| /external/e2fsprogs/tests/d_xattr_edits/ |
| D | script | 1 if ! test -x $DEBUGFS_EXE; then 8 VERIFY_FSCK_OPT=-yf 17 echo "mke2fs -Fq -b 1024 test.img 512" >> $OUT.new 19 $MKE2FS -Fq -b 1024 $TMPFILE 512 > /dev/null 2>&1 20 status=$? 21 echo Exit status is $status >> $OUT.new 24 $DEBUGFS -w -R "ea_set / user.joe smith" $TMPFILE >> $OUT.new 2>&1 25 status=$? 26 echo Exit status is $status >> $OUT.new 29 $DEBUGFS -w -R "ea_set / user.moo FEE_FIE_FOE_FUMMMMMM" $TMPFILE >> $OUT.new 2>&1 [all …]
|
| D | expect | 2 mke2fs -Fq -b 1024 test.img 512 3 Exit status is 0 5 Exit status is 0 7 Exit status is 0 12 Exit status is 0 16 Exit status is 0 19 Exit status is 0 21 Exit status is 0 23 Exit status is 0 27 Exit status is 0 [all …]
|
| /external/e2fsprogs/tests/f_resize_inode/ |
| D | script | 2 if ! test -x $DEBUGFS_EXE; then 7 FSCK_OPT=-yf 9 if [ -f $test_dir/expect.gz ]; then 18 echo mke2fs -F -O resize_inode -o Linux -b 1024 -g 1024 test.img 16384 > $OUT.new 19 $MKE2FS -F -O resize_inode -o Linux -b 1024 -g 1024 $TMPFILE 16384 >> $OUT.new 2>&1 21 $FSCK $FSCK_OPT -N test_filesys $TMPFILE >> $OUT.new 2>&1 22 status=$? 23 echo Exit status is $status >> $OUT.new 25 echo ----------------------------------------------- >> $OUT.new 28 echo "debugfs -R ''set_inode_field <7> block[2] 42'' -w test.img" >> $OUT.new [all …]
|
| D | expect | 1 mke2fs -F -O resize_inode -o Linux -b 1024 -g 1024 test.img 16384 15 test_filesys: 11/4096 files (0.0% non-contiguous), 2619/16384 blocks 16 Exit status is 0 17 ----------------------------------------------- 19 debugfs -R ''set_inode_field <7> block[2] 42'' -w test.img 20 Exit status is 0 36 test_filesys: 11/4096 files (0.0% non-contiguous), 2619/16384 blocks 37 Exit status is 1 43 test_filesys: 11/4096 files (0.0% non-contiguous), 2619/16384 blocks 44 Exit status is 0 [all …]
|
| /external/mbedtls/library/ |
| D | lmots.c | 2 * The LM-OTS one-time public-key signature scheme 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 10 * of the LM-OTS algorithm: 16 * [2] NIST Special Publication 800-208 18 * https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf 38 static int local_err_translation(psa_status_t status) in local_err_translation() argument 40 return psa_status_to_mbedtls(status, psa_to_lms_errors, in local_err_translation() 44 #define PSA_TO_MBEDTLS_ERR(status) local_err_translation(status) argument 54 /* We only support parameter sets that use 8-bit digits, as it does not require 62 #define DIGIT_MAX_VALUE ((1u << W_WINTERNITZ_PARAMETER) - 1u) [all …]
|
| D | psa_crypto.c | 6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 137 /* Mbed TLS error codes can combine a high-level error code and a in mbedtls_to_psa_error() 138 * low-level error code. The low-level error usually reflects the in mbedtls_to_psa_error() 140 int low_level_ret = -(-ret & 0x007f); in mbedtls_to_psa_error() 380 * attack on the tag and deliberately-crafted 382 * return status properly. 386 * \param status Status of function called to generate 393 static void psa_wipe_tag_output_buffer(uint8_t *output_buffer, psa_status_t status, in psa_wipe_tag_output_buffer() argument 404 if (status == PSA_SUCCESS) { in psa_wipe_tag_output_buffer() 408 memset(output_buffer + offset, '!', output_buffer_size - offset); in psa_wipe_tag_output_buffer() [all …]
|
| D | psa_crypto_cipher.c | 6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 114 /* key_bits is 64 for Single-DES, 128 for two-key Triple-DES, in mbedtls_cipher_info_from_psa() 115 * and 192 for three-key Triple-DES. */ in mbedtls_cipher_info_from_psa() 121 /* mbedtls doesn't recognize two-key Triple-DES as an algorithm, in mbedtls_cipher_info_from_psa() 122 * but two-key Triple-DES is functionally three-key Triple-DES in mbedtls_cipher_info_from_psa() 162 psa_key_type_t key_type = attributes->core.type; in psa_cipher_setup() 166 mbedtls_cipher_init(&operation->ctx.cipher); in psa_cipher_setup() 168 operation->alg = alg; in psa_cipher_setup() 169 key_bits = attributes->core.bits; in psa_cipher_setup() 176 ret = mbedtls_cipher_setup(&operation->ctx.cipher, cipher_info); in psa_cipher_setup() [all …]
|
| D | ssl_cookie.c | 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 30 static int local_err_translation(psa_status_t status) in local_err_translation() argument 32 return psa_status_to_mbedtls(status, psa_to_ssl_errors, in local_err_translation() 36 #define PSA_TO_MBEDTLS_ERR(status) local_err_translation(status) argument 40 * If DTLS is in use, then at least one of SHA-256 or SHA-384 is 41 * available. Try SHA-256 first as 384 wastes resources 52 #error "DTLS hello verify needs SHA-256 or SHA-384" 56 * Cookies are formed of a 4-bytes timestamp (or serial number) and 64 ctx->psa_hmac_key = MBEDTLS_SVC_KEY_ID_INIT; in mbedtls_ssl_cookie_init() 66 mbedtls_md_init(&ctx->hmac_ctx); in mbedtls_ssl_cookie_init() [all …]
|
| D | psa_its_file.c | 6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 33 (sizeof(PSA_ITS_STORAGE_PREFIX) - 1 + /*prefix without terminating 0*/ \ 34 16 + /*UID (64-bit number in hex)*/ \ 35 sizeof(PSA_ITS_STORAGE_SUFFIX) - 1 + /*suffix without terminating 0*/ \ 64 /* Break up the UID into two 32-bit pieces so as not to rely on in psa_its_fill_filename() 101 p_info->size = (header.size[0] | in psa_its_read_file() 105 p_info->flags = (header.flags[0] | in psa_its_read_file() 115 psa_status_t status; in psa_its_get_info() local 117 status = psa_its_read_file(uid, p_info, &stream); in psa_its_get_info() 121 return status; in psa_its_get_info() [all …]
|
| D | lms.c | 2 * The LMS stateful-hash public-key signature scheme 5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 16 * [2] NIST Special Publication 800-208 18 * https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf 39 static int local_err_translation(psa_status_t status) in local_err_translation() argument 41 return psa_status_to_mbedtls(status, psa_to_lms_errors, in local_err_translation() 45 #define PSA_TO_MBEDTLS_ERR(status) local_err_translation(status) argument 89 * 1-indexed. 99 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in create_merkle_leaf_value() local 104 status = psa_hash_setup(&op, PSA_ALG_SHA_256); in create_merkle_leaf_value() [all …]
|
| /external/libcap/progs/ |
| D | capsh.c | 2 * Copyright (c) 2008-11,16,19,2020 Andrew G. Morgan <morgan@kernel.org> 9 * The --print option can be used as a quick test whether various 43 /* parse a non-negative integer with some error handling */ 50 if (len == 0 || *text == '-') { in nonneg_uint() 64 fprintf(stderr, "%s: want non-negative integer, got \"%s\"\n", in nonneg_uint() 66 exit(1); in nonneg_uint() 78 string[--i] = '\0'; in binary() 80 string[--i] = (value & 1) ? '1' : '0'; in binary() 123 exit(1); in display_current() 139 exit(1); in display_current_iab() [all …]
|
| /external/e2fsprogs/tests/d_xattr_sorting/ |
| D | script | 1 if ! test -x $DEBUGFS_EXE; then 8 VERIFY_FSCK_OPT=-yf 17 echo "mke2fs -Fq -b 1024 test.img 512" >> $OUT.new 19 $MKE2FS -Fq -b 1024 $TMPFILE 512 > /dev/null 2>&1 20 status=$? 21 echo Exit status is $status >> $OUT.new 23 B=$(mktemp ${TMPDIR:-/tmp}/b.XXXXXX) 25 perl -e 'print "x" x 256;' > $B 27 echo "ea_set -f /tmp/b / security.SMEG64" >> $OUT.new 28 $DEBUGFS -w -R "ea_set -f $B / security.SMEG64" $TMPFILE >> $OUT.new 2>&1 [all …]
|
| D | expect | 2 mke2fs -Fq -b 1024 test.img 512 3 Exit status is 0 4 ea_set -f /tmp/b / security.SMEG64 5 Exit status is 0 6 ea_set -f /tmp/b / security.imb 7 Exit status is 0 9 Exit status is 0 15 Exit status is 0 19 Exit status is 0 23 Exit status is 0 [all …]
|
| /external/e2fsprogs/tests/t_dangerous/ |
| D | script | 1 FSCK_OPT=-fn 36 MKE2FS_CONFIG=$CONF $MKE2FS -F -T ext4h -o Linux -U 6fc3daa4-180d-4f2b-a6f2-f7a5efb79bcf $TMPFILE 5… 39 $DEBUGFS -w -R 'ssv mtime now' $TMPFILE > /dev/null 2>&1 40 $DEBUGFS -w -R 'ssv lastcheck 20000' $TMPFILE > /dev/null 2>&1 43 echo "tune2fs -O metadata_csum test.img" >> $OUT 44 $TUNE2FS -O metadata_csum $TMPFILE >> $OUT 2>&1 45 status=$? 46 echo Exit status is $status >> $OUT 49 $FSCK -f -y -N test_filesys $TMPFILE > /dev/null 2>&1 52 echo "tune2fs -O metadata_csum test.img" >> $OUT [all …]
|
| D | expect | 12 tune2fs -O metadata_csum test.img 16 Please run e2fsck -f on the filesystem. 18 Exit status is 1 19 tune2fs -O metadata_csum test.img 20 Exit status is 0 37 Exit status is 0 38 tune2fs -O metadata_csum test.img 41 Exit status is 1 42 tune2fs -I 512 test.img 45 Exit status is 1 [all …]
|
| /external/openthread/third_party/mbedtls/repo/library/ |
| D | psa_crypto_cipher.c | 6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 109 /* key_bits is 64 for Single-DES, 128 for two-key Triple-DES, in mbedtls_cipher_info_from_psa() 110 * and 192 for three-key Triple-DES. */ in mbedtls_cipher_info_from_psa() 116 /* mbedtls doesn't recognize two-key Triple-DES as an algorithm, in mbedtls_cipher_info_from_psa() 117 * but two-key Triple-DES is functionally three-key Triple-DES in mbedtls_cipher_info_from_psa() 162 psa_key_type_t key_type = attributes->core.type; in psa_cipher_setup() 166 mbedtls_cipher_init(&operation->ctx.cipher); in psa_cipher_setup() 168 operation->alg = alg; in psa_cipher_setup() 169 key_bits = attributes->core.bits; in psa_cipher_setup() 176 ret = mbedtls_cipher_setup(&operation->ctx.cipher, cipher_info); in psa_cipher_setup() [all …]
|
| D | psa_crypto.c | 6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 111 /* Mbed TLS error codes can combine a high-level error code and a in mbedtls_to_psa_error() 112 * low-level error code. The low-level error usually reflects the in mbedtls_to_psa_error() 114 int low_level_ret = -(-ret & 0x007f); in mbedtls_to_psa_error() 535 * when called with the validated \p algorithm and \p key_type is well-defined. 575 if (slot->key.data != NULL) { in psa_allocate_buffer_to_slot() 579 slot->key.data = mbedtls_calloc(1, buffer_length); in psa_allocate_buffer_to_slot() 580 if (slot->key.data == NULL) { in psa_allocate_buffer_to_slot() 584 slot->key.bytes = buffer_length; in psa_allocate_buffer_to_slot() 592 psa_status_t status = psa_allocate_buffer_to_slot(slot, in psa_copy_key_material_into_slot() local [all …]
|
| D | psa_crypto_rsa.c | 6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 35 /* Mbed TLS doesn't support non-byte-aligned key sizes (i.e. key sizes 39 * To keep things simple, reject non-byte-aligned key sizes. */ 44 psa_status_t status; in psa_check_rsa_key_byte_aligned() local 46 status = mbedtls_to_psa_error( in psa_check_rsa_key_byte_aligned() 48 if (status == PSA_SUCCESS) { in psa_check_rsa_key_byte_aligned() 50 status = PSA_ERROR_NOT_SUPPORTED; in psa_check_rsa_key_byte_aligned() 54 return status; in psa_check_rsa_key_byte_aligned() 61 psa_status_t status; in mbedtls_psa_rsa_load_representation() local 68 status = mbedtls_to_psa_error( in mbedtls_psa_rsa_load_representation() [all …]
|
| D | psa_its_file.c | 6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 33 (sizeof(PSA_ITS_STORAGE_PREFIX) - 1 + /*prefix without terminating 0*/ \ 34 16 + /*UID (64-bit number in hex)*/ \ 35 sizeof(PSA_ITS_STORAGE_SUFFIX) - 1 + /*suffix without terminating 0*/ \ 64 /* Break up the UID into two 32-bit pieces so as not to rely on in psa_its_fill_filename() 98 p_info->size = (header.size[0] | in psa_its_read_file() 102 p_info->flags = (header.flags[0] | in psa_its_read_file() 112 psa_status_t status; in psa_its_get_info() local 114 status = psa_its_read_file(uid, p_info, &stream); in psa_its_get_info() 118 return status; in psa_its_get_info() [all …]
|
| /external/elfutils/tests/ |
| D | run-strip-g.sh | 18 . $srcdir/test-subr.sh 28 echo "int main() { return 1; }" | ${CC} -g -xc - 30 echo strip -g to file with debug file 31 testrun ${abs_top_builddir}/src/strip -g -o strip.out -f debug.out || 32 { echo "*** failed to strip -g -o strip.out -f debug.out a.out"; exit -1; } 34 status=0 35 testrun ${abs_top_builddir}/src/readelf -S strip.out > readelf.out 36 grep SYMTAB readelf.out || status=$? 37 echo $status 38 if test $status -ne 0; then [all …]
|
| /external/e2fsprogs/tests/d_special_files/ |
| D | script | 1 if ! test -x $DEBUGFS_EXE; then 8 VERIFY_FSCK_OPT=-yf 17 echo "mke2fs -Fq -b 1024 test.img 512" >> $OUT.new 19 $MKE2FS -Fq -b 1024 -o linux $TMPFILE 512 > /dev/null 2>&1 20 status=$? 21 echo Exit status is $status >> $OUT.new 23 $DEBUGFS -w $TMPFILE << EOF > /dev/null 2>&1 35 echo "debugfs -R ''stat foo'' -w test.img" >> $OUT.new 36 $DEBUGFS -R "stat foo" -w $TMPFILE >> $OUT.new 2>&1 37 status=$? [all …]
|
| /external/linux-kselftest/tools/testing/selftests/firmware/ |
| D | fw_upload.sh | 2 # SPDX-License-Identifier: GPL-2.0 3 # This validates the user-initiated fw upload mechanism of the firmware 7 set -e 13 errors="hw-error 15 device-busy 16 invalid-file-size 17 read-write-error 18 flash-wearout" 19 error_abort="user-abort" 30 trap "upload_finish" EXIT [all …]
|
| /external/swiftshader/third_party/llvm-16.0/llvm/lib/Target/AMDGPU/ |
| D | SIModeRegister.cpp | 1 //===-- SIModeRegister.cpp - Mode Register --------------------------------===// 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 7 //===----------------------------------------------------------------------===// 14 //===----------------------------------------------------------------------===// 23 #define DEBUG_TYPE "si-mode-register" 29 struct Status { struct 35 Status() : Mask(0), Mode(0){}; in Status() argument 37 Status(unsigned NewMask, unsigned NewMode) : Mask(NewMask), Mode(NewMode) { in Status() argument 41 // merge two status values such that only values that don't conflict are 43 Status merge(const Status &S) const { in merge() argument [all …]
|
| /external/toolchain-utils/llvm_tools/ |
| D | update_tryjob_status.py | 3 # Use of this source code is governed by a BSD-style license that can be 6 """Updates the status of a tryjob.""" 20 """Values for the 'status' field of a tryjob.""" 27 # Executes the script passed into the command line (this script's exit code 28 # determines the 'status' value of the tryjob). 33 """Exit code values of a custom script.""" 36 # exception which would cause the exit code of the script to be 1, so the 37 # tryjob's 'status' would be updated when there is an exception. 39 # Exit codes are as follows: 62 # Create parser and add optional command-line arguments. [all …]
|
| /external/mbedtls/programs/psa/ |
| D | crypto_examples.c | 3 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 16 printf("\tassertion failed at %s:%d - '%s'\r\n", \ 18 goto exit; \ 27 printf("\tassertion failed at %s:%d - " \ 30 goto exit; \ 57 psa_status_t status; in cipher_operation() local 62 bytes_to_write = (input_size - bytes_written > part_size ? in cipher_operation() 64 input_size - bytes_written); in cipher_operation() 66 status = psa_cipher_update(operation, input + bytes_written, in cipher_operation() 68 output_size - *output_len, &len); in cipher_operation() [all …]
|