/system/core/toolbox/upstream-netbsd/lib/libutil/ |
D | raise_default_signal.c | 64 raise_default_signal(int sig) in raise_default_signal() argument 80 (sigaddset(&mask, sig) == -1)) in raise_default_signal() 89 if (sigaction(sig, &act, &origact) == -1) in raise_default_signal() 94 if ((raise(sig) == -1) || in raise_default_signal() 104 (void)sigaction(sig, &origact, NULL); in raise_default_signal()
|
/system/bt/stack/avdt/ |
D | avdt_msg.cc | 980 static uint8_t avdt_msg_prs_rej(tAVDT_MSG* p_msg, uint8_t* p, uint8_t sig) { in avdt_msg_prs_rej() argument 981 if ((sig == AVDT_SIG_SETCONFIG) || (sig == AVDT_SIG_RECONFIG)) { in avdt_msg_prs_rej() 984 } else if ((sig == AVDT_SIG_START) || (sig == AVDT_SIG_SUSPEND)) { in avdt_msg_prs_rej() 1048 uint8_t sig; in avdt_msg_send() local 1122 sig = (uint8_t)p_ccb->p_curr_msg->event; in avdt_msg_send() 1123 AVDT_TRACE_DEBUG("avdt_msg_send label:%d, msg:%d, sig:%d", label, msg, sig); in avdt_msg_send() 1134 if ((sig == AVDT_SIG_DISCOVER) || (sig == AVDT_SIG_GETCAP) || in avdt_msg_send() 1135 (sig == AVDT_SIG_SECURITY) || (avdtp_cb.rcb.ret_tout == 0)) { in avdt_msg_send() 1141 } else if (sig != AVDT_SIG_DELAY_RPT) { in avdt_msg_send() 1167 AVDT_MSG_BLD_SIG(p, sig); in avdt_msg_send() [all …]
|
D | avdt_defs.h | 170 #define AVDT_MSG_PRS_SIG(p, sig) \ argument 172 (sig) = (*(p)++) & 0x3F; \ 217 #define AVDT_MSG_BLD_SIG(p, sig) \ argument 219 *(p)++ = (uint8_t)(sig); \
|
/system/core/libbacktrace/ |
D | thread_utils.c | 25 int tgkill(int tgid, int tid, int sig) { in tgkill() argument 26 return syscall(__NR_tgkill, tgid, tid, sig); in tgkill()
|
D | thread_utils.h | 28 int tgkill(int tgid, int tid, int sig);
|
/system/security/keystore/ |
D | keystore_attestation_id.cpp | 51 std::vector<uint8_t> signature2SHA256(const content::pm::Signature& sig) { in signature2SHA256() argument 53 SHA256(sig.data().data(), sig.data().size(), digest_buffer.data()); in signature2SHA256() 204 for (auto sig = pinfo.sigs_begin(); sig != pinfo.sigs_end(); ++sig) { in build_attestation_application_id() local 205 signature_digests.push_back(signature2SHA256(*sig)); in build_attestation_application_id()
|
/system/keymaster/legacy_support/ |
D | keymaster_passthrough_operation.cpp | 67 keymaster_blob_t sig{ signature.peek_read(), signature.available_read() }; in Finish() local 69 …rc = km_device_->finish(km_device_, operation_handle_, &mutable_input_params, &sig, &out_params, &… in Finish() 99 keymaster_blob_t sig{ signature.peek_read(), signature.available_read() }; in Finish() local 103 …rc = km_device_->finish(km_device_, operation_handle_, &input_params, &in, &sig, &out_params, &out… in Finish()
|
D | keymaster0_engine.cpp | 253 int Keymaster0Engine::ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument 257 return instance_->EcdsaSign(digest, digest_len, sig, sig_len, ec_key); in ecdsa_sign() 343 int Keymaster0Engine::EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in EcdsaSign() argument 374 memcpy(sig, signature.get(), signature_length); in EcdsaSign()
|
/system/update_engine/scripts/update_payload/ |
D | test_utils.py | 92 sig, _ = sign_process.communicate(input=data_sha256_hash) 96 return sig 112 sig = self.sigs.signatures.add() 114 sig.version = version 116 sig.data = data 349 sig = SignSha256(temp_payload_file.getvalue(), privkey_file_name) 351 sigs_gen.AddSig(1, sig)
|
D | checker.py | 1197 for sig, sig_name in common.SignatureIter(sigs.signatures, 'signatures'): 1201 self._CheckMandatoryField(sig, 'version', sig_report, sig_name) 1202 self._CheckMandatoryField(sig, 'data', None, sig_name) 1203 sig_report.AddField('data len', len(sig.data)) 1206 if sig.version == 1: 1207 self._CheckSha256Signature(sig.data, pubkey_file_name, 1211 sig.version)
|
/system/extras/simpleperf/ |
D | IOEventLoop.cpp | 108 bool IOEventLoop::AddSignalEvent(int sig, in AddSignalEvent() argument 110 return AddEvent(sig, EV_SIGNAL | EV_PERSIST, nullptr, callback) != nullptr; in AddSignalEvent() 115 for (auto sig : sigs) { in AddSignalEvents() local 116 if (!AddSignalEvent(sig, callback)) { in AddSignalEvents()
|
D | IOEventLoop.h | 52 bool AddSignalEvent(int sig, const std::function<bool()>& callback);
|
/system/chre/platform/linux/ |
D | init.cc | 48 extern "C" void signalHandler(int sig) { in signalHandler() argument 49 (void) sig; in signalHandler()
|
/system/core/adb/ |
D | adbd_auth.cpp | 49 bool adbd_auth_verify(const char* token, size_t token_size, const std::string& sig) { in adbd_auth_verify() argument 83 reinterpret_cast<const uint8_t*>(sig.c_str()), sig.size(), in adbd_auth_verify()
|
D | adb_auth.h | 52 bool adbd_auth_verify(const char* token, size_t token_size, const std::string& sig);
|
/system/keymaster/include/keymaster/legacy_support/ |
D | keymaster0_engine.h | 76 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, 89 int EcdsaSign(const uint8_t* digest, size_t digest_len, uint8_t* sig, unsigned int* sig_len,
|
/system/core/libmemunreachable/tests/ |
D | ThreadCapture_test.cpp | 281 const int sig = SIGUSR1; in TEST_F() local 301 sigaction(sig, &act, NULL); in TEST_F() 304 sigaddset(&set, sig); in TEST_F() 322 syscall(SYS_tgkill, child, tid, sig); in TEST_F()
|
/system/core/libunwindstack/include/unwindstack/ |
D | UcontextArm64.h | 45 uint64_t sig; // unsigned long member
|
/system/core/debuggerd/libdebuggerd/include/libdebuggerd/ |
D | utility.h | 78 const char* get_signame(int sig);
|
/system/iot/attestation/atap/test/ |
D | fake_atap_ops.h | 62 uint8_t sig[ATAP_SIGNATURE_LEN_MAX],
|
D | fake_atap_ops.cpp | 74 uint8_t sig[ATAP_SIGNATURE_LEN_MAX], in auth_key_sign()
|
/system/iot/attestation/atap/ops/ |
D | atap_ops_provider.cpp | 94 uint8_t sig[ATAP_SIGNATURE_LEN_MAX], in forward_auth_key_sign() 98 ->auth_key_sign(nonce, nonce_len, sig, sig_len); in forward_auth_key_sign()
|
D | atap_ops_delegate.h | 65 uint8_t sig[ATAP_SIGNATURE_LEN_MAX],
|
/system/core/debuggerd/libdebuggerd/ |
D | utility.cpp | 278 const char* get_signame(int sig) { argument 279 switch (sig) {
|
/system/security/keystore-engine/ |
D | android_engine.cpp | 145 static int ecdsa_sign(const uint8_t* digest, size_t digest_len, uint8_t* sig, in ecdsa_sign() argument 175 memcpy(sig, &reply[0], reply_len); in ecdsa_sign()
|