| /external/e2fsprogs/tests/d_xattr_edits/ |
| D | script | 1 if ! test -x $DEBUGFS_EXE; then 8 VERIFY_FSCK_OPT=-yf 17 echo "mke2fs -Fq -b 1024 test.img 512" >> $OUT.new 19 $MKE2FS -Fq -b 1024 $TMPFILE 512 > /dev/null 2>&1 20 status=$? 21 echo Exit status is $status >> $OUT.new 24 $DEBUGFS -w -R "ea_set / user.joe smith" $TMPFILE >> $OUT.new 2>&1 25 status=$? 26 echo Exit status is $status >> $OUT.new 29 $DEBUGFS -w -R "ea_set / user.moo FEE_FIE_FOE_FUMMMMMM" $TMPFILE >> $OUT.new 2>&1 [all …]
|
| D | expect | 2 mke2fs -Fq -b 1024 test.img 512 3 Exit status is 0 5 Exit status is 0 7 Exit status is 0 12 Exit status is 0 16 Exit status is 0 19 Exit status is 0 21 Exit status is 0 23 Exit status is 0 27 Exit status is 0 [all …]
|
| /external/e2fsprogs/tests/f_resize_inode/ |
| D | script | 2 if ! test -x $DEBUGFS_EXE; then 7 FSCK_OPT=-yf 9 if [ -f $test_dir/expect.gz ]; then 18 echo mke2fs -F -O resize_inode -o Linux -b 1024 -g 1024 test.img 16384 > $OUT.new 19 $MKE2FS -F -O resize_inode -o Linux -b 1024 -g 1024 $TMPFILE 16384 >> $OUT.new 2>&1 21 $FSCK $FSCK_OPT -N test_filesys $TMPFILE >> $OUT.new 2>&1 22 status=$? 23 echo Exit status is $status >> $OUT.new 25 echo ----------------------------------------------- >> $OUT.new 28 echo "debugfs -R ''set_inode_field <7> block[2] 42'' -w test.img" >> $OUT.new [all …]
|
| D | expect | 1 mke2fs -F -O resize_inode -o Linux -b 1024 -g 1024 test.img 16384 15 test_filesys: 11/4096 files (0.0% non-contiguous), 2619/16384 blocks 16 Exit status is 0 17 ----------------------------------------------- 19 debugfs -R ''set_inode_field <7> block[2] 42'' -w test.img 20 Exit status is 0 36 test_filesys: 11/4096 files (0.0% non-contiguous), 2619/16384 blocks 37 Exit status is 1 43 test_filesys: 11/4096 files (0.0% non-contiguous), 2619/16384 blocks 44 Exit status is 0 [all …]
|
| /external/mbedtls/library/ |
| D | lmots.c | 2 * The LM-OTS one-time public-key signature scheme 5 * SPDX-License-Identifier: Apache-2.0 11 * http://www.apache.org/licenses/LICENSE-2.0 22 * of the LM-OTS algorithm: 28 * [2] NIST Special Publication 800-208 30 * https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf 55 /* We only support parameter sets that use 8-bit digits, as it does not require 63 #define DIGIT_MAX_VALUE ((1u << W_WINTERNITZ_PARAMETER) - 1u) 80 bytes[idx] = ( val >> ( ( len - 1 - idx ) * 8 ) ) & 0xFF; in mbedtls_lms_unsigned_int_to_network_bytes() 92 val |= ( ( unsigned int )bytes[idx] ) << (8 * ( len - 1 - idx ) ); in mbedtls_lms_network_bytes_to_unsigned_int() [all …]
|
| D | psa_crypto.c | 6 * SPDX-License-Identifier: Apache-2.0 12 * http://www.apache.org/licenses/LICENSE-2.0 127 /* Mbed TLS error codes can combine a high-level error code and a in mbedtls_to_psa_error() 128 * low-level error code. The low-level error usually reflects the in mbedtls_to_psa_error() 130 int low_level_ret = - ( -ret & 0x007f ); in mbedtls_to_psa_error() 489 * when called with the validated \p algorithm and \p key_type is well-defined. 530 if( slot->key.data != NULL ) in psa_allocate_buffer_to_slot() 533 slot->key.data = mbedtls_calloc( 1, buffer_length ); in psa_allocate_buffer_to_slot() 534 if( slot->key.data == NULL ) in psa_allocate_buffer_to_slot() 537 slot->key.bytes = buffer_length; in psa_allocate_buffer_to_slot() [all …]
|
| D | psa_crypto_cipher.c | 6 * SPDX-License-Identifier: Apache-2.0 12 * http://www.apache.org/licenses/LICENSE-2.0 128 /* key_bits is 64 for Single-DES, 128 for two-key Triple-DES, in mbedtls_cipher_info_from_psa() 129 * and 192 for three-key Triple-DES. */ in mbedtls_cipher_info_from_psa() 134 /* mbedtls doesn't recognize two-key Triple-DES as an algorithm, in mbedtls_cipher_info_from_psa() 135 * but two-key Triple-DES is functionally three-key Triple-DES in mbedtls_cipher_info_from_psa() 173 psa_key_type_t key_type = attributes->core.type; in psa_cipher_setup() 177 mbedtls_cipher_init( &operation->ctx.cipher ); in psa_cipher_setup() 179 operation->alg = alg; in psa_cipher_setup() 180 key_bits = attributes->core.bits; in psa_cipher_setup() [all …]
|
| D | ssl_cookie.c | 5 * SPDX-License-Identifier: Apache-2.0 11 * http://www.apache.org/licenses/LICENSE-2.0 41 * If DTLS is in use, then at least one of SHA-1, SHA-256, SHA-384 is 42 * available. Try SHA-256 first, 384 wastes resources 57 #error "DTLS hello verify needs SHA-1 or SHA-2" 61 * Cookies are formed of a 4-bytes timestamp (or serial number) and 69 ctx->psa_hmac_key = MBEDTLS_SVC_KEY_ID_INIT; in mbedtls_ssl_cookie_init() 71 mbedtls_md_init( &ctx->hmac_ctx ); in mbedtls_ssl_cookie_init() 74 ctx->serial = 0; in mbedtls_ssl_cookie_init() 76 ctx->timeout = MBEDTLS_SSL_COOKIE_TIMEOUT; in mbedtls_ssl_cookie_init() [all …]
|
| D | psa_crypto_ecp.c | 6 * SPDX-License-Identifier: Apache-2.0 12 * http://www.apache.org/licenses/LICENSE-2.0 51 psa_status_t status; in mbedtls_psa_ecp_load_representation() local 60 * - The byte 0x04; in mbedtls_psa_ecp_load_representation() 61 * - `x_P` as a `ceiling(m/8)`-byte string, big-endian; in mbedtls_psa_ecp_load_representation() 62 * - `y_P` as a `ceiling(m/8)`-byte string, big-endian. in mbedtls_psa_ecp_load_representation() 78 /* With an explicit bit-size, the data must have the matching length. */ in mbedtls_psa_ecp_load_representation() 84 /* We need to infer the bit-size from the data. Since the only in mbedtls_psa_ecp_load_representation() 103 * well-regarded curve that Mbed TLS just doesn't know about (which in mbedtls_psa_ecp_load_representation() 107 status = PSA_ERROR_NOT_SUPPORTED; in mbedtls_psa_ecp_load_representation() [all …]
|
| D | psa_its_file.c | 6 * SPDX-License-Identifier: Apache-2.0 12 * http://www.apache.org/licenses/LICENSE-2.0 45 ( sizeof( PSA_ITS_STORAGE_PREFIX ) - 1 + /*prefix without terminating 0*/ \ 46 16 + /*UID (64-bit number in hex)*/ \ 47 sizeof( PSA_ITS_STORAGE_SUFFIX ) - 1 + /*suffix without terminating 0*/ \ 77 /* Break up the UID into two 32-bit pieces so as not to rely on in psa_its_fill_filename() 111 p_info->size = ( header.size[0] | in psa_its_read_file() 115 p_info->flags = ( header.flags[0] | in psa_its_read_file() 125 psa_status_t status; in psa_its_get_info() local 127 status = psa_its_read_file( uid, p_info, &stream ); in psa_its_get_info() [all …]
|
| /external/libcap/progs/ |
| D | capsh.c | 2 * Copyright (c) 2008-11,16,19,2020 Andrew G. Morgan <morgan@kernel.org> 9 * The --print option can be used as a quick test whether various 49 string[--i] = '\0'; in binary() 51 string[--i] = (value & 1) ? '1' : '0'; in binary() 114 int status, j; in arg_print() local 129 printf("Securebits: 0%lo/0x%lx/%u'b%s (no-new-privs=%d)\n", set, set, in arg_print() 132 printf(" secure-noroot: %s (%s)\n", in arg_print() 135 printf(" secure-no-suid-fixup: %s (%s)\n", in arg_print() 138 printf(" secure-keep-caps: %s (%s)\n", in arg_print() 142 printf(" secure-no-ambient-raise: %s (%s)\n", in arg_print() [all …]
|
| /external/openthread/third_party/mbedtls/repo/library/ |
| D | psa_crypto_cipher.c | 6 * SPDX-License-Identifier: Apache-2.0 12 * http://www.apache.org/licenses/LICENSE-2.0 98 /* key_bits is 64 for Single-DES, 128 for two-key Triple-DES, in mbedtls_cipher_info_from_psa() 99 * and 192 for three-key Triple-DES. */ in mbedtls_cipher_info_from_psa() 104 /* mbedtls doesn't recognize two-key Triple-DES as an algorithm, in mbedtls_cipher_info_from_psa() 105 * but two-key Triple-DES is functionally three-key Triple-DES in mbedtls_cipher_info_from_psa() 141 psa_key_type_t key_type = attributes->core.type; in psa_cipher_setup() 145 mbedtls_cipher_init( &operation->ctx.cipher ); in psa_cipher_setup() 147 operation->alg = alg; in psa_cipher_setup() 148 key_bits = attributes->core.bits; in psa_cipher_setup() [all …]
|
| D | psa_crypto.c | 6 * SPDX-License-Identifier: Apache-2.0 12 * http://www.apache.org/licenses/LICENSE-2.0 129 /* Mbed TLS error codes can combine a high-level error code and a in mbedtls_to_psa_error() 130 * low-level error code. The low-level error usually reflects the in mbedtls_to_psa_error() 132 int low_level_ret = - ( -ret & 0x007f ); in mbedtls_to_psa_error() 551 * when called with the validated \p algorithm and \p key_type is well-defined. 592 if( slot->key.data != NULL ) in psa_allocate_buffer_to_slot() 595 slot->key.data = mbedtls_calloc( 1, buffer_length ); in psa_allocate_buffer_to_slot() 596 if( slot->key.data == NULL ) in psa_allocate_buffer_to_slot() 599 slot->key.bytes = buffer_length; in psa_allocate_buffer_to_slot() [all …]
|
| D | psa_crypto_rsa.c | 6 * SPDX-License-Identifier: Apache-2.0 12 * http://www.apache.org/licenses/LICENSE-2.0 51 /* Mbed TLS doesn't support non-byte-aligned key sizes (i.e. key sizes 55 * To keep things simple, reject non-byte-aligned key sizes. */ 60 psa_status_t status; in psa_check_rsa_key_byte_aligned() local 62 status = mbedtls_to_psa_error( in psa_check_rsa_key_byte_aligned() 64 if( status == PSA_SUCCESS ) in psa_check_rsa_key_byte_aligned() 67 status = PSA_ERROR_NOT_SUPPORTED; in psa_check_rsa_key_byte_aligned() 70 return( status ); in psa_check_rsa_key_byte_aligned() 77 psa_status_t status; in mbedtls_psa_rsa_load_representation() local [all …]
|
| D | psa_its_file.c | 6 * SPDX-License-Identifier: Apache-2.0 12 * http://www.apache.org/licenses/LICENSE-2.0 49 ( sizeof( PSA_ITS_STORAGE_PREFIX ) - 1 + /*prefix without terminating 0*/ \ 50 16 + /*UID (64-bit number in hex)*/ \ 51 sizeof( PSA_ITS_STORAGE_SUFFIX ) - 1 + /*suffix without terminating 0*/ \ 81 /* Break up the UID into two 32-bit pieces so as not to rely on in psa_its_fill_filename() 112 p_info->size = ( header.size[0] | in psa_its_read_file() 116 p_info->flags = ( header.flags[0] | in psa_its_read_file() 126 psa_status_t status; in psa_its_get_info() local 128 status = psa_its_read_file( uid, p_info, &stream ); in psa_its_get_info() [all …]
|
| /external/e2fsprogs/tests/t_dangerous/ |
| D | script | 1 FSCK_OPT=-fn 36 MKE2FS_CONFIG=$CONF $MKE2FS -F -T ext4h -o Linux -U 6fc3daa4-180d-4f2b-a6f2-f7a5efb79bcf $TMPFILE 5… 39 $DEBUGFS -w -R 'ssv mtime now' $TMPFILE > /dev/null 2>&1 40 $DEBUGFS -w -R 'ssv lastcheck 20000' $TMPFILE > /dev/null 2>&1 43 echo "tune2fs -O metadata_csum test.img" >> $OUT 44 $TUNE2FS -O metadata_csum $TMPFILE >> $OUT 2>&1 45 status=$? 46 echo Exit status is $status >> $OUT 49 $FSCK -f -y -N test_filesys $TMPFILE > /dev/null 2>&1 52 echo "tune2fs -O metadata_csum test.img" >> $OUT [all …]
|
| D | expect | 12 tune2fs -O metadata_csum test.img 16 Please run e2fsck -f on the filesystem. 18 Exit status is 1 19 tune2fs -O metadata_csum test.img 20 Exit status is 0 37 Exit status is 0 38 tune2fs -O metadata_csum test.img 41 Exit status is 1 42 tune2fs -I 512 test.img 45 Exit status is 1 [all …]
|
| /external/e2fsprogs/tests/d_xattr_sorting/ |
| D | script | 1 if ! test -x $DEBUGFS_EXE; then 8 VERIFY_FSCK_OPT=-yf 17 echo "mke2fs -Fq -b 1024 test.img 512" >> $OUT.new 19 $MKE2FS -Fq -b 1024 $TMPFILE 512 > /dev/null 2>&1 20 status=$? 21 echo Exit status is $status >> $OUT.new 23 B=$(mktemp ${TMPDIR:-/tmp}/b.XXXXXX) 25 perl -e 'print "x" x 256;' > $B 27 echo "ea_set -f /tmp/b / security.SMEG64" >> $OUT.new 28 $DEBUGFS -w -R "ea_set -f $B / security.SMEG64" $TMPFILE >> $OUT.new 2>&1 [all …]
|
| D | expect | 2 mke2fs -Fq -b 1024 test.img 512 3 Exit status is 0 4 ea_set -f /tmp/b / security.SMEG64 5 Exit status is 0 6 ea_set -f /tmp/b / security.imb 7 Exit status is 0 9 Exit status is 0 15 Exit status is 0 19 Exit status is 0 23 Exit status is 0 [all …]
|
| /external/elfutils/tests/ |
| D | run-strip-g.sh | 18 . $srcdir/test-subr.sh 28 echo "int main() { return 1; }" | ${CC} -g -xc - 30 echo strip -g to file with debug file 31 testrun ${abs_top_builddir}/src/strip -g -o strip.out -f debug.out || 32 { echo "*** failed to strip -g -o strip.out -f debug.out a.out"; exit -1; } 34 status=0 35 testrun ${abs_top_builddir}/src/readelf -S strip.out > readelf.out 36 grep SYMTAB readelf.out || status=$? 37 echo $status 38 if test $status -ne 0; then [all …]
|
| /external/e2fsprogs/tests/d_special_files/ |
| D | script | 1 if ! test -x $DEBUGFS_EXE; then 8 VERIFY_FSCK_OPT=-yf 17 echo "mke2fs -Fq -b 1024 test.img 512" >> $OUT.new 19 $MKE2FS -Fq -b 1024 -o linux $TMPFILE 512 > /dev/null 2>&1 20 status=$? 21 echo Exit status is $status >> $OUT.new 23 $DEBUGFS -w $TMPFILE << EOF > /dev/null 2>&1 35 echo "debugfs -R ''stat foo'' -w test.img" >> $OUT.new 36 $DEBUGFS -R "stat foo" -w $TMPFILE >> $OUT.new 2>&1 37 status=$? [all …]
|
| /external/toolchain-utils/llvm_tools/ |
| D | update_tryjob_status.py | 2 # -*- coding: utf-8 -*- 4 # Use of this source code is governed by a BSD-style license that can be 7 """Updates the status of a tryjob.""" 22 """Values for the 'status' field of a tryjob.""" 29 # Executes the script passed into the command line (this script's exit code 30 # determines the 'status' value of the tryjob). 35 """Exit code values of a custom script.""" 38 # exception which would cause the exit code of the script to be 1, so the 39 # tryjob's 'status' would be updated when there is an exception. 41 # Exit codes are as follows: [all …]
|
| /external/swiftshader/third_party/llvm-10.0/llvm/lib/Target/AMDGPU/ |
| D | SIModeRegister.cpp | 1 //===-- SIModeRegister.cpp - Mode Register --------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 14 //===----------------------------------------------------------------------===// 33 #define DEBUG_TYPE "si-mode-register" 39 struct Status { struct 45 Status() : Mask(0), Mode(0){}; in Status() argument 47 Status(unsigned NewMask, unsigned NewMode) : Mask(NewMask), Mode(NewMode) { in Status() argument 51 // merge two status values such that only values that don't conflict are 53 Status merge(const Status &S) const { in merge() argument [all …]
|
| /external/ltp/tools/genload/ |
| D | stress.c | 17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. 35 /* By default, just print warning for non-critical errors. */ 38 /* By default, retry on non-critical errors every 50ms. */ 53 /* Implemention of runtime-selectable severity message printing. */ 69 if (++i == argc || ((arg = argv[i])[0] == '-' && \ 73 exit (1); \ 77 int usage(int status); 78 int version(int status); 111 if ((starttime = time(NULL)) == -1) { in main() 113 exit(1); in main() [all …]
|
| D | genload.c | 17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. 35 /* By default, just print warning for non-critical errors. */ 38 /* By default, retry on non-critical errors every 50ms. */ 53 /* Implemention of runtime-selectable severity message printing. */ 69 if (++i == argc || ((arg = argv[i])[0] == '-' && \ 73 exit (1); \ 77 int usage(int status); 78 int version(int status); 111 if ((starttime = time(NULL)) == -1) { in main() 113 exit(1); in main() [all …]
|