Home
last modified time | relevance | path

Searched +full:- +full:- +full:exit +full:- +full:status (Results 1 – 25 of 1131) sorted by relevance

12345678910>>...46

/external/e2fsprogs/tests/d_xattr_edits/
Dscript1 if ! test -x $DEBUGFS_EXE; then
8 VERIFY_FSCK_OPT=-yf
17 echo "mke2fs -Fq -b 1024 test.img 512" >> $OUT.new
19 $MKE2FS -Fq -b 1024 $TMPFILE 512 > /dev/null 2>&1
20 status=$?
21 echo Exit status is $status >> $OUT.new
24 $DEBUGFS -w -R "ea_set / user.joe smith" $TMPFILE >> $OUT.new 2>&1
25 status=$?
26 echo Exit status is $status >> $OUT.new
29 $DEBUGFS -w -R "ea_set / user.moo FEE_FIE_FOE_FUMMMMMM" $TMPFILE >> $OUT.new 2>&1
[all …]
Dexpect2 mke2fs -Fq -b 1024 test.img 512
3 Exit status is 0
5 Exit status is 0
7 Exit status is 0
12 Exit status is 0
16 Exit status is 0
19 Exit status is 0
21 Exit status is 0
23 Exit status is 0
27 Exit status is 0
[all …]
/external/e2fsprogs/tests/f_resize_inode/
Dscript2 if ! test -x $DEBUGFS_EXE; then
7 FSCK_OPT=-yf
9 if [ -f $test_dir/expect.gz ]; then
18 echo mke2fs -F -O resize_inode -o Linux -b 1024 -g 1024 test.img 16384 > $OUT.new
19 $MKE2FS -F -O resize_inode -o Linux -b 1024 -g 1024 $TMPFILE 16384 >> $OUT.new 2>&1
21 $FSCK $FSCK_OPT -N test_filesys $TMPFILE >> $OUT.new 2>&1
22 status=$?
23 echo Exit status is $status >> $OUT.new
25 echo ----------------------------------------------- >> $OUT.new
28 echo "debugfs -R ''set_inode_field <7> block[2] 42'' -w test.img" >> $OUT.new
[all …]
Dexpect1 mke2fs -F -O resize_inode -o Linux -b 1024 -g 1024 test.img 16384
15 test_filesys: 11/4096 files (0.0% non-contiguous), 2619/16384 blocks
16 Exit status is 0
17 -----------------------------------------------
19 debugfs -R ''set_inode_field <7> block[2] 42'' -w test.img
20 Exit status is 0
36 test_filesys: 11/4096 files (0.0% non-contiguous), 2619/16384 blocks
37 Exit status is 1
43 test_filesys: 11/4096 files (0.0% non-contiguous), 2619/16384 blocks
44 Exit status is 0
[all …]
/external/mbedtls/library/
Dlmots.c2 * The LM-OTS one-time public-key signature scheme
5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
10 * of the LM-OTS algorithm:
16 * [2] NIST Special Publication 800-208
18 * https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf
38 static int local_err_translation(psa_status_t status) in local_err_translation() argument
40 return psa_status_to_mbedtls(status, psa_to_lms_errors, in local_err_translation()
44 #define PSA_TO_MBEDTLS_ERR(status) local_err_translation(status) argument
54 /* We only support parameter sets that use 8-bit digits, as it does not require
62 #define DIGIT_MAX_VALUE ((1u << W_WINTERNITZ_PARAMETER) - 1u)
[all …]
Dpsa_crypto.c6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
137 /* Mbed TLS error codes can combine a high-level error code and a in mbedtls_to_psa_error()
138 * low-level error code. The low-level error usually reflects the in mbedtls_to_psa_error()
140 int low_level_ret = -(-ret & 0x007f); in mbedtls_to_psa_error()
380 * attack on the tag and deliberately-crafted
382 * return status properly.
386 * \param status Status of function called to generate
393 static void psa_wipe_tag_output_buffer(uint8_t *output_buffer, psa_status_t status, in psa_wipe_tag_output_buffer() argument
404 if (status == PSA_SUCCESS) { in psa_wipe_tag_output_buffer()
408 memset(output_buffer + offset, '!', output_buffer_size - offset); in psa_wipe_tag_output_buffer()
[all …]
Dpsa_crypto_cipher.c6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
114 /* key_bits is 64 for Single-DES, 128 for two-key Triple-DES, in mbedtls_cipher_info_from_psa()
115 * and 192 for three-key Triple-DES. */ in mbedtls_cipher_info_from_psa()
121 /* mbedtls doesn't recognize two-key Triple-DES as an algorithm, in mbedtls_cipher_info_from_psa()
122 * but two-key Triple-DES is functionally three-key Triple-DES in mbedtls_cipher_info_from_psa()
162 psa_key_type_t key_type = attributes->core.type; in psa_cipher_setup()
166 mbedtls_cipher_init(&operation->ctx.cipher); in psa_cipher_setup()
168 operation->alg = alg; in psa_cipher_setup()
169 key_bits = attributes->core.bits; in psa_cipher_setup()
176 ret = mbedtls_cipher_setup(&operation->ctx.cipher, cipher_info); in psa_cipher_setup()
[all …]
Dssl_cookie.c5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
30 static int local_err_translation(psa_status_t status) in local_err_translation() argument
32 return psa_status_to_mbedtls(status, psa_to_ssl_errors, in local_err_translation()
36 #define PSA_TO_MBEDTLS_ERR(status) local_err_translation(status) argument
40 * If DTLS is in use, then at least one of SHA-256 or SHA-384 is
41 * available. Try SHA-256 first as 384 wastes resources
52 #error "DTLS hello verify needs SHA-256 or SHA-384"
56 * Cookies are formed of a 4-bytes timestamp (or serial number) and
64 ctx->psa_hmac_key = MBEDTLS_SVC_KEY_ID_INIT; in mbedtls_ssl_cookie_init()
66 mbedtls_md_init(&ctx->hmac_ctx); in mbedtls_ssl_cookie_init()
[all …]
Dpsa_its_file.c6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
33 (sizeof(PSA_ITS_STORAGE_PREFIX) - 1 + /*prefix without terminating 0*/ \
34 16 + /*UID (64-bit number in hex)*/ \
35 sizeof(PSA_ITS_STORAGE_SUFFIX) - 1 + /*suffix without terminating 0*/ \
64 /* Break up the UID into two 32-bit pieces so as not to rely on in psa_its_fill_filename()
101 p_info->size = (header.size[0] | in psa_its_read_file()
105 p_info->flags = (header.flags[0] | in psa_its_read_file()
115 psa_status_t status; in psa_its_get_info() local
117 status = psa_its_read_file(uid, p_info, &stream); in psa_its_get_info()
121 return status; in psa_its_get_info()
[all …]
Dlms.c2 * The LMS stateful-hash public-key signature scheme
5 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
16 * [2] NIST Special Publication 800-208
18 * https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-208.pdf
39 static int local_err_translation(psa_status_t status) in local_err_translation() argument
41 return psa_status_to_mbedtls(status, psa_to_lms_errors, in local_err_translation()
45 #define PSA_TO_MBEDTLS_ERR(status) local_err_translation(status) argument
89 * 1-indexed.
99 psa_status_t status = PSA_ERROR_CORRUPTION_DETECTED; in create_merkle_leaf_value() local
104 status = psa_hash_setup(&op, PSA_ALG_SHA_256); in create_merkle_leaf_value()
[all …]
/external/libcap/progs/
Dcapsh.c2 * Copyright (c) 2008-11,16,19,2020 Andrew G. Morgan <morgan@kernel.org>
9 * The --print option can be used as a quick test whether various
43 /* parse a non-negative integer with some error handling */
50 if (len == 0 || *text == '-') { in nonneg_uint()
64 fprintf(stderr, "%s: want non-negative integer, got \"%s\"\n", in nonneg_uint()
66 exit(1); in nonneg_uint()
78 string[--i] = '\0'; in binary()
80 string[--i] = (value & 1) ? '1' : '0'; in binary()
123 exit(1); in display_current()
139 exit(1); in display_current_iab()
[all …]
/external/e2fsprogs/tests/d_xattr_sorting/
Dscript1 if ! test -x $DEBUGFS_EXE; then
8 VERIFY_FSCK_OPT=-yf
17 echo "mke2fs -Fq -b 1024 test.img 512" >> $OUT.new
19 $MKE2FS -Fq -b 1024 $TMPFILE 512 > /dev/null 2>&1
20 status=$?
21 echo Exit status is $status >> $OUT.new
23 B=$(mktemp ${TMPDIR:-/tmp}/b.XXXXXX)
25 perl -e 'print "x" x 256;' > $B
27 echo "ea_set -f /tmp/b / security.SMEG64" >> $OUT.new
28 $DEBUGFS -w -R "ea_set -f $B / security.SMEG64" $TMPFILE >> $OUT.new 2>&1
[all …]
Dexpect2 mke2fs -Fq -b 1024 test.img 512
3 Exit status is 0
4 ea_set -f /tmp/b / security.SMEG64
5 Exit status is 0
6 ea_set -f /tmp/b / security.imb
7 Exit status is 0
9 Exit status is 0
15 Exit status is 0
19 Exit status is 0
23 Exit status is 0
[all …]
/external/e2fsprogs/tests/t_dangerous/
Dscript1 FSCK_OPT=-fn
36 MKE2FS_CONFIG=$CONF $MKE2FS -F -T ext4h -o Linux -U 6fc3daa4-180d-4f2b-a6f2-f7a5efb79bcf $TMPFILE 5…
39 $DEBUGFS -w -R 'ssv mtime now' $TMPFILE > /dev/null 2>&1
40 $DEBUGFS -w -R 'ssv lastcheck 20000' $TMPFILE > /dev/null 2>&1
43 echo "tune2fs -O metadata_csum test.img" >> $OUT
44 $TUNE2FS -O metadata_csum $TMPFILE >> $OUT 2>&1
45 status=$?
46 echo Exit status is $status >> $OUT
49 $FSCK -f -y -N test_filesys $TMPFILE > /dev/null 2>&1
52 echo "tune2fs -O metadata_csum test.img" >> $OUT
[all …]
Dexpect12 tune2fs -O metadata_csum test.img
16 Please run e2fsck -f on the filesystem.
18 Exit status is 1
19 tune2fs -O metadata_csum test.img
20 Exit status is 0
37 Exit status is 0
38 tune2fs -O metadata_csum test.img
41 Exit status is 1
42 tune2fs -I 512 test.img
45 Exit status is 1
[all …]
/external/openthread/third_party/mbedtls/repo/library/
Dpsa_crypto_cipher.c6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
109 /* key_bits is 64 for Single-DES, 128 for two-key Triple-DES, in mbedtls_cipher_info_from_psa()
110 * and 192 for three-key Triple-DES. */ in mbedtls_cipher_info_from_psa()
116 /* mbedtls doesn't recognize two-key Triple-DES as an algorithm, in mbedtls_cipher_info_from_psa()
117 * but two-key Triple-DES is functionally three-key Triple-DES in mbedtls_cipher_info_from_psa()
162 psa_key_type_t key_type = attributes->core.type; in psa_cipher_setup()
166 mbedtls_cipher_init(&operation->ctx.cipher); in psa_cipher_setup()
168 operation->alg = alg; in psa_cipher_setup()
169 key_bits = attributes->core.bits; in psa_cipher_setup()
176 ret = mbedtls_cipher_setup(&operation->ctx.cipher, cipher_info); in psa_cipher_setup()
[all …]
Dpsa_crypto.c6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
111 /* Mbed TLS error codes can combine a high-level error code and a in mbedtls_to_psa_error()
112 * low-level error code. The low-level error usually reflects the in mbedtls_to_psa_error()
114 int low_level_ret = -(-ret & 0x007f); in mbedtls_to_psa_error()
535 * when called with the validated \p algorithm and \p key_type is well-defined.
575 if (slot->key.data != NULL) { in psa_allocate_buffer_to_slot()
579 slot->key.data = mbedtls_calloc(1, buffer_length); in psa_allocate_buffer_to_slot()
580 if (slot->key.data == NULL) { in psa_allocate_buffer_to_slot()
584 slot->key.bytes = buffer_length; in psa_allocate_buffer_to_slot()
592 psa_status_t status = psa_allocate_buffer_to_slot(slot, in psa_copy_key_material_into_slot() local
[all …]
Dpsa_crypto_rsa.c6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
35 /* Mbed TLS doesn't support non-byte-aligned key sizes (i.e. key sizes
39 * To keep things simple, reject non-byte-aligned key sizes. */
44 psa_status_t status; in psa_check_rsa_key_byte_aligned() local
46 status = mbedtls_to_psa_error( in psa_check_rsa_key_byte_aligned()
48 if (status == PSA_SUCCESS) { in psa_check_rsa_key_byte_aligned()
50 status = PSA_ERROR_NOT_SUPPORTED; in psa_check_rsa_key_byte_aligned()
54 return status; in psa_check_rsa_key_byte_aligned()
61 psa_status_t status; in mbedtls_psa_rsa_load_representation() local
68 status = mbedtls_to_psa_error( in mbedtls_psa_rsa_load_representation()
[all …]
Dpsa_its_file.c6 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
33 (sizeof(PSA_ITS_STORAGE_PREFIX) - 1 + /*prefix without terminating 0*/ \
34 16 + /*UID (64-bit number in hex)*/ \
35 sizeof(PSA_ITS_STORAGE_SUFFIX) - 1 + /*suffix without terminating 0*/ \
64 /* Break up the UID into two 32-bit pieces so as not to rely on in psa_its_fill_filename()
98 p_info->size = (header.size[0] | in psa_its_read_file()
102 p_info->flags = (header.flags[0] | in psa_its_read_file()
112 psa_status_t status; in psa_its_get_info() local
114 status = psa_its_read_file(uid, p_info, &stream); in psa_its_get_info()
118 return status; in psa_its_get_info()
[all …]
/external/elfutils/tests/
Drun-strip-g.sh18 . $srcdir/test-subr.sh
28 echo "int main() { return 1; }" | ${CC} -g -xc -
30 echo strip -g to file with debug file
31 testrun ${abs_top_builddir}/src/strip -g -o strip.out -f debug.out ||
32 { echo "*** failed to strip -g -o strip.out -f debug.out a.out"; exit -1; }
34 status=0
35 testrun ${abs_top_builddir}/src/readelf -S strip.out > readelf.out
36 grep SYMTAB readelf.out || status=$?
37 echo $status
38 if test $status -ne 0; then
[all …]
/external/e2fsprogs/tests/d_special_files/
Dscript1 if ! test -x $DEBUGFS_EXE; then
8 VERIFY_FSCK_OPT=-yf
17 echo "mke2fs -Fq -b 1024 test.img 512" >> $OUT.new
19 $MKE2FS -Fq -b 1024 -o linux $TMPFILE 512 > /dev/null 2>&1
20 status=$?
21 echo Exit status is $status >> $OUT.new
23 $DEBUGFS -w $TMPFILE << EOF > /dev/null 2>&1
35 echo "debugfs -R ''stat foo'' -w test.img" >> $OUT.new
36 $DEBUGFS -R "stat foo" -w $TMPFILE >> $OUT.new 2>&1
37 status=$?
[all …]
/external/linux-kselftest/tools/testing/selftests/firmware/
Dfw_upload.sh2 # SPDX-License-Identifier: GPL-2.0
3 # This validates the user-initiated fw upload mechanism of the firmware
7 set -e
13 errors="hw-error
15 device-busy
16 invalid-file-size
17 read-write-error
18 flash-wearout"
19 error_abort="user-abort"
30 trap "upload_finish" EXIT
[all …]
/external/swiftshader/third_party/llvm-16.0/llvm/lib/Target/AMDGPU/
DSIModeRegister.cpp1 //===-- SIModeRegister.cpp - Mode Register --------------------------------===//
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
14 //===----------------------------------------------------------------------===//
23 #define DEBUG_TYPE "si-mode-register"
29 struct Status { struct
35 Status() : Mask(0), Mode(0){}; in Status() argument
37 Status(unsigned NewMask, unsigned NewMode) : Mask(NewMask), Mode(NewMode) { in Status() argument
41 // merge two status values such that only values that don't conflict are
43 Status merge(const Status &S) const { in merge() argument
[all …]
/external/toolchain-utils/llvm_tools/
Dupdate_tryjob_status.py3 # Use of this source code is governed by a BSD-style license that can be
6 """Updates the status of a tryjob."""
20 """Values for the 'status' field of a tryjob."""
27 # Executes the script passed into the command line (this script's exit code
28 # determines the 'status' value of the tryjob).
33 """Exit code values of a custom script."""
36 # exception which would cause the exit code of the script to be 1, so the
37 # tryjob's 'status' would be updated when there is an exception.
39 # Exit codes are as follows:
62 # Create parser and add optional command-line arguments.
[all …]
/external/mbedtls/programs/psa/
Dcrypto_examples.c3 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
16 printf("\tassertion failed at %s:%d - '%s'\r\n", \
18 goto exit; \
27 printf("\tassertion failed at %s:%d - " \
30 goto exit; \
57 psa_status_t status; in cipher_operation() local
62 bytes_to_write = (input_size - bytes_written > part_size ? in cipher_operation()
64 input_size - bytes_written); in cipher_operation()
66 status = psa_cipher_update(operation, input + bytes_written, in cipher_operation()
68 output_size - *output_len, &len); in cipher_operation()
[all …]

12345678910>>...46