/external/tcpdump/ |
signature.c | 62 MD5_CTX tctx; local 64 MD5_Init(&tctx); 65 MD5_Update(&tctx, key, key_len); 66 MD5_Final(tk, &tctx);
|
/system/security/keystore/ |
permissions.cpp | 104 static char* tctx; variable 112 if (getcon(&tctx) != 0) { 138 bool allowed = selinux_check_access(sctx, tctx, selinux_class, str_perm,
|
/external/compiler-rt/lib/asan/ |
asan_stats.cc | 77 AsanThreadContext *tctx = static_cast<AsanThreadContext*>(tctx_base); local 78 if (AsanThread *t = tctx->thread)
|
asan_thread.cc | 328 AsanThreadContext *tctx = static_cast<AsanThreadContext*>(tctx_base); local 329 AsanThread *t = tctx->thread; 347 AsanThreadContext *tctx = GetThreadContextByTidLocked(0); local 348 if (ThreadStackContainsAddress(tctx, &context)) { 349 SetCurrentThread(tctx->thread); 350 return tctx->thread; 375 AsanThreadContext *tctx = static_cast<AsanThreadContext *>( local 378 return tctx ? tctx->thread : nullptr;
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_thread_registry.cc | 125 ThreadContextBase *tctx = QuarantinePop(); local 126 if (tctx) { 127 tid = tctx->tid; 131 tctx = context_factory_(tid); 132 threads_[tid] = tctx; 143 CHECK_NE(tctx, 0); 146 CHECK_EQ(tctx->status, ThreadStatusInvalid); 152 tctx->SetCreated(user_id, total_threads_++, detached, 161 ThreadContextBase *tctx = threads_[tid]; local 162 if (tctx == 0 171 ThreadContextBase *tctx = threads_[tid]; local 182 ThreadContextBase *tctx = threads_[tid]; local 203 ThreadContextBase *tctx = threads_[tid]; local 212 ThreadContextBase *tctx = threads_[tid]; local 224 ThreadContextBase *tctx = threads_[tid]; local 242 ThreadContextBase *tctx = threads_[tid]; local 259 ThreadContextBase *tctx = threads_[tid]; local 273 ThreadContextBase *tctx = threads_[tid]; local [all...] |
/external/jemalloc/src/ |
huge.c | 458 prof_tctx_t *tctx; local 465 tctx = extent_node_prof_tctx_get(node); 468 return (tctx); 472 huge_prof_tctx_set(tsdn_t *tsdn, const void *ptr, prof_tctx_t *tctx) 480 extent_node_prof_tctx_set(node, tctx);
|
jemalloc.c | 1560 prof_tctx_t *tctx; local 1571 prof_malloc(tsd_tsdn(tsd), p, usize, tctx); local 1686 prof_tctx_t *tctx; local 1697 prof_malloc(tsd_tsdn(tsd), p, usize, tctx); local 1863 prof_tctx_t *old_tctx, *tctx; local 2197 prof_tctx_t *tctx; local 2215 prof_malloc(tsd_tsdn(tsd), p, *usize, tctx); local 2335 prof_tctx_t *old_tctx, *tctx; local 2481 prof_tctx_t *old_tctx, *tctx; local [all...] |
prof.c | 124 static bool prof_tctx_should_destroy(tsdn_t *tsdn, prof_tctx_t *tctx); 125 static void prof_tctx_destroy(tsd_t *tsd, prof_tctx_t *tctx); 197 prof_alloc_rollback(tsd_t *tsd, prof_tctx_t *tctx, bool updated) 215 if ((uintptr_t)tctx > (uintptr_t)1U) { 216 malloc_mutex_lock(tsd_tsdn(tsd), tctx->tdata->lock); 217 tctx->prepared = false; 218 if (prof_tctx_should_destroy(tsd_tsdn(tsd), tctx)) 219 prof_tctx_destroy(tsd, tctx); 221 malloc_mutex_unlock(tsd_tsdn(tsd), tctx->tdata->lock); 227 prof_tctx_t *tctx) 710 idalloctm(tsd_tsdn(tsd), tctx, NULL, true, true); local 1274 } tctx; local [all...] |
/external/compiler-rt/lib/tsan/rtl/ |
tsan_rtl_mutex.cc | 375 ThreadContext *tctx = static_cast<ThreadContext*>(tctx_base); local 376 if (tctx->status == ThreadStatusRunning) 377 thr->clock.set(tctx->tid, tctx->thr->fast_state.epoch()); 379 thr->clock.set(tctx->tid, tctx->epoch1); 418 ThreadContext *tctx = static_cast<ThreadContext*>(tctx_base); local 419 if (tctx->status == ThreadStatusRunning) 420 thr->last_sleep_clock.set(tctx->tid, tctx->thr->fast_state.epoch()) [all...] |
tsan_rtl_thread.cc | 147 ThreadContext *tctx; member in struct:__tsan::ThreadLeak 153 ThreadContext *tctx = static_cast<ThreadContext*>(tctx_base); local 154 if (tctx->detached || tctx->status != ThreadStatusFinished) 157 if (leaks[i].tctx->creation_stack_id == tctx->creation_stack_id) { 162 ThreadLeak leak = {tctx, 1}; 168 static void ReportIgnoresEnabled(ThreadContext *tctx, IgnoreSet *set) { 169 if (tctx->tid == 0) { 173 " created at:\n", tctx->tid, tctx->name) [all...] |
tsan_rtl_report.cc | 188 void ScopedReport::AddThread(const ThreadContext *tctx, bool suppressable) { 190 if ((u32)rep_->threads[i]->id == tctx->tid) 196 rt->id = tctx->tid; 197 rt->os_id = tctx->os_id; 198 rt->running = (tctx->status == ThreadStatusRunning); 199 rt->name = internal_strdup(tctx->name); 200 rt->parent_tid = tctx->parent_tid; 202 rt->stack = SymbolizeStackId(tctx->creation_stack_id); 208 static bool FindThreadByUidLockedCallback(ThreadContextBase *tctx, void *arg) { 210 return tctx->unique_id == (u32)unique_id 228 ThreadContext *tctx = static_cast<ThreadContext*>(tctx_base); local 239 ThreadContext *tctx = static_cast<ThreadContext*>( local 318 ThreadContext *tctx = FindThreadByUidLocked(creat_tid); local 331 ThreadContext *tctx = FindThreadByTidLocked(b->tid); local 654 ThreadContext *tctx = static_cast<ThreadContext*>( local [all...] |
tsan_rtl.h | 411 ThreadContext *tctx; member in struct:__tsan::ThreadState 564 void AddThread(const ThreadContext *tctx, bool suppressable = false);
|
/frameworks/native/cmds/servicemanager/ |
service_manager.c | 64 static bool check_mac_perms(pid_t spid, uid_t uid, const char *tctx, const char *perm, const char *name) 80 int result = selinux_check_access(sctx, tctx, class, perm, (void *) &ad); 95 char *tctx = NULL; local 102 if (selabel_lookup(sehandle, &tctx, name, 0) != 0) { 107 allowed = check_mac_perms(spid, uid, tctx, perm, name); 108 freecon(tctx);
|
/external/boringssl/src/ssl/ |
ssl_session.cc | 496 SSL_CTX *tctx = ssl->session_ctx; local 499 if (tctx->tlsext_ticket_key_cb != NULL) { 500 if (tctx->tlsext_ticket_key_cb(ssl, key_name, iv, ctx.get(), hctx.get(), 506 if (!ssl_ctx_rotate_ticket_encryption_key(tctx)) { 509 MutexReadLock lock(&tctx->lock); 512 tctx->tlsext_ticket_key_current->aes_key, iv) || 513 !HMAC_Init_ex(hctx.get(), tctx->tlsext_ticket_key_current->hmac_key, 16, 517 OPENSSL_memcpy(key_name, tctx->tlsext_ticket_key_current->name, 16); [all...] |
/external/jemalloc/include/jemalloc/internal/ |
prof.h | 106 * UID that distinguishes multiple tctx's created by the same thread, 109 * - A dumper thread can cause a tctx to be retained in the purgatory 111 * - Although a single "producer" thread must create all tctx's which 283 void prof_alloc_rollback(tsd_t *tsd, prof_tctx_t *tctx, bool updated); 285 prof_tctx_t *tctx); 286 void prof_free_sampled_object(tsd_t *tsd, size_t usize, prof_tctx_t *tctx); 335 prof_tctx_t *tctx); 337 const void *old_ptr, prof_tctx_t *tctx); 343 prof_tctx_t *tctx); 345 prof_tctx_t *tctx, bool prof_active, bool updated, const void *old_ptr 525 prof_malloc_sample_object(tsd_tsdn(tsd), ptr, usize, tctx); local 536 prof_tctx_t *tctx = prof_tctx_get(tsd_tsdn(tsd), ptr); local [all...] |