/freebsd-current/contrib/bearssl/src/rsa/ |
H A D | rsa_pkcs1_sig_unpad.c | 29 br_rsa_pkcs1_sig_unpad(const unsigned char *sig, size_t sig_len, argument 74 if (memcmp(sig, pad1, sizeof pad1) != 0) { 78 if (sig[u] != 0xFF) { 90 if (sig_len - u != hash_len + 1 || sig[u] != 0x00) { 115 if (memcmp(pad2, sig + u, pad_len) != 0) { 119 memcpy(hash_out, sig + sig_len - hash_len, hash_len);
|
/freebsd-current/crypto/openssh/regress/unittests/sshsig/ |
H A D | mktestdata.sh | 21 rm -f rsa.sig dsa.sig ecdsa.sig ed25519.sig ecdsa_sk.sig ed25519_sk.sig 35 ssh-keygen -Y sign -f rsa -n $NAMESPACE - < signed-data > rsa.sig 36 ssh-keygen -Y sign -f dsa -n $NAMESPACE - < signed-data > dsa.sig 37 ssh-keygen -Y sign -f ecdsa -n $NAMESPACE - < signed-data > ecdsa.sig 38 ssh-keygen -Y sign -f ed25519 -n $NAMESPACE - < signed-data > ed25519.sig [all...] |
/freebsd-current/crypto/openssl/util/perl/TLSProxy/ |
H A D | CertificateVerify.pm | 53 my $sig = substr($remdata, 2); 55 die "Invalid CertificateVerify signature length" if length($sig) != $siglen; 61 $self->signature($sig); 69 my $sig = $self->signature(); 73 $data .= pack("n", length($sig)); 74 $data .= $sig;
|
/freebsd-current/crypto/openssl/providers/implementations/signature/ |
H A D | eddsa_sig.c | 34 static int s390x_ed25519_digestsign(const ECX_KEY *edkey, unsigned char *sig, 36 static int s390x_ed448_digestsign(const ECX_KEY *edkey, unsigned char *sig, 39 const unsigned char *sig, 42 const unsigned char *sig, 231 int ed25519_digest_verify(void *vpeddsactx, const unsigned char *sig, argument 243 return s390x_ed25519_digestverify(edkey, sig, tbs, tbslen); 246 return ossl_ed25519_verify(tbs, tbslen, sig, edkey->pubkey, 250 int ed448_digest_verify(void *vpeddsactx, const unsigned char *sig, argument 262 return s390x_ed448_digestverify(edkey, sig, tbs, tbslen); 265 return ossl_ed448_verify(peddsactx->libctx, tbs, tbslen, sig, edke 370 s390x_ed25519_digestsign(const ECX_KEY *edkey, unsigned char *sig, const unsigned char *tbs, size_t tbslen) argument 376 unsigned char sig[64]; member in struct:__anon4189::__anon4190 395 s390x_ed448_digestsign(const ECX_KEY *edkey, unsigned char *sig, const unsigned char *tbs, size_t tbslen) argument 401 unsigned char sig[128]; member in struct:__anon4191::__anon4192 422 s390x_ed25519_digestverify(const ECX_KEY *edkey, const unsigned char *sig, const unsigned char *tbs, size_t tbslen) argument 428 unsigned char sig[64]; member in struct:__anon4193::__anon4194 443 s390x_ed448_digestverify(const ECX_KEY *edkey, const unsigned char *sig, const unsigned char *tbs, size_t tbslen) argument 450 unsigned char sig[128]; member in struct:__anon4195::__anon4196 [all...] |
/freebsd-current/crypto/openssh/openbsd-compat/ |
H A D | bsd-pselect.c | 139 pselect_sig_handler(int sig) argument 144 if (saved_sighandler[sig] != NULL) 145 (*saved_sighandler[sig])(sig); /* call original handler */ 157 int ret, sig, saved_errno, unmasked = 0; local 171 for (sig = 0; sig < _NSIG; sig++) { 172 if (sig == SIGKILL || sig [all...] |
H A D | sigact.h | 81 int sigaction(int sig, struct sigaction *sigact, struct sigaction *osigact); 85 int sigdelset (sigset_t *mask, int sig); 86 int sigaddset (sigset_t *mask, int sig);
|
/freebsd-current/contrib/ntp/libntp/ |
H A D | syssignal.c | 30 int sig, 44 if (SIGPOLL == sig) 48 if (SIGIO == sig) 53 n = sigaction(sig, &vec, &ovec); 65 int sig, 74 n = sigvec(sig, &sv, (struct sigvec *)NULL); 85 int sig, 91 n = sigset(sig, func); 103 int sig, 110 if (SIG_ERR == signal(sig, fun 29 signal_no_reset( int sig, void (*func)(int) ) argument 64 signal_no_reset( int sig, RETSIGTYPE (*func)(int) ) argument 84 signal_no_reset( int sig, RETSIGTYPE (*func)(int) ) argument 102 signal_no_reset( int sig, RETSIGTYPE (*func)(int) ) argument [all...] |
/freebsd-current/lib/libc/compat-43/ |
H A D | sigcompat.c | 104 xsi_sigpause(int sig) argument 110 if (sigdelset(&set, sig) == -1) 116 sighold(int sig) argument 121 if (sigaddset(&set, sig) == -1) 127 sigignore(int sig) argument 133 return (__libc_sigaction(sig, &sa, NULL)); 137 sigrelse(int sig) argument 142 if (sigaddset(&set, sig) == -1) 148 (*sigset(int sig, void (*disp)(int)))(int) argument 154 if (sigaddset(&set, sig) [all...] |
/freebsd-current/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | sig_fuzz.cc | 25 int LLVMFuzzerTestOneInput(const uint8_t* sig, size_t slen) argument 41 sshkey_verify(rsa, sig, slen, (const u_char *)data, dlen, NULL, 0, &details); 44 sshkey_verify(dsa, sig, slen, (const u_char *)data, dlen, NULL, 0, &details); 47 sshkey_verify(ecdsa256, sig, slen, (const u_char *)data, dlen, NULL, 0, &details); 50 sshkey_verify(ecdsa384, sig, slen, (const u_char *)data, dlen, NULL, 0, &details); 53 sshkey_verify(ecdsa521, sig, slen, (const u_char *)data, dlen, NULL, 0, &details); 57 sshkey_verify(ed25519, sig, slen, (const u_char *)data, dlen, NULL, 0, &details);
|
H A D | sshsig_fuzz.cc | 18 int LLVMFuzzerTestOneInput(const uint8_t* sig, size_t slen) argument 22 struct sshbuf *signature = sshbuf_from(sig, slen);
|
/freebsd-current/lib/libc/powerpc/gen/ |
H A D | signalcontext.c | 38 static void ctx_wrapper(ucontext_t *ucp, handler_t func, uint32_t sig, 44 __signalcontext(ucontext_t *ucp, int sig, __sighandler_t *func) argument 63 sig_si->si_signo = sig; 76 sigdelset(&ucp->uc_sigmask, sig); 83 ucp->uc_mcontext.mc_gpr[4] = (uint32_t) sig; 91 ctx_wrapper(ucontext_t *ucp, handler_t func, uint32_t sig, uint32_t sig_si, argument 95 (*func)(sig, sig_si, sig_uc);
|
/freebsd-current/lib/libc/powerpc64/gen/ |
H A D | signalcontext.c | 38 static void ctx_wrapper(ucontext_t *ucp, handler_t func, uint32_t sig, 44 __signalcontext(ucontext_t *ucp, int sig, __sighandler_t *func) argument 63 sig_si->si_signo = sig; 76 sigdelset(&ucp->uc_sigmask, sig); 83 ucp->uc_mcontext.mc_gpr[4] = (uint64_t) sig; 91 ctx_wrapper(ucontext_t *ucp, handler_t func, uint32_t sig, uint32_t sig_si, argument 95 (*func)(sig, sig_si, sig_uc);
|
/freebsd-current/contrib/tcpdump/ |
H A D | signature.c | 124 uint8_t sig[16]; local 142 if (!ND_TTEST_LEN(sig_ptr, sizeof(sig))) { 146 if (sig_ptr + sizeof(sig) > pptr + plen) { 165 memset(sig_copy, 0, sizeof(sig)); 178 strlen(ndo->ndo_sigsecret), sig); 188 if (memcmp(sig_ptr, sig, sizeof(sig)) == 0) { 193 for (i = 0; i < sizeof(sig); ++i) { 194 ND_PRINT("%02x", sig[i]);
|
/freebsd-current/lib/libsecureboot/ |
H A D | local.trust.mk | 37 .for sig ext url in ${VE_SIGN_URL_LIST:@x@${x:H:H} ${x:H:T} ${x:T}@} 38 SIGN_${sig}:= ${PYTHON} ${${sig}_SIGNER:U${SIGNER}} -u ${url} ${${sig}_SIGN_FLAGS:U-h sha256} 40 VE_SIGNATURE_LIST+= ${sig} 43 _SIGN_${sig}_USE: .USE 44 ${SIGN_${sig}} ${.ALLSRC} 46 _TA_${sig}_USE: .USE 47 ${SIGN_${sig}} -C ${.TARGET} 49 .if ${sig} [all...] |
/freebsd-current/contrib/netbsd-tests/rump/kernspace/ |
H A D | sendsig.c | 50 int sig; local 52 sig = strtoull(signo, NULL, 10); 60 psignal(p, sig);
|
/freebsd-current/contrib/bearssl/inc/ |
H A D | bearssl_ec.h | 634 * \param sig signature to convert. 638 size_t br_ecdsa_raw_to_asn1(void *sig, size_t sig_len); 649 * \param sig signature to convert. 653 size_t br_ecdsa_asn1_to_raw(void *sig, size_t sig_len); 662 * Signature is written in the buffer pointed to by `sig`, and the length 681 * \param sig destination buffer. 686 const br_ec_private_key *sk, void *sig); 706 * \param sig signature. 712 const br_ec_public_key *pk, const void *sig, size_t sig_len); 723 * \param sig destinatio [all...] |
/freebsd-current/sys/cddl/compat/opensolaris/sys/ |
H A D | sig.h | 47 int sig; local 56 sig = cursig(td); 59 if (sig != 0)
|
/freebsd-current/crypto/openssl/demos/signature/ |
H A D | rsa_pss_direct.c | 38 static int sign(OSSL_LIB_CTX *libctx, unsigned char **sig, size_t *sig_len) argument 46 *sig = NULL; 95 *sig = OPENSSL_malloc(*sig_len); 96 if (*sig == NULL) { 102 if (EVP_PKEY_sign(ctx, *sig, sig_len, 115 OPENSSL_free(*sig); 124 static int verify(OSSL_LIB_CTX *libctx, const unsigned char *sig, size_t sig_len) argument 171 if (EVP_PKEY_verify(ctx, sig, sig_len, 190 unsigned char *sig = NULL; local 193 if (sign(libctx, &sig, [all...] |
/freebsd-current/contrib/sendmail/libmilter/ |
H A D | signal.c | 93 int sig, errs, sigerr; local 106 sigerr = sig = 0; 108 if ((sig = sigwait(&set)) < 0) 110 if ((sigerr = sigwait(&set, &sig)) != 0) 132 switch (sig) 144 (char *)name, sig);
|
/freebsd-current/sys/sys/ |
H A D | wait.h | 63 #define W_EXITCODE(ret, sig) ((ret) << 8 | (sig)) 64 #define W_STOPCODE(sig) ((sig) << 8 | _WSTOPPED) 147 #define KW_EXITCODE(ret, sig) W_EXITCODE((ret) & 0xff, (sig))
|
/freebsd-current/contrib/xz/src/xz/ |
H A D | signals.c | 40 signal_handler(int sig) argument 42 exit_signal = sig; 155 const int sig = (int)exit_signal; local 157 if (sig != 0) { 168 sigaction(sig, &sa, NULL); 169 raise(sig);
|
/freebsd-current/contrib/ldns/drill/ |
H A D | drill_util.h | 36 void print_rrsig_abbr(FILE *fp, ldns_rr *sig); 49 void print_rr_list_abbr(FILE *fp, ldns_rr_list *sig, const char *usr);
|
/freebsd-current/crypto/openssh/ |
H A D | xmss_wots.h | 52 * Takes a m-byte message and the 32-byte seed for the secret key to compute a signature that is placed at "sig". 55 int wots_sign(unsigned char *sig, const unsigned char *msg, const unsigned char *sk, const wots_params *params, const unsigned char *pub_seed, uint32_t addr[8]); 61 int wots_pkFromSig(unsigned char *pk, const unsigned char *sig, const unsigned char *msg, const wots_params *params, const unsigned char *pub_seed, uint32_t addr[8]);
|
/freebsd-current/crypto/heimdal/lib/kadm5/ |
H A D | ipropd_common.c | 40 sigterm(int sig) argument 42 exit_flag = sig;
|
/freebsd-current/contrib/ncurses/ncurses/tty/ |
H A D | lib_tstp.c | 56 signal_name(int sig) argument 58 switch (sig) { 242 handle_SIGINT(int sig) argument 259 && (sig == SIGINT || sig == SIGTERM)) { 265 if (sigaction(sig, &act, NULL) == 0) 267 if (signal(sig, SIG_IGN) != SIG_ERR) 288 handle_SIGWINCH(int sig GCC_UNUSED) 306 CatchIfDefault(int sig, void (*handler) (int)) argument 317 if (sig ! [all...] |