/system/core/adb/crypto/tests/ |
D | key_test.cpp | 49 std::vector<uint8_t> sig(RSA_size(rsa)); in TEST() local 51 EXPECT_EQ(RSA_sign(NID_sha1, reinterpret_cast<const uint8_t*>(token), sizeof(token), sig.data(), in TEST() 54 sig.resize(sig_len); in TEST() 63 sig.data(), sig.size(), key), in TEST()
|
D | rsa_2048_key_test.cpp | 52 std::vector<uint8_t> sig(RSA_size(rsa)); in TEST() local 54 EXPECT_EQ(RSA_sign(NID_sha1, reinterpret_cast<const uint8_t*>(token), sizeof(token), sig.data(), in TEST() 57 sig.resize(sig_len); in TEST() 66 sig.data(), sig.size(), key), in TEST()
|
/system/bt/stack/avdt/ |
D | avdt_msg.cc | 989 uint8_t sig) { in avdt_msg_prs_rej() argument 993 if ((sig == AVDT_SIG_SETCONFIG) || (sig == AVDT_SIG_RECONFIG)) { in avdt_msg_prs_rej() 996 } else if ((sig == AVDT_SIG_START) || (sig == AVDT_SIG_SUSPEND)) { in avdt_msg_prs_rej() 1068 uint8_t sig; in avdt_msg_send() local 1142 sig = (uint8_t)p_ccb->p_curr_msg->event; in avdt_msg_send() 1143 AVDT_TRACE_DEBUG("avdt_msg_send label:%d, msg:%d, sig:%d", label, msg, sig); in avdt_msg_send() 1154 if ((sig == AVDT_SIG_DISCOVER) || (sig == AVDT_SIG_GETCAP) || in avdt_msg_send() 1155 (sig == AVDT_SIG_SECURITY) || (avdtp_cb.rcb.ret_tout == 0)) { in avdt_msg_send() 1161 } else if (sig != AVDT_SIG_DELAY_RPT) { in avdt_msg_send() 1187 AVDT_MSG_BLD_SIG(p, sig); in avdt_msg_send() [all …]
|
D | avdt_defs.h | 170 #define AVDT_MSG_PRS_SIG(p, sig) \ argument 172 (sig) = (*(p)++) & 0x3F; \ 217 #define AVDT_MSG_BLD_SIG(p, sig) \ argument 219 *(p)++ = (uint8_t)(sig); \
|
/system/incremental_delivery/incfs/incfsdump/ |
D | dump.cpp | 348 auto& sig = mdBuf.signature; in dumpMd() local 349 sig = readAt<decltype(sig)>(offset); in dumpMd() 350 out() << "signature size: " << sig.sg_sig_size; in dumpMd() 351 out() << "signature offset: " << hex(sig.sg_sig_offset); in dumpMd() 352 out() << "hash tree size: " << sig.sg_hash_tree_size; in dumpMd() 353 out() << "hash tree offset: " << hex(sig.sg_hash_tree_offset); in dumpMd() 354 dumpTree(sig.sg_hash_tree_offset, sig.sg_hash_tree_size); in dumpMd()
|
/system/security/keystore/ |
D | keystore_attestation_id.cpp | 53 std::vector<uint8_t> signature2SHA256(const content::pm::Signature& sig) { in signature2SHA256() argument 55 SHA256(sig.data().data(), sig.data().size(), digest_buffer.data()); in signature2SHA256() 237 for (auto sig = pinfo.sigs_begin(); sig != pinfo.sigs_end(); ++sig) { in build_attestation_application_id() local 238 signature_digests.push_back(signature2SHA256(*sig)); in build_attestation_application_id()
|
/system/core/base/ |
D | threads.cpp | 51 int tgkill(int tgid, int tid, int sig) { in tgkill() argument 52 return syscall(__NR_tgkill, tgid, tid, sig); in tgkill()
|
/system/keymaster/legacy_support/ |
D | keymaster_passthrough_operation.cpp | 67 keymaster_blob_t sig{ signature.peek_read(), signature.available_read() }; in Finish() local 69 …rc = km_device_->finish(km_device_, operation_handle_, &mutable_input_params, &sig, &out_params, &… in Finish() 99 keymaster_blob_t sig{ signature.peek_read(), signature.available_read() }; in Finish() local 103 …rc = km_device_->finish(km_device_, operation_handle_, &input_params, &in, &sig, &out_params, &out… in Finish()
|
D | keymaster0_engine.cpp | 253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument 257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); in ecdsa_sign() 343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in EcdsaSign() argument 374 memcpy(sig, signature.get(), signature_length); in EcdsaSign()
|
/system/update_engine/scripts/update_payload/ |
D | test_utils.py | 104 sig, _ = sign_process.communicate(input=data_sha256_hash) 108 return sig 124 sig = self.sigs.signatures.add() 126 sig.version = version 128 sig.data = data 361 sig = SignSha256(temp_payload_file.getvalue(), privkey_file_name) 363 sigs_gen.AddSig(1, sig)
|
D | checker.py | 1279 for sig, sig_name in common.SignatureIter(sigs.signatures, 'signatures'): 1283 self._CheckMandatoryField(sig, 'version', sig_report, sig_name) 1284 self._CheckMandatoryField(sig, 'data', None, sig_name) 1285 sig_report.AddField('data len', len(sig.data)) 1288 if sig.version == 1: 1289 self._CheckSha256Signature(sig.data, pubkey_file_name, 1293 sig.version)
|
/system/extras/simpleperf/ |
D | IOEventLoop.cpp | 128 bool IOEventLoop::AddSignalEvent(int sig, in AddSignalEvent() argument 130 return AddEvent(sig, EV_SIGNAL | EV_PERSIST, nullptr, callback) != nullptr; in AddSignalEvent() 135 for (auto sig : sigs) { in AddSignalEvents() local 136 if (!AddSignalEvent(sig, callback)) { in AddSignalEvents()
|
D | IOEventLoop.h | 53 bool AddSignalEvent(int sig, const std::function<bool()>& callback);
|
/system/chre/platform/linux/ |
D | init.cc | 50 extern "C" void signalHandler(int sig) { in signalHandler() argument 51 (void)sig; in signalHandler()
|
/system/core/base/include/android-base/ |
D | threads.h | 29 extern "C" int tgkill(int tgid, int tid, int sig);
|
/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster0_engine.h | 76 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, 89 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
|
D | keymaster1_engine.h | 107 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
|
/system/core/libunwindstack/include/unwindstack/ |
D | UcontextArm64.h | 45 uint64_t sig; // unsigned long member
|
/system/memory/libmemunreachable/tests/ |
D | ThreadCapture_test.cpp | 283 const int sig = SIGUSR1; in TEST_F() local 303 sigaction(sig, &act, NULL); in TEST_F() 306 sigaddset(&set, sig); in TEST_F() 324 tgkill(child, tid, sig); in TEST_F()
|
/system/core/adb/ |
D | adb_auth.h | 57 bool adbd_auth_verify(const char* token, size_t token_size, const std::string& sig,
|
/system/update_engine/payload_generator/ |
D | payload_signer_unittest.cc | 119 const Signatures::Signature& sig = signatures.signatures(0); in TEST_F() local 120 const string& sig_data = sig.data(); in TEST_F()
|
/system/core/trusty/confirmationui/ |
D | TrustyConfirmationUI.cpp | 240 auto hsFinalize = [&](const Signature& sig, const Nonce& nCi) -> TeeuiRc { in promptUserConfirmation_() argument 243 nCi, sig); in promptUserConfirmation_() 254 const Signature& sig) -> std::tuple<TeeuiRc, InputResponse> { in promptUserConfirmation_() argument 256 app->issueCmd<DeliverInputEvent, DeliverInputEventResponse>(event, sig); in promptUserConfirmation_()
|
/system/core/adb/daemon/ |
D | auth.cpp | 155 bool adbd_auth_verify(const char* token, size_t token_size, const std::string& sig, in adbd_auth_verify() argument 178 reinterpret_cast<const uint8_t*>(sig.c_str()), sig.size(), key) == 1); in adbd_auth_verify()
|
/system/security/keystore-engine/ |
D | android_engine.cpp | 144 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument 174 memcpy(sig, &reply[0], reply_len); in ecdsa_sign()
|
/system/extras/latencytop/ |
D | latencytop.c | 56 static void signal_handler(int sig); 397 static void signal_handler(int sig) { in signal_handler() argument
|