/openbsd-current/lib/libcrypto/arch/arm/ |
H A D | armcap.c | 17 static void ill_handler (int sig) { siglongjmp(ill_jmp, sig); argument
|
/openbsd-current/usr.sbin/sysupgrade/ |
H A D | sysupgrade.sh | 137 unpriv -f SHA256.sig ftp -N sysupgrade -Vmo SHA256.sig ${URL}SHA256.sig 143 unpriv -f SHA256 signify -Ve -x SHA256.sig -m SHA256 145 read _LINE <SHA256.sig 154 unpriv -f SHA256 signify -Ve -p "${SIGNIFY_KEY}" -x SHA256.sig -m SHA256 157 rm SHA256.sig 202 Directory does not contain SHA256.sig. Continue without verification = yes
|
/openbsd-current/lib/libkeynote/ |
H A D | signature.c | 181 keynote_get_sig_algorithm(char *sig, int *hash, int *enc, int *internal) argument 183 if (sig == NULL) 186 if (!strncasecmp(SIG_DSA_SHA1_HEX, sig, SIG_DSA_SHA1_HEX_LEN)) 194 if (!strncasecmp(SIG_DSA_SHA1_BASE64, sig, SIG_DSA_SHA1_BASE64_LEN)) 202 if (!strncasecmp(SIG_RSA_MD5_PKCS1_HEX, sig, SIG_RSA_MD5_PKCS1_HEX_LEN)) 210 if (!strncasecmp(SIG_RSA_SHA1_PKCS1_HEX, sig, SIG_RSA_SHA1_PKCS1_HEX_LEN)) 218 if (!strncasecmp(SIG_RSA_MD5_PKCS1_BASE64, sig, 227 if (!strncasecmp(SIG_RSA_SHA1_PKCS1_BASE64, sig, 236 if (!strncasecmp(SIG_X509_SHA1_BASE64, sig, SIG_X509_SHA1_BASE64_LEN)) 244 if (!strncasecmp(SIG_X509_SHA1_HEX, sig, SIG_X509_SHA1_HEX_LE 634 unsigned char *sig, *decoded = NULL, *ptr; local 790 unsigned char *sig = NULL, *finalbuf = NULL; local 1059 char *s, *sig; local [all...] |
/openbsd-current/gnu/llvm/lldb/third_party/Python/module/pexpect-4.6/pexpect/ |
H A D | popen_spawn.py | 171 def kill(self, sig): 177 if sig in [signal.SIGINT, signal.CTRL_C_EVENT]: 178 sig = signal.CTRL_C_EVENT 179 elif sig in [signal.SIGBREAK, signal.CTRL_BREAK_EVENT]: 180 sig = signal.CTRL_BREAK_EVENT 182 sig = signal.SIGTERM 184 os.kill(self.proc.pid, sig)
|
/openbsd-current/regress/sys/kern/signal/sigpthread/ |
H A D | sigpthread.c | 223 handler(int sig) argument 233 switch (sig) { 240 errx(1, "unexpected signal %d thread %d", sig, tnum); 254 int sig; local 256 if (sigwait(&set, &sig) != 0) 258 if (sig != SIGUSR2) 259 errx(1, "unexpected signal %d thread %d", sig, tnum);
|
/openbsd-current/lib/libcrypto/ocsp/ |
H A D | ocsp_prn.c | 156 OCSP_SIGNATURE *sig = o->optionalSignature; local 181 if (sig) { 182 if (X509_signature_print(bp, sig->signatureAlgorithm, 183 sig->signature) == 0) 185 for (i = 0; i < sk_X509_num(sig->certs); i++) { 186 if (X509_print(bp, sk_X509_value(sig->certs, i)) == 0) 189 sk_X509_value(sig->certs, i)) == 0)
|
/openbsd-current/lib/libcrypto/evp/ |
H A D | pmeth_fn.c | 104 EVP_PKEY_sign(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, argument 115 M_check_autoarg(ctx, sig, siglen, EVP_F_EVP_PKEY_SIGN) 116 return ctx->pmeth->sign(ctx, sig, siglen, tbs, tbslen); 140 EVP_PKEY_verify(EVP_PKEY_CTX *ctx, const unsigned char *sig, size_t siglen, argument 151 return ctx->pmeth->verify(ctx, sig, siglen, tbs, tbslen); 172 const unsigned char *sig, size_t siglen) 183 return ctx->pmeth->verify_recover(ctx, rout, routlen, sig, siglen); 171 EVP_PKEY_verify_recover(EVP_PKEY_CTX *ctx, unsigned char *rout, size_t *routlen, const unsigned char *sig, size_t siglen) argument
|
H A D | evp_local.h | 124 const ASN1_STRING *sig, int indent, ASN1_PCTX *pctx); 136 X509_ALGOR *a, ASN1_BIT_STRING *sig, EVP_PKEY *pkey); 138 X509_ALGOR *alg1, X509_ALGOR *alg2, ASN1_BIT_STRING *sig); 291 int (*sign)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 296 const unsigned char *sig, size_t siglen, 301 const unsigned char *sig, size_t siglen); 304 int (*signctx)(EVP_PKEY_CTX *ctx, unsigned char *sig, size_t *siglen, 319 int (*digestsign)(EVP_MD_CTX *ctx, unsigned char *sig, size_t *siglen, 321 int (*digestverify) (EVP_MD_CTX *ctx, const unsigned char *sig,
|
/openbsd-current/usr.bin/ssh/ |
H A D | ssh-xmss.c | 201 u_char *sig = NULL; local 222 if ((sig = malloc(slen)) == NULL) 226 if ((ret = xmss_sign(key->xmss_sk, sshkey_xmss_bds_state(key), sig, &smlen, 237 (r = sshbuf_put_string(b, sig, smlen - datalen)) != 0) 265 if (sig != NULL) 266 freezero(sig, slen); 273 const u_char *sig, size_t siglen, 289 sig == NULL || siglen == 0) 296 if ((b = sshbuf_from(sig, siglen)) == NULL) 272 ssh_xmss_verify(const struct sshkey *key, const u_char *sig, size_t siglen, const u_char *data, size_t dlen, const char *alg, u_int compat, struct sshkey_sig_details **detailsp) argument
|
/openbsd-current/gnu/llvm/lld/wasm/ |
H A D | WriterUtils.cpp | 41 std::string toString(const WasmSignature &sig) { argument 43 for (ValType type : sig.Params) { 49 if (sig.Returns.empty()) 52 s += toString(sig.Returns[0]); 126 void writeSig(raw_ostream &os, const WasmSignature &sig) { argument 128 writeUleb128(os, sig.Params.size(), "param Count"); 129 for (ValType paramType : sig.Params) { 132 writeUleb128(os, sig.Returns.size(), "result Count"); 133 for (ValType returnType : sig.Returns) { 217 writeUleb128(os, import.SigIndex, "import sig inde [all...] |
H A D | SymbolTable.cpp | 507 const WasmSignature *sig, 510 << (sig ? toString(*sig) : "none") 523 file, sig, isCalledDirectly); 531 lazy->signature = sig; 544 if (!existingFunction->signature && sig) 545 existingFunction->signature = sig; 547 if (isCalledDirectly && !signatureMatches(existingFunction, sig)) { 553 else if (getFunctionVariant(s, sig, file, &s)) 643 const WasmSignature *sig) { 503 addUndefinedFunction(StringRef name, std::optional<StringRef> importName, std::optional<StringRef> importModule, uint32_t flags, InputFile *file, const WasmSignature *sig, bool isCalledDirectly) argument 639 addUndefinedTag(StringRef name, std::optional<StringRef> importName, std::optional<StringRef> importModule, uint32_t flags, InputFile *file, const WasmSignature *sig) argument 774 getFunctionVariant(Symbol* sym, const WasmSignature *sig, const InputFile *file, Symbol **out) argument 841 replaceWithUnreachable(Symbol *sym, const WasmSignature &sig, StringRef debugName) argument 886 createUndefinedStub(const WasmSignature &sig) argument [all...] |
/openbsd-current/sys/arch/amd64/amd64/ |
H A D | trap.c | 379 int sig, code; local 393 sig = SIGBUS; 400 sig = SIGSEGV; 404 sig = SIGBUS; 408 sig = SIGILL; 412 sig = SIGFPE; 417 sig = SIGFPE; 422 sig = SIGTRAP; 426 sig = SIGILL; 446 trapsignal(p, sig, typ 472 frame_dump(struct trapframe *tf, struct proc *p, const char *sig, uint64_t cr2) argument [all...] |
/openbsd-current/lib/libfido2/src/ |
H A D | u2f.c | 53 sig_get(fido_blob_t *sig, const unsigned char **buf, size_t *len) argument 55 sig->len = *len; /* consume the whole buffer */ 56 if ((sig->ptr = calloc(1, sig->len)) == NULL || 57 fido_buf_read(buf, len, sig->ptr, sig->len) < 0) { 59 fido_blob_reset(sig); 264 parse_auth_reply(fido_blob_t *sig, fido_blob_t *ad, const char *rp_id, argument 283 if (sig_get(sig, &reply, &len) < 0) { 298 const fido_blob_t *key_id, fido_blob_t *sig, fido_blob_ 297 do_auth(fido_dev_t *dev, const fido_blob_t *cdh, const char *rp_id, const fido_blob_t *key_id, fido_blob_t *sig, fido_blob_t *ad, int *ms) argument 415 encode_cred_attstmt(int cose_alg, const fido_blob_t *x5c, const fido_blob_t *sig, fido_blob_t *out) argument 563 fido_blob_t sig; local 732 fido_blob_t sig; local [all...] |
/openbsd-current/sys/arch/m88k/m88k/ |
H A D | trap.c | 232 int sig = 0; local 477 sig = result == EACCES ? SIGBUS : SIGSEGV; 485 sig = double_reg_fixup(frame, T_MISALGNFLT); 498 sig = SIGILL; 501 sig = SIGFPE; 504 sig = SIGFPE; 508 sig = SIGFPE; 527 sig = SIGSYS; 553 sig = SIGTRAP; 571 sig 632 int sig = 0; local [all...] |
/openbsd-current/gnu/gcc/gcc/ |
H A D | sreal.h | 51 unsigned HOST_WIDE_INT sig; /* Significant. */
|
/openbsd-current/gnu/usr.bin/binutils/gdb/testsuite/gdb.base/ |
H A D | signull.c | 45 keeper (int sig) argument
|
/openbsd-current/regress/lib/libm/toint/ |
H A D | toint.c | 13 sigfpe(int sig, siginfo_t *si, void *v) argument
|
/openbsd-current/regress/lib/libpthread/siginterrupt/ |
H A D | siginterrupt.c | 13 handler(int sig) argument
|
/openbsd-current/regress/lib/libpthread/signal/ |
H A D | signal.c | 31 handler(int sig) argument
|
/openbsd-current/regress/lib/libpthread/signals/pthread_join/ |
H A D | pthread_join.c | 13 handler(int sig) argument
|
/openbsd-current/regress/lib/libpthread/signals/pthread_mutex_lock/ |
H A D | pthread_mutex_lock.c | 14 handler(int sig) argument
|
/openbsd-current/regress/lib/libc/sleep/ |
H A D | sleep_test.c | 48 handler(int sig) argument
|
/openbsd-current/regress/lib/libc/sys/ |
H A D | t_kill.c | 54 const int sig[] = { SIGHUP, SIGINT, SIGKILL, SIGTERM }; local 59 for (i = 0; i < __arraycount(sig); i++) { 71 ATF_REQUIRE(kill(pid, sig[i]) == 0); 76 if (WIFSIGNALED(sta) == 0 || WTERMSIG(sta) != sig[i])
|
/openbsd-current/regress/lib/libpthread/malloc_duel/ |
H A D | malloc_duel.c | 22 alarm_handler(int sig) argument
|
/openbsd-current/regress/usr.sbin/syslogd/ |
H A D | Proc.pm | 51 my $sig = shift; 54 POSIX::raise($sig); 231 my $sig = shift // 'TERM'; 234 if (kill($sig => $pid) != 1) { 238 my @cmd = ($sudo, '/bin/kill', "-$sig", $pid);
|