool IsStackAccess = sig.addr + 512 > sig.sp && sig.addr < sig.sp + 0xFFFF;
55 if (!IsStackAccess && IsAccessibleMemoryRange(sig.pc, 4)) {
56 u32 inst = *(unsigned *)sig.pc;
77 ReportStackOverflow(sig);
79 ReportDeadlySignal("FPE", sig);
81 ReportDeadlySignal("ILL", sig);
    [all...]
  /external/dbus/dbus/
dbus-signature.c 428 const char *sig; local
433 sig = "";
434 _dbus_assert (dbus_signature_validate (sig, NULL));
435 _dbus_assert (!dbus_signature_validate_single (sig, NULL));
436 dbus_signature_iter_init (&iter, sig);
439 sig = DBUS_TYPE_STRING_AS_STRING;
440 _dbus_assert (dbus_signature_validate (sig, NULL));
441 _dbus_assert (dbus_signature_validate_single (sig, NULL));
442 dbus_signature_iter_init (&iter, sig);
445 sig = DBUS_TYPE_STRING_AS_STRING DBUS_TYPE_BYTE_AS_STRING
    [all...]

Completed in 1320 milliseconds

1 2 3 4 5 6 7 8 91011>>