sig 33 lib/util/fault.c void (*fault_handler)(int sig); sig 156 lib/util/fault.c _NORETURN_ static void fault_report(int sig) sig 163 lib/util/fault.c DEBUG(0,("INTERNAL ERROR: Signal %d in pid %d (%s)",sig,(int)getpid(),SAMBA_VERSION_STRING)); sig 175 lib/util/fault.c _NORETURN_ static void sig_fault(int sig) sig 179 lib/util/fault.c fault_handlers.fault_handler(sig); sig 182 lib/util/fault.c fault_report(sig); sig 212 lib/util/fault.c void (*fault_handler)(int sig)) sig 99 lib/util/util.h _PUBLIC_ bool register_fault_handler(const char *name, void (*fault_handler)(int sig)); sig 53 source3/client/mtab.c handler (int sig) { sig 58 source3/client/mtab.c setlkw_timeout (int sig) { sig 122 source3/client/mtab.c int sig = 0; sig 129 source3/client/mtab.c while (sigismember (&sa.sa_mask, ++sig) != -1 sig 130 source3/client/mtab.c && sig != SIGCHLD) { sig 131 source3/client/mtab.c if (sig == SIGALRM) sig 135 source3/client/mtab.c sigaction (sig, &sa, (struct sigaction *) 0); sig 960 source3/include/includes.h struct PAC_SIGNATURE_DATA *sig); sig 3135 source3/include/proto.h DATA_BLOB *sig) ; sig 3139 source3/include/proto.h const DATA_BLOB *sig) ; sig 3143 source3/include/proto.h DATA_BLOB *sig); sig 3147 source3/include/proto.h DATA_BLOB *sig); sig 251 source3/include/rpc_dce.h uint8 sig [8]; /* 77 00 7a 00 ff ff 00 00 */ sig 38 source3/lib/fault.c static void fault_report(int sig) sig 47 source3/lib/fault.c DEBUG(0,("INTERNAL ERROR: Signal %d in pid %d (%s)",sig,(int)sys_getpid(),samba_version_string())); sig 73 source3/lib/fault.c static void sig_fault(int sig) sig 75 source3/lib/fault.c fault_report(sig); sig 35 source3/libads/authdata.c struct PAC_SIGNATURE_DATA *sig, sig 43 source3/libads/authdata.c smb_krb5_checksum_from_pac_sig(&cksum, sig); sig 30 source3/libads/sasl.c DATA_BLOB sig; sig 41 source3/libads/sasl.c &sig); sig 46 source3/libads/sasl.c &sig); sig 53 source3/libads/sasl.c sig.data, NTLMSSP_SIG_SIZE); sig 55 source3/libads/sasl.c data_blob_free(&sig); sig 69 source3/libads/sasl.c DATA_BLOB sig; sig 74 source3/libads/sasl.c sig = data_blob_const(ads->ldap.in.buf + 4, NTLMSSP_SIG_SIZE); sig 81 source3/libads/sasl.c &sig); sig 86 source3/libads/sasl.c &sig); sig 937 source3/libsmb/clikrb5.c struct PAC_SIGNATURE_DATA *sig) sig 940 source3/libsmb/clikrb5.c cksum->cksumtype = (krb5_cksumtype)sig->type; sig 941 source3/libsmb/clikrb5.c cksum->checksum.length = sig->signature.length; sig 942 source3/libsmb/clikrb5.c cksum->checksum.data = sig->signature.data; sig 944 source3/libsmb/clikrb5.c cksum->checksum_type = (krb5_cksumtype)sig->type; sig 945 source3/libsmb/clikrb5.c cksum->length = sig->signature.length; sig 946 source3/libsmb/clikrb5.c cksum->contents = sig->signature.data; sig 64 source3/libsmb/ntlmssp_sign.c DATA_BLOB *sig, sig 72 source3/libsmb/ntlmssp_sign.c *sig = data_blob(NULL, NTLMSSP_SIG_SIZE); sig 73 source3/libsmb/ntlmssp_sign.c if (!sig->data) { sig 118 source3/libsmb/ntlmssp_sign.c SIVAL(sig->data, 0, NTLMSSP_SIGN_VERSION); sig 119 source3/libsmb/ntlmssp_sign.c memcpy(sig->data + 4, digest, 8); sig 120 source3/libsmb/ntlmssp_sign.c memcpy(sig->data + 12, seq_num, 4); sig 122 source3/libsmb/ntlmssp_sign.c dump_data_pw("ntlmssp v2 sig ", sig->data, sig->length); sig 127 source3/libsmb/ntlmssp_sign.c if (!msrpc_gen(sig, "dddd", NTLMSSP_SIGN_VERSION, 0, crc, ntlmssp_state->ntlmv1_seq_num)) { sig 134 source3/libsmb/ntlmssp_sign.c arcfour_crypt_sbox(&ntlmssp_state->ntlmv1_arc4_state, sig->data+4, sig->length-4); sig 142 source3/libsmb/ntlmssp_sign.c DATA_BLOB *sig) sig 159 source3/libsmb/ntlmssp_sign.c NTLMSSP_SEND, sig, True); sig 173 source3/libsmb/ntlmssp_sign.c const DATA_BLOB *sig) sig 183 source3/libsmb/ntlmssp_sign.c if (sig->length < 8) { sig 185 source3/libsmb/ntlmssp_sign.c (unsigned long)sig->length)); sig 200 source3/libsmb/ntlmssp_sign.c if (local_sig.length != sig->length || sig 201 source3/libsmb/ntlmssp_sign.c memcmp(local_sig.data, sig->data, sig->length) != 0) { sig 206 source3/libsmb/ntlmssp_sign.c dump_data(5, sig->data, sig->length); sig 213 source3/libsmb/ntlmssp_sign.c if (local_sig.length != sig->length || sig 214 source3/libsmb/ntlmssp_sign.c memcmp(local_sig.data + 8, sig->data + 8, sig->length - 8) != 0) { sig 219 source3/libsmb/ntlmssp_sign.c dump_data(5, sig->data, sig->length); sig 226 source3/libsmb/ntlmssp_sign.c dump_data_pw("checked ntlmssp signature\n", sig->data, sig->length); sig 241 source3/libsmb/ntlmssp_sign.c DATA_BLOB *sig) sig 262 source3/libsmb/ntlmssp_sign.c NTLMSSP_SEND, sig, False); sig 269 source3/libsmb/ntlmssp_sign.c arcfour_crypt_sbox(&ntlmssp_state->send_seal_arc4_state, sig->data+4, 8); sig 274 source3/libsmb/ntlmssp_sign.c if (!msrpc_gen(sig, "dddd", NTLMSSP_SIGN_VERSION, 0, crc, ntlmssp_state->ntlmv1_seq_num)) { sig 289 source3/libsmb/ntlmssp_sign.c arcfour_crypt_sbox(&ntlmssp_state->ntlmv1_arc4_state, sig->data+4, sig->length-4); sig 293 source3/libsmb/ntlmssp_sign.c dump_data_pw("ntlmssp signature\n", sig->data, sig->length); sig 307 source3/libsmb/ntlmssp_sign.c DATA_BLOB *sig) sig 325 source3/libsmb/ntlmssp_sign.c return ntlmssp_check_packet(ntlmssp_state, data, length, whole_pdu, pdu_length, sig); sig 68 source3/libsmb/smb_seal.c DATA_BLOB sig; sig 80 source3/libsmb/smb_seal.c sig = data_blob_const(inbuf+8, NTLMSSP_SIG_SIZE); sig 87 source3/libsmb/smb_seal.c &sig); sig 118 source3/libsmb/smb_seal.c DATA_BLOB sig; sig 139 source3/libsmb/smb_seal.c ZERO_STRUCT(sig); sig 146 source3/libsmb/smb_seal.c &sig); sig 149 source3/libsmb/smb_seal.c data_blob_free(&sig); sig 155 source3/libsmb/smb_seal.c memcpy(buf_out + 8, sig.data, NTLMSSP_SIG_SIZE); sig 156 source3/libsmb/smb_seal.c data_blob_free(&sig); sig 116 source3/nmbd/asyncdns.c static void sig_term(int sig) sig 1407 source3/rpc_parse/parse_prs.c MD5Update(&ctx3, verf->sig, sizeof(verf->sig)); sig 1480 source3/rpc_parse/parse_prs.c const uchar sig[8], sig 1487 source3/rpc_parse/parse_prs.c memcpy(chk->sig, sig, sizeof(chk->sig)); sig 1637 source3/rpc_parse/parse_prs.c if (memcmp(verf->sig, schannel_sig, sizeof(verf->sig))) { sig 1640 source3/rpc_parse/parse_prs.c dump_data(2, verf->sig, sizeof(verf->sig)); sig 626 source3/rpc_parse/parse_rpc.c if ( !prs_uint8s(False, "sig ", ps, depth, chk->sig, sizeof(chk->sig)) ) sig 28 source3/script/tests/timelimit.c static void sig_alrm_kill(int sig) sig 35 source3/script/tests/timelimit.c static void sig_alrm_term(int sig) sig 42 source3/script/tests/timelimit.c static void sig_term(int sig) sig 49 source3/script/tests/timelimit.c static void sig_usr1(int sig) sig 157 source3/smbd/server.c int sig; sig 159 source3/smbd/server.c if (data->length != sizeof(sig)) { sig 166 source3/smbd/server.c sig = *(int *)data->data; sig 167 source3/smbd/server.c if (sig == -1) { sig 174 source3/smbd/server.c procid_str_static(&src), sig, strsignal(sig))); sig 177 source3/smbd/server.c procid_str_static(&src), sig)); sig 180 source3/smbd/server.c kill(sys_getpid(), sig); sig 108 source3/torture/nbio.c static void sigsegv(int sig) sig 331 source3/utils/smbcontrol.c int sig = 0; sig 334 source3/utils/smbcontrol.c sig = SIGBUS; sig 336 source3/utils/smbcontrol.c sig = SIGHUP; sig 338 source3/utils/smbcontrol.c sig = SIGTERM; sig 340 source3/utils/smbcontrol.c sig = SIGSEGV; sig 343 source3/utils/smbcontrol.c sig = -1; sig 350 source3/utils/smbcontrol.c &sig, sizeof(int)); sig 70 source3/utils/smbget.c static void change_columns(int sig) sig 820 source4/auth/gensec/gensec.c const DATA_BLOB *sig) sig 832 source4/auth/gensec/gensec.c sig); sig 839 source4/auth/gensec/gensec.c const DATA_BLOB *sig) sig 848 source4/auth/gensec/gensec.c return gensec_security->ops->check_packet(gensec_security, mem_ctx, data, length, whole_pdu, pdu_length, sig); sig 855 source4/auth/gensec/gensec.c DATA_BLOB *sig) sig 864 source4/auth/gensec/gensec.c return gensec_security->ops->seal_packet(gensec_security, mem_ctx, data, length, whole_pdu, pdu_length, sig); sig 871 source4/auth/gensec/gensec.c DATA_BLOB *sig) sig 880 source4/auth/gensec/gensec.c return gensec_security->ops->sign_packet(gensec_security, mem_ctx, data, length, whole_pdu, pdu_length, sig); sig 108 source4/auth/gensec/gensec.h DATA_BLOB *sig); sig 112 source4/auth/gensec/gensec.h DATA_BLOB *sig); sig 119 source4/auth/gensec/gensec.h const DATA_BLOB *sig); sig 123 source4/auth/gensec/gensec.h const DATA_BLOB *sig); sig 259 source4/auth/gensec/gensec.h const DATA_BLOB *sig); sig 264 source4/auth/gensec/gensec.h const DATA_BLOB *sig); sig 270 source4/auth/gensec/gensec.h DATA_BLOB *sig); sig 275 source4/auth/gensec/gensec.h DATA_BLOB *sig); sig 927 source4/auth/gensec/gensec_gssapi.c DATA_BLOB *sig) sig 960 source4/auth/gensec/gensec_gssapi.c *sig = data_blob_talloc(mem_ctx, (uint8_t *)output_token.value, sig_length); sig 962 source4/auth/gensec/gensec_gssapi.c dump_data_pw("gensec_gssapi_seal_packet: sig\n", sig->data, sig->length); sig 979 source4/auth/gensec/gensec_gssapi.c const DATA_BLOB *sig) sig 989 source4/auth/gensec/gensec_gssapi.c dump_data_pw("gensec_gssapi_unseal_packet: sig\n", sig->data, sig->length); sig 991 source4/auth/gensec/gensec_gssapi.c in = data_blob_talloc(mem_ctx, NULL, sig->length + length); sig 993 source4/auth/gensec/gensec_gssapi.c memcpy(in.data, sig->data, sig->length); sig 994 source4/auth/gensec/gensec_gssapi.c memcpy(in.data + sig->length, data, length); sig 1030 source4/auth/gensec/gensec_gssapi.c DATA_BLOB *sig) sig 1056 source4/auth/gensec/gensec_gssapi.c *sig = data_blob_talloc(mem_ctx, (uint8_t *)output_token.value, output_token.length); sig 1058 source4/auth/gensec/gensec_gssapi.c dump_data_pw("gensec_gssapi_seal_packet: sig\n", sig->data, sig->length); sig 1069 source4/auth/gensec/gensec_gssapi.c const DATA_BLOB *sig) sig 1078 source4/auth/gensec/gensec_gssapi.c dump_data_pw("gensec_gssapi_seal_packet: sig\n", sig->data, sig->length); sig 1088 source4/auth/gensec/gensec_gssapi.c input_token.length = sig->length; sig 1089 source4/auth/gensec/gensec_gssapi.c input_token.value = sig->data; sig 108 source4/auth/gensec/schannel_sign.c const DATA_BLOB *sig) sig 118 source4/auth/gensec/schannel_sign.c if (sig->length != 32) { sig 122 source4/auth/gensec/schannel_sign.c memcpy(confounder, sig->data+24, 8); sig 135 source4/auth/gensec/schannel_sign.c if (memcmp(digest_final, sig->data+16, 8) != 0) { sig 137 source4/auth/gensec/schannel_sign.c dump_data_pw("wire digest:", sig->data+16, 8); sig 143 source4/auth/gensec/schannel_sign.c if (memcmp(seq_num, sig->data+8, 8) != 0) { sig 145 source4/auth/gensec/schannel_sign.c dump_data_pw("wire seq num:", sig->data+8, 8); sig 159 source4/auth/gensec/schannel_sign.c const DATA_BLOB *sig) sig 168 source4/auth/gensec/schannel_sign.c if (sig->length != 32 && sig->length != 24) { sig 184 source4/auth/gensec/schannel_sign.c if (memcmp(seq_num, sig->data+8, 8) != 0) { sig 186 source4/auth/gensec/schannel_sign.c dump_data_pw("wire seq num:", sig->data+8, 8); sig 190 source4/auth/gensec/schannel_sign.c if (memcmp(digest_final, sig->data+16, 8) != 0) { sig 192 source4/auth/gensec/schannel_sign.c dump_data_pw("wire digest:", sig->data+16, 8); sig 207 source4/auth/gensec/schannel_sign.c DATA_BLOB *sig) sig 232 source4/auth/gensec/schannel_sign.c (*sig) = data_blob_talloc(mem_ctx, NULL, 32); sig 234 source4/auth/gensec/schannel_sign.c memcpy(sig->data, netsec_sig, 8); sig 235 source4/auth/gensec/schannel_sign.c memcpy(sig->data+8, seq_num, 8); sig 236 source4/auth/gensec/schannel_sign.c memcpy(sig->data+16, digest_final, 8); sig 237 source4/auth/gensec/schannel_sign.c memcpy(sig->data+24, confounder, 8); sig 239 source4/auth/gensec/schannel_sign.c dump_data_pw("signature:", sig->data+ 0, 8); sig 240 source4/auth/gensec/schannel_sign.c dump_data_pw("seq_num :", sig->data+ 8, 8); sig 241 source4/auth/gensec/schannel_sign.c dump_data_pw("digest :", sig->data+16, 8); sig 242 source4/auth/gensec/schannel_sign.c dump_data_pw("confound :", sig->data+24, 8); sig 255 source4/auth/gensec/schannel_sign.c DATA_BLOB *sig) sig 272 source4/auth/gensec/schannel_sign.c (*sig) = data_blob_talloc(mem_ctx, NULL, 32); sig 274 source4/auth/gensec/schannel_sign.c memcpy(sig->data, netsec_sig, 8); sig 275 source4/auth/gensec/schannel_sign.c memcpy(sig->data+8, seq_num, 8); sig 276 source4/auth/gensec/schannel_sign.c memcpy(sig->data+16, digest_final, 8); sig 277 source4/auth/gensec/schannel_sign.c memset(sig->data+24, 0, 8); sig 279 source4/auth/gensec/schannel_sign.c dump_data_pw("signature:", sig->data+ 0, 8); sig 280 source4/auth/gensec/schannel_sign.c dump_data_pw("seq_num :", sig->data+ 8, 8); sig 281 source4/auth/gensec/schannel_sign.c dump_data_pw("digest :", sig->data+16, 8); sig 282 source4/auth/gensec/schannel_sign.c dump_data_pw("confound :", sig->data+24, 8); sig 98 source4/auth/gensec/spnego.c const DATA_BLOB *sig) sig 111 source4/auth/gensec/spnego.c sig); sig 118 source4/auth/gensec/spnego.c const DATA_BLOB *sig) sig 131 source4/auth/gensec/spnego.c sig); sig 138 source4/auth/gensec/spnego.c DATA_BLOB *sig) sig 151 source4/auth/gensec/spnego.c sig); sig 158 source4/auth/gensec/spnego.c DATA_BLOB *sig) sig 171 source4/auth/gensec/spnego.c sig); sig 36 source4/auth/kerberos/kerberos_pac.c struct PAC_SIGNATURE_DATA *sig, sig 44 source4/auth/kerberos/kerberos_pac.c cksum.cksumtype = (CKSUMTYPE)sig->type; sig 45 source4/auth/kerberos/kerberos_pac.c cksum.checksum.length = sig->signature.length; sig 46 source4/auth/kerberos/kerberos_pac.c cksum.checksum.data = sig->signature.data; sig 385 source4/auth/kerberos/kerberos_pac.c struct PAC_SIGNATURE_DATA *sig, sig 421 source4/auth/kerberos/kerberos_pac.c sig->type = cksum.cksumtype; sig 422 source4/auth/kerberos/kerberos_pac.c sig->signature = data_blob_talloc(mem_ctx, cksum.checksum.data, cksum.checksum.length); sig 68 source4/auth/ntlmssp/ntlmssp_sign.c DATA_BLOB *sig, bool encrypt_sig) sig 76 source4/auth/ntlmssp/ntlmssp_sign.c *sig = data_blob_talloc(sig_mem_ctx, NULL, NTLMSSP_SIG_SIZE); sig 77 source4/auth/ntlmssp/ntlmssp_sign.c if (!sig->data) { sig 110 source4/auth/ntlmssp/ntlmssp_sign.c SIVAL(sig->data, 0, NTLMSSP_SIGN_VERSION); sig 111 source4/auth/ntlmssp/ntlmssp_sign.c memcpy(sig->data + 4, digest, 8); sig 112 source4/auth/ntlmssp/ntlmssp_sign.c memcpy(sig->data + 12, seq_num, 4); sig 115 source4/auth/ntlmssp/ntlmssp_sign.c dump_data(11, sig->data, sig->length); sig 121 source4/auth/ntlmssp/ntlmssp_sign.c sig, "dddd", NTLMSSP_SIGN_VERSION, 0, crc, gensec_ntlmssp_state->crypt.ntlm.seq_num)) { sig 126 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm.arcfour_state, sig->data+4, sig->length-4); sig 129 source4/auth/ntlmssp/ntlmssp_sign.c dump_data(11, sig->data, sig->length); sig 139 source4/auth/ntlmssp/ntlmssp_sign.c DATA_BLOB *sig) sig 146 source4/auth/ntlmssp/ntlmssp_sign.c NTLMSSP_SEND, sig, true); sig 158 source4/auth/ntlmssp/ntlmssp_sign.c const DATA_BLOB *sig) sig 181 source4/auth/ntlmssp/ntlmssp_sign.c if (local_sig.length != sig->length || sig 183 source4/auth/ntlmssp/ntlmssp_sign.c sig->data, sig->length) != 0) { sig 188 source4/auth/ntlmssp/ntlmssp_sign.c dump_data(5, sig->data, sig->length); sig 194 source4/auth/ntlmssp/ntlmssp_sign.c if (local_sig.length != sig->length || sig 196 source4/auth/ntlmssp/ntlmssp_sign.c sig->data + 8, sig->length - 8) != 0) { sig 201 source4/auth/ntlmssp/ntlmssp_sign.c dump_data(5, sig->data, sig->length); sig 207 source4/auth/ntlmssp/ntlmssp_sign.c dump_data_pw("checked ntlmssp signature\n", sig->data, sig->length); sig 222 source4/auth/ntlmssp/ntlmssp_sign.c DATA_BLOB *sig) sig 240 source4/auth/ntlmssp/ntlmssp_sign.c NTLMSSP_SEND, sig, false); sig 243 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, sig->data+4, 8); sig 249 source4/auth/ntlmssp/ntlmssp_sign.c sig, "dddd", NTLMSSP_SIGN_VERSION, 0, crc, gensec_ntlmssp_state->crypt.ntlm.seq_num)) { sig 260 source4/auth/ntlmssp/ntlmssp_sign.c arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm.arcfour_state, sig->data+4, sig->length-4); sig 265 source4/auth/ntlmssp/ntlmssp_sign.c dump_data_pw("ntlmssp signature\n", sig->data, sig->length); sig 284 source4/auth/ntlmssp/ntlmssp_sign.c const DATA_BLOB *sig) sig 299 source4/auth/ntlmssp/ntlmssp_sign.c return gensec_ntlmssp_check_packet(gensec_security, sig_mem_ctx, data, length, whole_pdu, pdu_length, sig); sig 456 source4/auth/ntlmssp/ntlmssp_sign.c DATA_BLOB sig; sig 472 source4/auth/ntlmssp/ntlmssp_sign.c &sig); sig 475 source4/auth/ntlmssp/ntlmssp_sign.c memcpy(out->data, sig.data, NTLMSSP_SIG_SIZE); sig 492 source4/auth/ntlmssp/ntlmssp_sign.c &sig); sig 495 source4/auth/ntlmssp/ntlmssp_sign.c memcpy(out->data, sig.data, NTLMSSP_SIG_SIZE); sig 511 source4/auth/ntlmssp/ntlmssp_sign.c DATA_BLOB sig; sig 517 source4/auth/ntlmssp/ntlmssp_sign.c sig.data = in->data; sig 518 source4/auth/ntlmssp/ntlmssp_sign.c sig.length = NTLMSSP_SIG_SIZE; sig 525 source4/auth/ntlmssp/ntlmssp_sign.c &sig); sig 531 source4/auth/ntlmssp/ntlmssp_sign.c sig.data = in->data; sig 532 source4/auth/ntlmssp/ntlmssp_sign.c sig.length = NTLMSSP_SIG_SIZE; sig 539 source4/auth/ntlmssp/ntlmssp_sign.c &sig); sig 44 source4/client/cifsdd.c static void dd_handle_signal(int sig) sig 46 source4/client/cifsdd.c switch (sig) sig 55 source4/client/smbmount.c static void exit_parent(int sig) sig 122 source4/heimdal/lib/hcrypto/dsa.c const unsigned char *sig, int sig_len, DSA *dsa) sig 57 source4/heimdal/lib/hcrypto/rand-timer.c sigALRM(int sig) sig 87 source4/heimdal/lib/hcrypto/rand-timer.c (*fake_signal(int sig, RETSIGTYPE (*f)(int)))(int) sig 93 source4/heimdal/lib/hcrypto/rand-timer.c sigaction(sig, &sa, &osa); sig 51 source4/heimdal/lib/hcrypto/ui.c intr(int sig) sig 2296 source4/heimdal/lib/hx509/cert.c const heim_octet_string *sig) sig 2298 source4/heimdal/lib/hx509/cert.c return _hx509_verify_signature(context, signer->data, alg, data, sig); sig 1197 source4/heimdal/lib/hx509/cms.c heim_octet_string sig; sig 1210 source4/heimdal/lib/hx509/cms.c &sig); sig 1217 source4/heimdal/lib/hx509/cms.c &sig, sig 1220 source4/heimdal/lib/hx509/cms.c der_free_octet_string(&sig); sig 197 source4/heimdal/lib/hx509/crypto.c const heim_octet_string *sig) sig 244 source4/heimdal/lib/hx509/crypto.c retsize = RSA_public_decrypt(sig->length, (unsigned char *)sig->data, sig 319 source4/heimdal/lib/hx509/crypto.c heim_octet_string *sig) sig 386 source4/heimdal/lib/hx509/crypto.c sig->length = RSA_size(signer->private_key.rsa); sig 387 source4/heimdal/lib/hx509/crypto.c sig->data = malloc(sig->length); sig 388 source4/heimdal/lib/hx509/crypto.c if (sig->data == NULL) { sig 395 source4/heimdal/lib/hx509/crypto.c sig->data, sig 406 source4/heimdal/lib/hx509/crypto.c if (ret > sig->length) sig 409 source4/heimdal/lib/hx509/crypto.c sig->length = ret; sig 579 source4/heimdal/lib/hx509/crypto.c const heim_octet_string *sig) sig 640 source4/heimdal/lib/hx509/crypto.c (unsigned char*)sig->data, sig->length, sig 688 source4/heimdal/lib/hx509/crypto.c const heim_octet_string *sig) sig 693 source4/heimdal/lib/hx509/crypto.c if (sig->length != SHA_DIGEST_LENGTH) { sig 703 source4/heimdal/lib/hx509/crypto.c if (memcmp(digest, sig->data, SHA_DIGEST_LENGTH) != 0) { sig 719 source4/heimdal/lib/hx509/crypto.c heim_octet_string *sig) sig 723 source4/heimdal/lib/hx509/crypto.c memset(sig, 0, sizeof(*sig)); sig 734 source4/heimdal/lib/hx509/crypto.c sig->data = malloc(SHA256_DIGEST_LENGTH); sig 735 source4/heimdal/lib/hx509/crypto.c if (sig->data == NULL) { sig 736 source4/heimdal/lib/hx509/crypto.c sig->length = 0; sig 739 source4/heimdal/lib/hx509/crypto.c sig->length = SHA256_DIGEST_LENGTH; sig 743 source4/heimdal/lib/hx509/crypto.c SHA256_Final (sig->data, &m); sig 754 source4/heimdal/lib/hx509/crypto.c const heim_octet_string *sig) sig 759 source4/heimdal/lib/hx509/crypto.c if (sig->length != SHA256_DIGEST_LENGTH) { sig 769 source4/heimdal/lib/hx509/crypto.c if (memcmp(digest, sig->data, SHA256_DIGEST_LENGTH) != 0) { sig 785 source4/heimdal/lib/hx509/crypto.c heim_octet_string *sig) sig 789 source4/heimdal/lib/hx509/crypto.c memset(sig, 0, sizeof(*sig)); sig 800 source4/heimdal/lib/hx509/crypto.c sig->data = malloc(SHA_DIGEST_LENGTH); sig 801 source4/heimdal/lib/hx509/crypto.c if (sig->data == NULL) { sig 802 source4/heimdal/lib/hx509/crypto.c sig->length = 0; sig 805 source4/heimdal/lib/hx509/crypto.c sig->length = SHA_DIGEST_LENGTH; sig 809 source4/heimdal/lib/hx509/crypto.c SHA1_Final (sig->data, &m); sig 820 source4/heimdal/lib/hx509/crypto.c const heim_octet_string *sig) sig 825 source4/heimdal/lib/hx509/crypto.c if (sig->length != MD5_DIGEST_LENGTH) { sig 835 source4/heimdal/lib/hx509/crypto.c if (memcmp(digest, sig->data, MD5_DIGEST_LENGTH) != 0) { sig 850 source4/heimdal/lib/hx509/crypto.c const heim_octet_string *sig) sig 855 source4/heimdal/lib/hx509/crypto.c if (sig->length != MD2_DIGEST_LENGTH) { sig 865 source4/heimdal/lib/hx509/crypto.c if (memcmp(digest, sig->data, MD2_DIGEST_LENGTH) != 0) { sig 1051 source4/heimdal/lib/hx509/crypto.c const heim_octet_string *sig) sig 1077 source4/heimdal/lib/hx509/crypto.c return (*md->verify_signature)(context, md, signer, alg, data, sig); sig 1085 source4/heimdal/lib/hx509/crypto.c const heim_bit_string *sig) sig 1089 source4/heimdal/lib/hx509/crypto.c if (sig->length & 7) { sig 1095 source4/heimdal/lib/hx509/crypto.c os.data = sig->data; sig 1096 source4/heimdal/lib/hx509/crypto.c os.length = sig->length / 8; sig 1107 source4/heimdal/lib/hx509/crypto.c heim_octet_string *sig) sig 1115 source4/heimdal/lib/hx509/crypto.c signatureAlgorithm, sig); sig 1132 source4/heimdal/lib/hx509/crypto.c signatureAlgorithm, sig); sig 1141 source4/heimdal/lib/hx509/crypto.c heim_bit_string *sig) sig 1150 source4/heimdal/lib/hx509/crypto.c sig->data = os.data; sig 1151 source4/heimdal/lib/hx509/crypto.c sig->length = os.length * 8; sig 119 source4/heimdal/lib/hx509/ks_keychain.c CSSM_DATA sig, in; sig 140 source4/heimdal/lib/hx509/ks_keychain.c sig.Data = (uint8 *)to; sig 141 source4/heimdal/lib/hx509/ks_keychain.c sig.Length = kc->keysize; sig 143 source4/heimdal/lib/hx509/ks_keychain.c cret = CSSM_SignData(sigHandle, &in, 1, CSSM_ALGID_NONE, &sig); sig 148 source4/heimdal/lib/hx509/ks_keychain.c fret = sig.Length; sig 412 source4/heimdal/lib/krb5/pac.c const struct PAC_INFO_BUFFER *sig, sig 425 source4/heimdal/lib/krb5/pac.c sp = krb5_storage_from_mem((char *)data->data + sig->offset_lo, sig 426 source4/heimdal/lib/krb5/pac.c sig->buffersize); sig 436 source4/heimdal/lib/krb5/pac.c sig->buffersize - krb5_storage_seek(sp, 0, SEEK_CUR); sig 483 source4/heimdal/lib/krb5/pac.c void *sig, size_t siglen) sig 505 source4/heimdal/lib/krb5/pac.c memcpy(sig, cksum.checksum.data, siglen); sig 408 source4/heimdal/lib/ntlm/ntlm.c unsigned char sig[8]; sig 422 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_storage_read(in, sig, sizeof(sig)), sizeof(sig)); sig 423 source4/heimdal/lib/ntlm/ntlm.c CHECK(memcmp(ntlmsigature, sig, sizeof(ntlmsigature)), 0); sig 552 source4/heimdal/lib/ntlm/ntlm.c unsigned char sig[8]; sig 567 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_storage_read(in, sig, sizeof(sig)), sizeof(sig)); sig 568 source4/heimdal/lib/ntlm/ntlm.c CHECK(memcmp(ntlmsigature, sig, sizeof(ntlmsigature)), 0); sig 708 source4/heimdal/lib/ntlm/ntlm.c unsigned char sig[8]; sig 723 source4/heimdal/lib/ntlm/ntlm.c CHECK(krb5_storage_read(in, sig, sizeof(sig)), sizeof(sig)); sig 724 source4/heimdal/lib/ntlm/ntlm.c CHECK(memcmp(ntlmsigature, sig, sizeof(ntlmsigature)), 0); sig 69 source4/heimdal/lib/roken/resolve.c DECL(sig), sig 296 source4/heimdal/lib/roken/resolve.c rr->u.sig = malloc(sizeof(*rr->u.sig) sig 298 source4/heimdal/lib/roken/resolve.c if (rr->u.sig == NULL) { sig 302 source4/heimdal/lib/roken/resolve.c rr->u.sig->type = (p[0] << 8) | p[1]; sig 303 source4/heimdal/lib/roken/resolve.c rr->u.sig->algorithm = p[2]; sig 304 source4/heimdal/lib/roken/resolve.c rr->u.sig->labels = p[3]; sig 305 source4/heimdal/lib/roken/resolve.c rr->u.sig->orig_ttl = (p[4] << 24) | (p[5] << 16) sig 307 source4/heimdal/lib/roken/resolve.c rr->u.sig->sig_expiration = (p[8] << 24) | (p[9] << 16) sig 309 source4/heimdal/lib/roken/resolve.c rr->u.sig->sig_inception = (p[12] << 24) | (p[13] << 16) sig 311 source4/heimdal/lib/roken/resolve.c rr->u.sig->key_tag = (p[16] << 8) | p[17]; sig 312 source4/heimdal/lib/roken/resolve.c rr->u.sig->sig_len = sig_len; sig 313 source4/heimdal/lib/roken/resolve.c memcpy (rr->u.sig->sig_data, p + 18 + status, sig_len); sig 314 source4/heimdal/lib/roken/resolve.c rr->u.sig->signer = &rr->u.sig->sig_data[sig_len]; sig 315 source4/heimdal/lib/roken/resolve.c strlcpy(rr->u.sig->signer, host, hostlen + 1); sig 253 source4/heimdal/lib/roken/resolve.h struct sig_record *sig; sig 82 source4/heimdal/lib/roken/simple_exec.c sigtimeout(int sig) sig 92 source4/heimdal/lib/roken/simple_exec.c RETSIGTYPE (*old_func)(int sig) = NULL; sig 78 source4/libcli/smb2/signing.c uint8_t sig[16]; sig 97 source4/libcli/smb2/signing.c memcpy(sig, buf->hdr+SMB2_HDR_SIGNATURE, 16); sig 106 source4/libcli/smb2/signing.c memcpy(buf->hdr+SMB2_HDR_SIGNATURE, sig, 16); sig 108 source4/libcli/smb2/signing.c if (memcmp(res, sig, 16) != 0) { sig 111 source4/libcli/smb2/signing.c dump_data(0, sig, 16); sig 445 source4/smbd/process_thread.c static void thread_sig_fault(int sig) sig 449 source4/smbd/process_thread.c sig,(uint32_t)pthread_self(), sig 475 source4/smbd/process_thread.c static void thread_fault_handler(int sig) sig 486 source4/smbd/process_thread.c sig,(uint32_t)pthread_self(), sig 100 source4/smbd/server.c static void sig_hup(int sig) sig 105 source4/smbd/server.c static void sig_term(int sig) sig 33 source4/torture/auth/ntlmssp.c DATA_BLOB sig, expected_sig; sig 65 source4/torture/auth/ntlmssp.c data.data, data.length, data.data, data.length, &sig); sig 69 source4/torture/auth/ntlmssp.c dump_data_pw("NTLMSSP calc sig: ", sig.data, sig.length); sig 72 source4/torture/auth/ntlmssp.c torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length"); sig 74 source4/torture/auth/ntlmssp.c torture_assert_mem_equal(tctx, sig.data, expected_sig.data, sig.length, sig 79 source4/torture/auth/ntlmssp.c data.data, data.length, data.data, data.length, &sig), sig 86 source4/torture/auth/ntlmssp.c data.data, data.length, data.data, data.length, &sig), sig 120 source4/torture/auth/ntlmssp.c data.data, data.length, data.data, data.length, &sig); sig 124 source4/torture/auth/ntlmssp.c dump_data_pw("NTLMSSP calc sig: ", sig.data, sig.length); sig 127 source4/torture/auth/ntlmssp.c torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length"); sig 129 source4/torture/auth/ntlmssp.c torture_assert_mem_equal(tctx, sig.data+8, expected_sig.data+8, sig.length-8, sig 134 source4/torture/auth/ntlmssp.c data.data, data.length, data.data, data.length, &sig), sig 137 source4/torture/auth/ntlmssp.c sig.length /= 2; sig 141 source4/torture/auth/ntlmssp.c data.data, data.length, data.data, data.length, &sig), sig 251 source4/torture/nbench/nbio.c void nb_alarm(int sig) sig 306 source4/torture/smbtorture.c _NORETURN_ static void max_runtime_handler(int sig) sig 610 source4/torture/util_smb.c static void sigcont(int sig)