Home
last modified time | relevance | path

Searched refs:sig (Results 1 – 25 of 34) sorted by relevance

12

/system/core/adb/crypto/tests/
Dkey_test.cpp49 std::vector<uint8_t> sig(RSA_size(rsa)); in TEST() local
51 EXPECT_EQ(RSA_sign(NID_sha1, reinterpret_cast<const uint8_t*>(token), sizeof(token), sig.data(), in TEST()
54 sig.resize(sig_len); in TEST()
63 sig.data(), sig.size(), key), in TEST()
Drsa_2048_key_test.cpp52 std::vector<uint8_t> sig(RSA_size(rsa)); in TEST() local
54 EXPECT_EQ(RSA_sign(NID_sha1, reinterpret_cast<const uint8_t*>(token), sizeof(token), sig.data(), in TEST()
57 sig.resize(sig_len); in TEST()
66 sig.data(), sig.size(), key), in TEST()
/system/bt/stack/avdt/
Davdt_msg.cc989 uint8_t sig) { in avdt_msg_prs_rej() argument
993 if ((sig == AVDT_SIG_SETCONFIG) || (sig == AVDT_SIG_RECONFIG)) { in avdt_msg_prs_rej()
996 } else if ((sig == AVDT_SIG_START) || (sig == AVDT_SIG_SUSPEND)) { in avdt_msg_prs_rej()
1068 uint8_t sig; in avdt_msg_send() local
1142 sig = (uint8_t)p_ccb->p_curr_msg->event; in avdt_msg_send()
1143 AVDT_TRACE_DEBUG("avdt_msg_send label:%d, msg:%d, sig:%d", label, msg, sig); in avdt_msg_send()
1154 if ((sig == AVDT_SIG_DISCOVER) || (sig == AVDT_SIG_GETCAP) || in avdt_msg_send()
1155 (sig == AVDT_SIG_SECURITY) || (avdtp_cb.rcb.ret_tout == 0)) { in avdt_msg_send()
1161 } else if (sig != AVDT_SIG_DELAY_RPT) { in avdt_msg_send()
1187 AVDT_MSG_BLD_SIG(p, sig); in avdt_msg_send()
[all …]
Davdt_defs.h170 #define AVDT_MSG_PRS_SIG(p, sig) \ argument
172 (sig) = (*(p)++) & 0x3F; \
217 #define AVDT_MSG_BLD_SIG(p, sig) \ argument
219 *(p)++ = (uint8_t)(sig); \
/system/incremental_delivery/incfs/incfsdump/
Ddump.cpp348 auto& sig = mdBuf.signature; in dumpMd() local
349 sig = readAt<decltype(sig)>(offset); in dumpMd()
350 out() << "signature size: " << sig.sg_sig_size; in dumpMd()
351 out() << "signature offset: " << hex(sig.sg_sig_offset); in dumpMd()
352 out() << "hash tree size: " << sig.sg_hash_tree_size; in dumpMd()
353 out() << "hash tree offset: " << hex(sig.sg_hash_tree_offset); in dumpMd()
354 dumpTree(sig.sg_hash_tree_offset, sig.sg_hash_tree_size); in dumpMd()
/system/security/keystore/
Dkeystore_attestation_id.cpp53 std::vector<uint8_t> signature2SHA256(const content::pm::Signature& sig) { in signature2SHA256() argument
55 SHA256(sig.data().data(), sig.data().size(), digest_buffer.data()); in signature2SHA256()
237 for (auto sig = pinfo.sigs_begin(); sig != pinfo.sigs_end(); ++sig) { in build_attestation_application_id() local
238 signature_digests.push_back(signature2SHA256(*sig)); in build_attestation_application_id()
/system/core/base/
Dthreads.cpp51 int tgkill(int tgid, int tid, int sig) { in tgkill() argument
52 return syscall(__NR_tgkill, tgid, tid, sig); in tgkill()
/system/keymaster/legacy_support/
Dkeymaster_passthrough_operation.cpp67 keymaster_blob_t sig{ signature.peek_read(), signature.available_read() }; in Finish() local
69 …rc = km_device_->finish(km_device_, operation_handle_, &mutable_input_params, &sig, &out_params, &… in Finish()
99 keymaster_blob_t sig{ signature.peek_read(), signature.available_read() }; in Finish() local
103 …rc = km_device_->finish(km_device_, operation_handle_, &input_params, &in, &sig, &out_params, &out… in Finish()
Dkeymaster0_engine.cpp253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument
257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); in ecdsa_sign()
343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in EcdsaSign() argument
374 memcpy(sig, signature.get(), signature_length); in EcdsaSign()
/system/update_engine/scripts/update_payload/
Dtest_utils.py104 sig, _ = sign_process.communicate(input=data_sha256_hash)
108 return sig
124 sig = self.sigs.signatures.add()
126 sig.version = version
128 sig.data = data
361 sig = SignSha256(temp_payload_file.getvalue(), privkey_file_name)
363 sigs_gen.AddSig(1, sig)
Dchecker.py1279 for sig, sig_name in common.SignatureIter(sigs.signatures, 'signatures'):
1283 self._CheckMandatoryField(sig, 'version', sig_report, sig_name)
1284 self._CheckMandatoryField(sig, 'data', None, sig_name)
1285 sig_report.AddField('data len', len(sig.data))
1288 if sig.version == 1:
1289 self._CheckSha256Signature(sig.data, pubkey_file_name,
1293 sig.version)
/system/extras/simpleperf/
DIOEventLoop.cpp128 bool IOEventLoop::AddSignalEvent(int sig, in AddSignalEvent() argument
130 return AddEvent(sig, EV_SIGNAL | EV_PERSIST, nullptr, callback) != nullptr; in AddSignalEvent()
135 for (auto sig : sigs) { in AddSignalEvents() local
136 if (!AddSignalEvent(sig, callback)) { in AddSignalEvents()
DIOEventLoop.h53 bool AddSignalEvent(int sig, const std::function<bool()>& callback);
/system/chre/platform/linux/
Dinit.cc50 extern "C" void signalHandler(int sig) { in signalHandler() argument
51 (void)sig; in signalHandler()
/system/core/base/include/android-base/
Dthreads.h29 extern "C" int tgkill(int tgid, int tid, int sig);
/system/keymaster/include/keymaster/legacy_support/
Dkeymaster0_engine.h76 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
89 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
Dkeymaster1_engine.h107 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
/system/core/libunwindstack/include/unwindstack/
DUcontextArm64.h45 uint64_t sig; // unsigned long member
/system/memory/libmemunreachable/tests/
DThreadCapture_test.cpp283 const int sig = SIGUSR1; in TEST_F() local
303 sigaction(sig, &act, NULL); in TEST_F()
306 sigaddset(&set, sig); in TEST_F()
324 tgkill(child, tid, sig); in TEST_F()
/system/core/adb/
Dadb_auth.h57 bool adbd_auth_verify(const char* token, size_t token_size, const std::string& sig,
/system/update_engine/payload_generator/
Dpayload_signer_unittest.cc119 const Signatures::Signature& sig = signatures.signatures(0); in TEST_F() local
120 const string& sig_data = sig.data(); in TEST_F()
/system/core/trusty/confirmationui/
DTrustyConfirmationUI.cpp240 auto hsFinalize = [&](const Signature& sig, const Nonce& nCi) -> TeeuiRc { in promptUserConfirmation_() argument
243 nCi, sig); in promptUserConfirmation_()
254 const Signature& sig) -> std::tuple<TeeuiRc, InputResponse> { in promptUserConfirmation_() argument
256 app->issueCmd<DeliverInputEvent, DeliverInputEventResponse>(event, sig); in promptUserConfirmation_()
/system/core/adb/daemon/
Dauth.cpp155 bool adbd_auth_verify(const char* token, size_t token_size, const std::string& sig, in adbd_auth_verify() argument
178 reinterpret_cast<const uint8_t*>(sig.c_str()), sig.size(), key) == 1); in adbd_auth_verify()
/system/security/keystore-engine/
Dandroid_engine.cpp144 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument
174 memcpy(sig, &reply[0], reply_len); in ecdsa_sign()
/system/extras/latencytop/
Dlatencytop.c56 static void signal_handler(int sig);
397 static void signal_handler(int sig) { in signal_handler() argument

12