/freebsd-current/crypto/heimdal/kcm/ |
H A D | main.c | 45 sigterm(int sig) argument 51 sigusr1(int sig) argument 57 sigusr2(int sig) argument
|
/freebsd-current/contrib/libfido2/src/ |
H A D | rs1.c | 64 const fido_blob_t *sig) 88 if (EVP_PKEY_verify(pctx, sig->ptr, sig->len, dgst->ptr, 63 rs1_verify_sig(const fido_blob_t *dgst, EVP_PKEY *pkey, const fido_blob_t *sig) argument
|
H A D | eddsa.c | 174 const fido_blob_t *sig) 185 if (dgst->len > INT_MAX || sig->len > INT_MAX) { 186 fido_log_debug("%s: dgst->len=%zu, sig->len=%zu", __func__, 187 dgst->len, sig->len); 201 if (EVP_DigestVerify(mdctx, sig->ptr, sig->len, dgst->ptr, 216 const fido_blob_t *sig) 222 eddsa_verify_sig(dgst, pkey, sig) < 0) { 173 eddsa_verify_sig(const fido_blob_t *dgst, EVP_PKEY *pkey, const fido_blob_t *sig) argument 215 eddsa_pk_verify_sig(const fido_blob_t *dgst, const eddsa_pk_t *pk, const fido_blob_t *sig) argument
|
/freebsd-current/stand/uboot/ |
H A D | glue.c | 44 valid_sig(struct api_signature *sig) argument 49 if (sig == NULL) 53 * CRC with the same initial contents as at the time when the sig was 56 s = *sig; 61 if (checksum != sig->checksum) 74 api_parse_cmdline_sig(int argc, char **argv, struct api_signature **sig) argument 94 *sig = (struct api_signature *)api_address; 95 if (valid_sig(*sig)) 108 api_search_sig(struct api_signature **sig) argument 112 if (sig [all...] |
/freebsd-current/lib/libsysdecode/ |
H A D | signal.c | 133 sysdecode_signal(int sig) argument 136 if ((unsigned)sig < nitems(signames)) 137 return (signames[sig]);
|
H A D | linux.c | 174 sysdecode_linux_signal(int sig) argument 177 if ((unsigned)sig < nitems(linux_signames)) 178 return (linux_signames[sig]); 243 int sig; local 245 sig = flags & LINUX_CSIGNAL; 246 if (sig != 0) 247 fprintf(fp, "(%s)", sysdecode_linux_signal(sig));
|
/freebsd-current/sys/i386/acpica/ |
H A D | acpi_machdep.c | 113 map_table(vm_paddr_t pa, const char *sig) argument 120 if (strncmp(header->Signature, sig, ACPI_NAMESEG_SIZE) != 0) { 129 printf("ACPI: Failed checksum for table %s\n", sig); 143 probe_table(vm_paddr_t address, const char *sig) argument 149 ret = strncmp(table->Signature, sig, ACPI_NAMESEG_SIZE) == 0; 159 acpi_map_table(vm_paddr_t pa, const char *sig) argument 162 return (map_table(pa, sig)); 180 acpi_find_table(const char *sig) argument 232 if (probe_table(xsdt->TableOffsetEntry[i], sig)) { 247 if (probe_table(rsdt->TableOffsetEntry[i], sig)) { [all...] |
/freebsd-current/sys/compat/linux/ |
H A D | linux_timer.c | 47 linux_convert_l_sigevent(const struct l_sigevent *l_sig, struct sigevent *sig) argument 50 CP(*l_sig, *sig, sigev_notify); 55 sig->sigev_notify = SIGEV_SIGNAL; 56 sig->sigev_signo = linux_to_bsd_signal(l_sig->sigev_signo); 57 PTRIN_CP(*l_sig, *sig, sigev_value.sival_ptr); 60 sig->sigev_notify = SIGEV_NONE; 65 sig->sigev_notify = SIGEV_THREAD; 73 sig->sigev_notify = SIGEV_THREAD_ID; 74 CP2(*l_sig, *sig, _l_sigev_un._tid, sigev_notify_thread_id); 75 sig [all...] |
/freebsd-current/crypto/openssl/crypto/bn/asm/ |
H A D | ia64.S | 312 { .mib; setf.sig f8=r35 // w 338 { .mfi; (p25) getf.sig r36=f52 // low 344 { .mii; (p25) getf.sig r32=f44 // high 363 setf.sig f37=r0 // serves as carry at (p18) tick 386 getf.sig r8=f41 // the return value 418 { .mib; setf.sig f8=r35 // w 443 { .mfi; (p23) getf.sig r36=f45 // low 449 { .mmi; (p24) getf.sig r32=f40 // high 584 // result from getf.sig. I do nothing about it at this point for 694 { .mfi; getf.sig r1 [all...] |
/freebsd-current/lib/libc/tests/gen/ |
H A D | sigsetops_test.c | 35 /* Return the status of the specified sig's bit. */ 37 sigbitstatus(const sigset_t *set, int sig) argument 40 return (set->__bits[_SIG_WORD(sig)] & _SIG_BIT(sig)) != 0; 43 /* Verify that sig is the lone bit set in the sigset. */ 45 siglonebit(const sigset_t *set, int sig) argument 50 if (i != _SIG_WORD(sig)) 54 ATF_REQUIRE_MSG((set->__bits[i] & ~_SIG_BIT(sig)) == 0, 56 set->__bits[i] & ~_SIG_BIT(sig)); 67 "sig compariso [all...] |
/freebsd-current/crypto/openssl/crypto/sm2/ |
H A D | sm2_sign.c | 202 ECDSA_SIG *sig = NULL; local 290 sig = ECDSA_SIG_new(); 291 if (sig == NULL) { 297 ECDSA_SIG_set0(sig, r, s); 302 if (sig == NULL) { 309 return sig; 312 static int sm2_sig_verify(const EC_KEY *key, const ECDSA_SIG *sig, argument 351 ECDSA_SIG_get0(sig, &r, &s); 398 ECDSA_SIG *sig = NULL; local 406 sig 413 ossl_sm2_do_verify(const EC_KEY *key, const EVP_MD *digest, const ECDSA_SIG *sig, const uint8_t *id, const size_t id_len, const uint8_t *msg, size_t msg_len) argument 436 ossl_sm2_internal_sign(const unsigned char *dgst, int dgstlen, unsigned char *sig, unsigned int *siglen, EC_KEY *eckey) argument 472 ossl_sm2_internal_verify(const unsigned char *dgst, int dgstlen, const unsigned char *sig, int sig_len, EC_KEY *eckey) argument [all...] |
/freebsd-current/sys/sys/ |
H A D | signalvar.h | 102 #define SIGACTION(p, sig) (p->p_sigacts->ps_sigact[_SIG_IDX(sig)]) 174 #define SIG2OSIG(sig, osig) (osig = (sig).__bits[0]) 175 #define OSIG2SIG(osig, sig) SIGEMPTYSET(sig); (sig).__bits[0] = osig 385 int pksignal(struct proc *p, int sig, ksiginfo_t *ksi); 386 void pgsigio(struct sigio **sigiop, int sig, int checkctty); 387 void pgsignal(struct pgrp *pgrp, int sig, in [all...] |
/freebsd-current/crypto/openssl/crypto/ec/ |
H A D | ecp_s390x_nistp.c | 135 ECDSA_SIG *sig; local 153 sig = ECDSA_SIG_new(); 154 if (k == NULL || sig == NULL) { 159 sig->r = BN_new(); 160 sig->s = BN_new(); 161 if (sig->r == NULL || sig->s == NULL) { 207 if (BN_bin2bn(param + S390X_OFF_R(len), len, sig->r) == NULL 208 || BN_bin2bn(param + S390X_OFF_S(len), len, sig->s) == NULL) { 217 ECDSA_SIG_free(sig); 224 ecdsa_s390x_nistp_verify_sig(const unsigned char *dgst, int dgstlen, const ECDSA_SIG *sig, EC_KEY *eckey, unsigned int fc, int len) argument [all...] |
H A D | ecdsa_ossl.c | 57 const ECDSA_SIG *sig, EC_KEY *eckey) 64 return eckey->group->meth->ecdsa_verify_sig(dgst, dgst_len, sig, eckey); 68 unsigned char *sig, unsigned int *siglen, 78 *siglen = i2d_ECDSA_SIG(s, sig != NULL ? &sig : NULL); 374 const ECDSA_SIG *sig, EC_KEY *eckey) 386 (pub_key = EC_KEY_get0_public_key(eckey)) == NULL || sig == NULL) { 417 if (BN_is_zero(sig->r) || BN_is_negative(sig->r) || 418 BN_ucmp(sig 56 ossl_ecdsa_verify_sig(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, EC_KEY *eckey) argument 67 ossl_ecdsa_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *eckey) argument 373 ossl_ecdsa_simple_verify_sig(const unsigned char *dgst, int dgst_len, const ECDSA_SIG *sig, EC_KEY *eckey) argument [all...] |
/freebsd-current/tests/sys/kern/ |
H A D | sigwait.c | 36 dummy_sig_handler(int sig) argument 48 support_signal(int sig, sig_t handler) argument 51 ATF_REQUIRE(signal(sig, handler) != SIG_ERR); 97 support_create_sig_proc(int sig, int count, unsigned int usec) argument 109 if (kill(pid, sig) == -1) 292 int rv, sig, pid; local 301 rv = sigwait(&ss, &sig); 304 ATF_REQUIRE_EQ_MSG(SIGUSR1, sig, 305 "sigwait() should return SIGUSR1: rv %d, sig %d", rv, sig); 376 support_check_siginfo(int code, int status, pid_t pid, siginfo_t *si, int sig) argument 395 int sig, kpid; local [all...] |
/freebsd-current/usr.bin/killall/ |
H A D | killall.c | 121 int sig = SIGTERM; local 219 for (sig = NSIG, p = sys_signame + 1; 220 --sig; ++p) 222 sig = p - sys_signame; 225 if (!sig) { 234 sig = strtol(*av, &ep, 10); 237 if (sig < 0 || sig >= NSIG) 403 sig, thiscmd, thispid, thisuid); 414 printf("sig [all...] |
/freebsd-current/sys/dev/uart/ |
H A D | uart_dev_ns8250.c | 490 #define SER(sig) SER_##sig 491 #define SERD(sig) SER_D##sig 492 #define MSR(sig) MSR_##sig 493 #define MSRD(sig) MSR_D##sig 497 * the signals is in 'var' the new hardware state is in 'msr', and 'sig' is the 501 #define SIGCHGSW(var, msr, sig) \ 643 uint32_t old, sig; local 1020 ns8250_bus_setsig(struct uart_softc *sc, int sig) argument [all...] |
/freebsd-current/share/examples/hast/ |
H A D | ucarp_down.sh | 48 sig="TERM" 52 kill -${sig} -- -${pgid} 53 sig="KILL"
|
/freebsd-current/crypto/openssl/crypto/x509/ |
H A D | t_crl.c | 45 const ASN1_BIT_STRING *sig; local 55 X509_CRL_get0_signature(x, &sig, &sig_alg); 90 X509_signature_print(out, sig_alg, sig);
|
/freebsd-current/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/pid/ |
H A D | tst.gcc.c | 47 intr(int sig __unused)
|
/freebsd-current/contrib/netbsd-tests/kernel/kqueue/ |
H A D | t_sig.c | 55 ATF_TC(sig); variable 56 ATF_TC_HEAD(sig, tc) 60 ATF_TC_BODY(sig, tc) 124 (void)printf("sig: kevent returned %d in %lld.%06ld\n", 130 (void)printf("sig: kevent flags: 0x%x, data: %" PRId64 " (# " 135 (void)printf("sig: finished successfully\n"); 140 ATF_TP_ADD_TC(tp, sig);
|
/freebsd-current/usr.sbin/bsdinstall/runconsoles/ |
H A D | child.c | 61 kill_descendants(int sig) argument 65 rk.rk_sig = sig; 71 sigalrm_handler(int sig __unused) 103 sigchld_handler(int sig __unused) 132 exit_signal_handler(int sig) argument 142 reproduce_signal_death(sig); 147 kill_descendants(sig); 152 kill_wait_all_descendants(int sig) argument 154 kill_descendants(sig);
|
/freebsd-current/crypto/openssh/ |
H A D | ssh-ed25519.c | 151 u_char *sig = NULL; local 168 if ((sig = malloc(slen)) == NULL) 171 if ((ret = crypto_sign_ed25519(sig, &smlen, data, datalen, 182 (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0) 198 if (sig != NULL) 199 freezero(sig, slen); 206 const u_char *sig, size_t siglen, 222 sig == NULL || siglen == 0) 225 if ((b = sshbuf_from(sig, siglen)) == NULL) 205 ssh_ed25519_verify(const struct sshkey *key, const u_char *sig, size_t siglen, const u_char *data, size_t dlen, const char *alg, u_int compat, struct sshkey_sig_details **detailsp) argument
|
/freebsd-current/contrib/llvm-project/compiler-rt/lib/safestack/ |
H A D | safestack_platform.h | 81 inline int TgKill(pid_t pid, ThreadId tid, int sig) { argument 85 return _REAL(_lwp_kill, tid, sig); 87 return syscall(SYS_thr_kill2, pid, tid, sig); 89 return syscall(SYS_tgkill, pid, tid, sig);
|
/freebsd-current/tools/test/stress2/misc/ |
H A D | ptrace9.sh | 48 sigalrm(int sig __unused) 54 sighup(int sig __unused) 112 printf("child is stopped after detach (sig %d)\n",
|