| /freebsd/lib/libc/tests/gen/ |
| H A D | sig2str_test.c | 41 int sig; in test_roundtrip() local 45 ATF_REQUIRE_EQ_MSG(str2sig(str, &sig), 0, in test_roundtrip() 47 ATF_REQUIRE_INTEQ_MSG(sig, signum, in test_roundtrip() 49 sig, signum); in test_roundtrip() 55 int sig; in ATF_TC_BODY() local 57 for (sig = 1; sig < sys_nsig; sig++) { in ATF_TC_BODY() 58 test_roundtrip(sig); in ATF_TC_BODY() 75 int sig; in ATF_TC_BODY() local 77 ATF_CHECK_MSG(str2sig("RTMIN", &sig) == 0, in ATF_TC_BODY() 79 ATF_CHECK_INTEQ_MSG(sig, SIGRTMIN, in ATF_TC_BODY() [all …]
|
| /freebsd/crypto/openssl/crypto/dsa/ |
| H A D | dsa_sign.c | 36 DSA_SIG *sig = OPENSSL_zalloc(sizeof(*sig)); in DSA_SIG_new() local 38 return sig; in DSA_SIG_new() 41 void DSA_SIG_free(DSA_SIG *sig) in DSA_SIG_free() argument 43 if (sig == NULL) in DSA_SIG_free() 45 BN_clear_free(sig->r); in DSA_SIG_free() 46 BN_clear_free(sig->s); in DSA_SIG_free() 47 OPENSSL_free(sig); in DSA_SIG_free() 52 DSA_SIG *sig; in d2i_DSA_SIG() local 57 sig = *psig; in d2i_DSA_SIG() 59 sig = DSA_SIG_new(); in d2i_DSA_SIG() [all …]
|
| /freebsd/contrib/ntp/sntp/libevent/ |
| H A D | signal.c | 116 static void __cdecl evsig_handler(int sig); 126 evsig_base_n_signals_added = base->sig.ev_n_signals_added; in evsig_set_base_() 127 evsig_base_fd = base->sig.ev_signal_pair[1]; in evsig_set_base_() 161 ev_uint8_t sig = signals[i]; in evsig_cb() local 162 if (sig < NSIG) in evsig_cb() 163 ncaught[sig]++; in evsig_cb() 183 if (evutil_make_internal_pipe_(base->sig.ev_signal_pair) == -1) { in evsig_init_() 194 if (base->sig.sh_old) { in evsig_init_() 195 mm_free(base->sig.sh_old); in evsig_init_() 197 base->sig.sh_old = NULL; in evsig_init_() [all …]
|
| /freebsd/contrib/libevent/ |
| H A D | signal.c | 116 static void __cdecl evsig_handler(int sig); 126 evsig_base_n_signals_added = base->sig.ev_n_signals_added; in evsig_set_base_() 127 evsig_base_fd = base->sig.ev_signal_pair[1]; in evsig_set_base_() 161 ev_uint8_t sig = signals[i]; in evsig_cb() local 162 if (sig < NSIG) in evsig_cb() 163 ncaught[sig]++; in evsig_cb() 183 if (evutil_make_internal_pipe_(base->sig.ev_signal_pair) == -1) { in evsig_init_() 194 if (base->sig.sh_old) { in evsig_init_() 195 mm_free(base->sig.sh_old); in evsig_init_() 197 base->sig.sh_old = NULL; in evsig_init_() [all …]
|
| /freebsd/sys/contrib/libsodium/test/default/ |
| H A D | misuse.c | 9 sigabrt_handler_15(int sig) in sigabrt_handler_15() argument 11 (void) sig; in sigabrt_handler_15() 17 sigabrt_handler_14(int sig) in sigabrt_handler_14() argument 19 (void) sig; in sigabrt_handler_14() 28 sigabrt_handler_13(int sig) in sigabrt_handler_13() argument 30 (void) sig; in sigabrt_handler_13() 40 sigabrt_handler_12(int sig) in sigabrt_handler_12() argument 42 (void) sig; in sigabrt_handler_12() 53 sigabrt_handler_11(int sig) in sigabrt_handler_11() argument 55 (void) sig; in sigabrt_handler_11() [all …]
|
| /freebsd/lib/libsecureboot/openpgp/ |
| H A D | opgp_sig.c | 109 decode_sig(int tag, unsigned char **pptr, size_t len, OpenPGP_sig *sig) 132 sig->pgpbytes = malloc(5); 133 if (!sig->pgpbytes) 135 memcpy(sig->pgpbytes, ptr, 5); 136 sig->pgpbytes_len = 5; 137 sig->sig_type = *ptr++; 139 sig->key_id = octets2hex(ptr, 8); 141 sig->sig_alg = *ptr++; 142 sig->hash_alg = *ptr++; 144 sig->sig_type = *ptr++; [all …]
|
| /freebsd/usr.sbin/ppp/ |
| H A D | sig.c | 34 #include "sig.h" 50 signal_recorder(int sig) in signal_recorder() argument 52 caused[sig - 1]++; in signal_recorder() 58 * Set up signal_recorder to handle the given sig and record ``fn'' as 64 sig_signal(int sig, sig_type fn) in sig_signal() argument 68 if (sig <= 0 || sig > NSIG) { in sig_signal() 72 return signal(sig, fn); in sig_signal() 74 Result = handler[sig - 1]; in sig_signal() 76 signal(sig, fn); in sig_signal() 77 handler[sig - 1] = (sig_type) 0; in sig_signal() [all …]
|
| /freebsd/sys/compat/linux/ |
| H A D | linux_signal.c | 60 static int linux_pksignal(struct thread *td, int pid, int sig, 62 static int linux_psignal(struct thread *td, int pid, int sig); 64 int tgid, int sig, ksiginfo_t *ksi); 66 int tgid, int sig); 67 static void sicode_to_lsicode(int sig, int si_code, int *lsi_code); 169 int error, sig; in linux_do_sigaction() local 173 sig = linux_to_bsd_signal(linux_sig); in linux_do_sigaction() 184 if ((sig == SIGKILL || sig == SIGSTOP) && in linux_do_sigaction() 190 error = kern_sigaction(td, sig, nsa, osa, 0); in linux_do_sigaction() 247 error = linux_do_sigaction(td, args->sig, &nsa, &osa); in linux_signal() [all …]
|
| /freebsd/contrib/sendmail/libsm/ |
| H A D | signal.c | 39 sm_signal(sig, handler) in sm_signal() argument 40 int sig; in sm_signal() 61 if (sigaction(sig, &n, &o) < 0) 73 return signal(sig, handler); 75 return sigset(sig, handler); 86 if (sigaction(sig, &n, &o) < 0) 96 ** sig -- the signal to block. 105 sm_blocksignal(sig) in sm_blocksignal() argument 106 int sig; in sm_blocksignal() 112 return (sigblock(sigmask(sig)) & sigmask(sig)) != 0; [all …]
|
| /freebsd/crypto/libecc/include/libecc/ |
| H A D | meson.build | 128 'sig/ecdsa_common.h', 129 'sig/ecsdsa_common.h', 130 'sig/fuzzing_ecrdsa.h', 131 'sig/fuzzing_ecdsa.h', 132 'sig/ecfsdsa.h', 133 'sig/bip0340.h', 134 'sig/ecgdsa.h', 135 'sig/ecosdsa.h', 136 'sig/eddsa.h', 137 'sig/dbign.h', [all …]
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | bsd-pselect.c | 113 pselect_sig_handler(int sig) in pselect_sig_handler() argument 118 if (saved_sighandler[sig] != NULL) in pselect_sig_handler() 119 (*saved_sighandler[sig])(sig); /* call original handler */ in pselect_sig_handler() 131 int ret, sig, saved_errno, unmasked = 0; in pselect() local 145 for (sig = 0; sig < _NSIG; sig++) { in pselect() 146 saved_sighandler[sig] = NULL; in pselect() 147 if (sig == SIGKILL || sig == SIGSTOP || sigismember(mask, sig)) in pselect() 149 if (sigaction(sig, NULL, &sa) == 0 && in pselect() 153 if (sigaction(sig, &sa, &osa) == 0) { in pselect() 157 strsignal(sig), osa.sa_handler); in pselect() [all …]
|
| /freebsd/sys/kern/ |
| H A D | kern_sig.c | 105 static int killpg1(struct thread *td, int sig, int pgid, int all, 109 static int sigprop(int sig); 115 static struct thread *sigtd(struct proc *p, int sig, bool fast_sigblock); 119 int sig); 244 sig = __i * sizeof((set)->__bits[0]) * NBBY + __sig; \ 267 int old_boundary, sig; in ast_sig() local 312 while ((sig = cursig(td)) != 0) { in ast_sig() 313 KASSERT(sig >= 0, ("sig %d", sig)); in ast_sig() 314 postsig(sig); in ast_sig() 755 sigprop(int sig) in sigprop() argument [all …]
|
| /freebsd/contrib/llvm-project/compiler-rt/lib/sanitizer_common/ |
| H A D | sanitizer_symbolizer_report.cpp | 220 static void ReportStackOverflowImpl(const SignalContext &sig, u32 tid, in ReportStackOverflowImpl() argument 227 SanitizerToolName, kDescription, (void *)sig.addr, (void *)sig.pc, in ReportStackOverflowImpl() 228 (void *)sig.bp, (void *)sig.sp, tid); in ReportStackOverflowImpl() 233 unwind(sig, unwind_context, stack); in ReportStackOverflowImpl() 238 static void ReportDeadlySignalImpl(const SignalContext &sig, u32 tid, in ReportDeadlySignalImpl() argument 243 const char *description = sig.Describe(); in ReportDeadlySignalImpl() 244 if (sig.is_memory_access && !sig.is_true_faulting_addr) in ReportDeadlySignalImpl() 246 SanitizerToolName, description, (void *)sig.pc, (void *)sig.bp, in ReportDeadlySignalImpl() 247 (void *)sig.sp, tid); in ReportDeadlySignalImpl() 250 SanitizerToolName, description, (void *)sig.addr, (void *)sig.pc, in ReportDeadlySignalImpl() [all …]
|
| /freebsd/lib/libsecureboot/ |
| H A D | local.trust.mk | 37 .for sig ext url in ${VE_SIGN_URL_LIST:@x@${x:H:H} ${x:H:T} ${x:T}@} 38 SIGN_${sig}:= ${PYTHON} ${${sig}_SIGNER:U${SIGNER}} -u ${url} ${${sig}_SIGN_FLAGS:U-h sha256} 40 VE_SIGNATURE_LIST+= ${sig} 43 _SIGN_${sig}_USE: .USE 44 ${SIGN_${sig}} ${.ALLSRC} 46 _TA_${sig}_USE: .USE 47 ${SIGN_${sig}} -C ${.TARGET} 49 .if ${sig} == "OPENPGP" 50 ta_${sig:tl}.${ext}: _TA_${sig}_USE 51 ta_${ext}.h: ta_${sig:tl}.${ext} [all …]
|
| /freebsd/crypto/libecc/src/sig/ |
| H A D | sig_algs.c | 16 #include <libecc/sig/sig_algs.h> 160 int ec_sig_mapping_callbacks_sanity_check(const ec_sig_mapping *sig) in ec_sig_mapping_callbacks_sanity_check() argument 166 MUST_HAVE((sig != NULL), ret, err); in ec_sig_mapping_callbacks_sanity_check() 173 if (sm->type == sig->type){ in ec_sig_mapping_callbacks_sanity_check() 174 if ((!are_str_equal_nlen(sm->name, sig->name, MAX_SIG_ALG_NAME_LEN, &check)) && (!check)){ in ec_sig_mapping_callbacks_sanity_check() 176 } else if (sm->siglen != sig->siglen){ in ec_sig_mapping_callbacks_sanity_check() 178 } else if (sm->gen_priv_key != sig->gen_priv_key){ in ec_sig_mapping_callbacks_sanity_check() 180 } else if (sm->init_pub_key != sig->init_pub_key){ in ec_sig_mapping_callbacks_sanity_check() 182 } else if (sm->sign_init != sig->sign_init){ in ec_sig_mapping_callbacks_sanity_check() 184 } else if (sm->sign_update != sig->sign_update){ in ec_sig_mapping_callbacks_sanity_check() [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | EVP_PKEY_sign.3 | 80 \& int EVP_PKEY_sign_message_final(EVP_PKEY_CTX *ctx, unsigned char *sig, 83 \& unsigned char *sig, size_t *siglen, 137 If \fIsig\fR is NULL then the maximum size of the output buffer is written to the 139 If \fIsig\fR is not NULL, then before the call the \fIsiglen\fR parameter should 140 contain the length of the \fIsig\fR buffer, and if the call is successful the 141 signature is written to \fIsig\fR and the amount of data written to \fIsiglen\fR. 200 \& unsigned char *md, *sig; 223 \& sig = OPENSSL_malloc(siglen); 225 \& if (sig == NULL) 228 \& if (EVP_PKEY_sign(ctx, sig, &siglen, md, mdlen) <= 0) [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_sign.pod | 21 int EVP_PKEY_sign_message_final(EVP_PKEY_CTX *ctx, unsigned char *sig, 24 unsigned char *sig, size_t *siglen, 65 I<sig>, and the number of signature bytes in I<*siglen>, if the number of 67 I<sig> may be NULL, and in that case, only I<*siglen> is updated with the 78 If I<sig> is NULL then the maximum size of the output buffer is written to the 80 If I<sig> is not NULL, then before the call the I<siglen> parameter should 81 contain the length of the I<sig> buffer, and if the call is successful the 82 signature is written to I<sig> and the amount of data written to I<siglen>. 158 unsigned char *md, *sig; 181 sig = OPENSSL_malloc(siglen); [all …]
|
| /freebsd/crypto/openssh/regress/unittests/sshsig/ |
| H A D | mktestdata.sh | 21 rm -f rsa.sig dsa.sig ecdsa.sig ed25519.sig ecdsa_sk.sig ed25519_sk.sig 35 ssh-keygen -Y sign -f rsa -n $NAMESPACE - < signed-data > rsa.sig 36 ssh-keygen -Y sign -f dsa -n $NAMESPACE - < signed-data > dsa.sig 37 ssh-keygen -Y sign -f ecdsa -n $NAMESPACE - < signed-data > ecdsa.sig 38 ssh-keygen -Y sign -f ed25519 -n $NAMESPACE - < signed-data > ed25519.sig 40 -Y sign -f ecdsa_sk -n $NAMESPACE - < signed-data > ecdsa_sk.sig 42 -Y sign -f ed25519_sk -n $NAMESPACE - < signed-data > ed25519_sk.sig
|
| /freebsd/contrib/bmake/ |
| H A D | sigaction.c | 7 * int sigaction(int sig, struct sigaction *act, 9 * int sigaddset(sigset_t *mask, int sig); 10 * int sigdelset(sigset_t *mask, int sig); 13 * int sigismember(sigset_t *mask, int sig); 18 * SIG_HDLR (*Signal(int sig, SIG_HDLR (*disp)(int)))(int); 68 * sigaddset() adds "sig" to the sigset_t pointed to by "mask". 70 * sigdelset() removes "sig" from the sigset_t pointed to 78 * sigismember() returns true if "sig" is found in "*mask". 189 sigaction(int sig, in sigaction() argument 197 oldh = sigset(sig, act->sa_handler); in sigaction() [all …]
|
| /freebsd/lib/libthr/thread/ |
| H A D | thr_sig.c | 77 int _sigwait(const sigset_t *set, int *sig); 186 _thr_send_sig(struct pthread *thread, int sig) in _thr_send_sig() argument 188 return thr_kill(thread->tid, sig); in _thr_send_sig() 207 sigcancel_handler(int sig __unused, siginfo_t *info __unused, ucontext_t *ucp) in sigcancel_handler() 220 typedef void (*ohandler)(int sig, int code, struct sigcontext *scp, 227 thr_sighandler(int sig, siginfo_t *info, void *_ucp) in thr_sighandler() argument 238 usa = __libc_sigaction_slot(sig); in thr_sighandler() 252 if (THR_IN_CRITICAL(curthread) && SIGISMEMBER(_thr_deferset, sig)) { in thr_sighandler() 261 handle_signal(&act, sig, info, ucp); in thr_sighandler() 265 handle_signal(struct sigaction *actp, int sig, siginfo_t *info, ucontext_t *ucp) in handle_signal() argument [all …]
|
| /freebsd/crypto/openssl/crypto/rsa/ |
| H A D | rsa_saos.c | 28 ASN1_OCTET_STRING sig; in RSA_sign_ASN1_OCTET_STRING() local 32 sig.type = V_ASN1_OCTET_STRING; in RSA_sign_ASN1_OCTET_STRING() 33 sig.length = m_len; in RSA_sign_ASN1_OCTET_STRING() 34 sig.data = (unsigned char *)m; in RSA_sign_ASN1_OCTET_STRING() 36 i = i2d_ASN1_OCTET_STRING(&sig, NULL); in RSA_sign_ASN1_OCTET_STRING() 46 i2d_ASN1_OCTET_STRING(&sig, &p); in RSA_sign_ASN1_OCTET_STRING() 65 ASN1_OCTET_STRING *sig = NULL; in RSA_verify_ASN1_OCTET_STRING() local 81 sig = d2i_ASN1_OCTET_STRING(NULL, &p, (long)i); in RSA_verify_ASN1_OCTET_STRING() 82 if (sig == NULL) in RSA_verify_ASN1_OCTET_STRING() 85 if (((unsigned int)sig->length != m_len) || in RSA_verify_ASN1_OCTET_STRING() [all …]
|
| /freebsd/sys/contrib/libsodium/src/libsodium/crypto_sign/ed25519/ref10/ |
| H A D | open.c | 14 _crypto_sign_ed25519_verify_detached(const unsigned char *sig, in _crypto_sign_ed25519_verify_detached() argument 27 if (sig[63] & 224) { in _crypto_sign_ed25519_verify_detached() 31 if (sc25519_is_canonical(sig + 32) == 0 || in _crypto_sign_ed25519_verify_detached() 32 ge25519_has_small_order(sig) != 0) { in _crypto_sign_ed25519_verify_detached() 44 crypto_hash_sha512_update(&hs, sig, 32); in _crypto_sign_ed25519_verify_detached() 50 ge25519_double_scalarmult_vartime(&R, h, &A, sig + 32); in _crypto_sign_ed25519_verify_detached() 53 return crypto_verify_32(rcheck, sig) | (-(rcheck == sig)) | in _crypto_sign_ed25519_verify_detached() 54 sodium_memcmp(sig, rcheck, 32); in _crypto_sign_ed25519_verify_detached() 58 crypto_sign_ed25519_verify_detached(const unsigned char *sig, in crypto_sign_ed25519_verify_detached() argument 63 return _crypto_sign_ed25519_verify_detached(sig, m, mlen, pk, 0); in crypto_sign_ed25519_verify_detached()
|
| /freebsd/contrib/ntp/ |
| H A D | flock-build | 51 SIG=`perl -e 'print rand'` 67 echo $SIG > .buildkey-$i 70 ssh $i "cd $c_d ; ./build $SIG $PARSE $STD $BUILD_ARGS" & 71 ssh $i "cd $c_d ; ./build $SIG $PARSE $STD --disable-debugging --disable-saveconfig $BUILD_ARGS" & 72 ssh $i "cd $c_d ; ./build $SIG $PARSE $STD --without-crypto --enable-c99-snprintf --enable-leap-smear $BUILD_ARGS" & 73 ssh $i "cd $c_d ; ./build $SIG $STD --disable-all-clocks --disable-autokey --without-sntp --disable-thread-support $BUILD_ARGS" & 76 cat > .flockbuild-$i-$SIG <<-ENDQUOT 86 ./build $SIG $PARSE $STD $BUILD_ARGS & 94 ./build $SIG $PARSE $STD --disable-debugging --disable-saveconfig $BUILD_ARGS & 100 ./build $SIG [all...] |
| /freebsd/lib/libc/compat-43/ |
| H A D | sigpause.2 | 47 .Fn sighold "int sig" 49 .Fn sigignore "int sig" 53 .Fn sigrelse "int sig" 68 .Fa sig 86 .Fa sig 97 .Fa sig 100 .Fa sig 's 108 .Fa sig 114 .Fa sig 120 .Fa sig [all …]
|
| /freebsd/crypto/openssl/crypto/bn/asm/ |
| H A D | ia64.S | 312 { .mib; setf.sig f8=r35 // w 338 { .mfi; (p25) getf.sig r36=f52 // low 344 { .mii; (p25) getf.sig r32=f44 // high 363 setf.sig f37=r0 // serves as carry at (p18) tick 386 getf.sig r8=f41 // the return value 418 { .mib; setf.sig f8=r35 // w 443 { .mfi; (p23) getf.sig r36=f45 // low 449 { .mmi; (p24) getf.sig r32=f40 // high 584 // result from getf.sig. I do nothing about it at this point for 694 { .mfi; getf.sig r16=f40 [all …]
|