/system/core/libmincrypt/ |
D | dsa_sig.c | 54 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int) { in dsa_sig_unpack() argument 82 if (sig_len < 8 || sig[0] != 0x30 || sig[2] != 0x02) { in dsa_sig_unpack() 86 seq_len = sig[1]; in dsa_sig_unpack() 91 r_len = sig[3]; in dsa_sig_unpack() 98 if ((r_len < 1) || (r_len > seq_len - 5) || (sig[4 + r_len] != 0x02)) { in dsa_sig_unpack() 101 s_len = sig[5 + r_len]; in dsa_sig_unpack() 117 if (!trim_to_p256_bytes(r_bytes, &sig[4], r_len) in dsa_sig_unpack() 118 || !trim_to_p256_bytes(s_bytes, &sig[6 + r_len], s_len)) { in dsa_sig_unpack()
|
/system/core/toolbox/upstream-netbsd/lib/libutil/ |
D | raise_default_signal.c | 64 raise_default_signal(int sig) in raise_default_signal() argument 80 (sigaddset(&mask, sig) == -1)) in raise_default_signal() 89 if (sigaction(sig, &act, &origact) == -1) in raise_default_signal() 94 if ((raise(sig) == -1) || in raise_default_signal() 104 (void)sigaction(sig, &origact, NULL); in raise_default_signal()
|
/system/core/adb/ |
D | adb_auth.h | 42 unsigned char* sig); 47 static inline int adb_auth_verify(void *token, void *sig, int siglen) { return 0; } in adb_auth_verify() argument 53 size_t token_size, unsigned char* sig) { in adb_auth_sign() argument 62 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen);
|
D | adb_auth_client.cpp | 141 int adb_auth_verify(uint8_t* token, uint8_t* sig, int siglen) in adb_auth_verify() argument 154 ret = RSA_verify(&key->key, sig, siglen, token, SHA_DIGEST_SIZE); in adb_auth_verify()
|
D | adb_auth_host.cpp | 372 unsigned char* sig) in adb_auth_sign() argument 382 if (!RSA_sign(NID_sha1, token, token_size, sig, &len, key->rsa)) { in adb_auth_sign()
|
/system/bt/stack/avdt/ |
D | avdt_msg.c | 1126 static UINT8 avdt_msg_prs_rej(tAVDT_MSG *p_msg, UINT8 *p, UINT8 sig) in avdt_msg_prs_rej() argument 1128 if ((sig == AVDT_SIG_SETCONFIG) || (sig == AVDT_SIG_RECONFIG)) in avdt_msg_prs_rej() 1133 else if ((sig == AVDT_SIG_START) || (sig == AVDT_SIG_SUSPEND)) in avdt_msg_prs_rej() 1206 UINT8 sig; in avdt_msg_send() local 1291 sig = (UINT8) p_ccb->p_curr_msg->event; in avdt_msg_send() 1292 AVDT_TRACE_DEBUG("avdt_msg_send label:%d, msg:%d, sig:%d", label, msg, sig); in avdt_msg_send() 1305 if ((sig == AVDT_SIG_DISCOVER) || (sig == AVDT_SIG_GETCAP) || in avdt_msg_send() 1306 (sig == AVDT_SIG_SECURITY) || (avdt_cb.rcb.ret_tout == 0)) in avdt_msg_send() 1310 else if (sig != AVDT_SIG_DELAY_RPT) in avdt_msg_send() 1336 AVDT_MSG_BLD_SIG(p, sig); in avdt_msg_send() [all …]
|
D | avdt_defs.h | 156 #define AVDT_MSG_PRS_SIG(p, sig) \ argument 157 sig = *(p)++ & 0x3F; 187 #define AVDT_MSG_BLD_SIG(p, sig) \ argument 188 *(p)++ = (UINT8) (sig);
|
/system/core/libbacktrace/ |
D | thread_utils.c | 25 int tgkill(int tgid, int tid, int sig) { in tgkill() argument 26 return syscall(__NR_tgkill, tgid, tid, sig); in tgkill()
|
D | thread_utils.h | 24 int tgkill(int tgid, int tid, int sig);
|
/system/core/libmincrypt/test/ |
D | ecdsa_test.c | 233 #define CHECK_DSA_SIG(sig, good) do {\ in main() argument 234 message = parsehex(sig, &mlen); \ in main() 236 printf(#sig ": %s\n", result ? "good" : "bad"); \ in main()
|
/system/keymaster/ |
D | keymaster0_engine.h | 73 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, 86 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
|
D | keymaster0_engine.cpp | 258 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument 262 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); in ecdsa_sign() 351 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in EcdsaSign() argument 382 memcpy(sig, signature.get(), signature_length); in EcdsaSign()
|
D | keymaster1_engine.h | 105 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig,
|
D | keymaster1_engine.cpp | 327 int Keymaster1Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument 346 memcpy(sig, output.data, *sig_len); in ecdsa_sign()
|
D | android_keymaster_test_utils.cpp | 285 keymaster_blob_t sig = {reinterpret_cast<const uint8_t*>(signature.c_str()), in FinishOperation() local 290 device()->finish(device(), op_handle_, &additional_params, &sig, &out_params, &out_tmp); in FinishOperation()
|
/system/core/include/mincrypt/ |
D | dsa_sig.h | 37 int dsa_sig_unpack(unsigned char* sig, int sig_len, p256_int* r_int, p256_int* s_int);
|
/system/extras/verity/ |
D | KeystoreSigner.java | 139 ASN1Object sig = sequence.getObjectAt(2).toASN1Primitive(); in parse() local 140 signature = new BootSignature(sig.getEncoded()); in parse()
|
D | BootSignature.java | 143 public void setSignature(byte[] sig, AlgorithmIdentifier algId) { in setSignature() argument 145 signature = new DEROctetString(sig); in setSignature()
|
/system/security/keystore-engine/ |
D | android_engine.cpp | 234 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument 275 memcpy(sig, reply, reply_len); in ecdsa_sign()
|
/system/core/debuggerd/ |
D | tombstone.cpp | 65 static bool signal_has_si_addr(int sig) { in signal_has_si_addr() argument 66 switch (sig) { in signal_has_si_addr() 78 static const char* get_signame(int sig) { in get_signame() argument 79 switch(sig) { in get_signame()
|
/system/extras/latencytop/ |
D | latencytop.c | 58 static void signal_handler(int sig); 408 static void signal_handler(int sig) { in signal_handler() argument
|
/system/core/logd/ |
D | LogKlog.cpp | 440 uint64_t sig = strtoll(start + sizeof(klogd_message) - 1, NULL, 10); in log() local 441 if (sig == signature.nsec()) { in log()
|
/system/vold/ |
D | VolumeManager.cpp | 221 unsigned char sig[MD5_DIGEST_LENGTH]; in asecHash() local 238 MD5(reinterpret_cast<const unsigned char*>(id), strlen(id), sig); in asecHash() 242 *p++ = digits[sig[i] >> 4]; in asecHash() 243 *p++ = digits[sig[i] & 0x0F]; in asecHash()
|
/system/security/keystore/ |
D | IKeystoreService.cpp | 1475 const void* sig; in onTransact() local 1477 sig = data.readInplace(sigSize); in onTransact() 1479 sig = NULL; in onTransact() 1482 bool ret = verify(name, (const uint8_t*) in, (size_t) inSize, (const uint8_t*) sig, in onTransact()
|
/system/core/toolbox/ |
D | newfs_msdos.c | 139 u_int8_t sig; /* extended boot signature */ member 685 mk1(bsx->sig, 0x29); in newfs_msdos_main()
|