sig                33 lib/util/fault.c 	void (*fault_handler)(int sig);
sig               156 lib/util/fault.c _NORETURN_ static void fault_report(int sig)
sig               163 lib/util/fault.c 	DEBUG(0,("INTERNAL ERROR: Signal %d in pid %d (%s)",sig,(int)getpid(),SAMBA_VERSION_STRING));
sig               175 lib/util/fault.c _NORETURN_ static void sig_fault(int sig)
sig               179 lib/util/fault.c 		fault_handlers.fault_handler(sig);
sig               182 lib/util/fault.c 	fault_report(sig);
sig               212 lib/util/fault.c 				     void (*fault_handler)(int sig))
sig                99 lib/util/util.h _PUBLIC_ bool register_fault_handler(const char *name, void (*fault_handler)(int sig));
sig                53 source3/client/mtab.c handler (int sig) {
sig                58 source3/client/mtab.c setlkw_timeout (int sig) {
sig               122 source3/client/mtab.c 		int sig = 0;
sig               129 source3/client/mtab.c 		while (sigismember (&sa.sa_mask, ++sig) != -1
sig               130 source3/client/mtab.c 		       && sig != SIGCHLD) {
sig               131 source3/client/mtab.c 			if (sig == SIGALRM)
sig               135 source3/client/mtab.c 			sigaction (sig, &sa, (struct sigaction *) 0);
sig               960 source3/include/includes.h 				    struct PAC_SIGNATURE_DATA *sig);
sig              3135 source3/include/proto.h 				    DATA_BLOB *sig) ;
sig              3139 source3/include/proto.h 				const DATA_BLOB *sig) ;
sig              3143 source3/include/proto.h 			     DATA_BLOB *sig);
sig              3147 source3/include/proto.h 				DATA_BLOB *sig);
sig               251 source3/include/rpc_dce.h 	uint8 sig  [8]; /* 77 00 7a 00 ff ff 00 00 */
sig                38 source3/lib/fault.c static void fault_report(int sig)
sig                47 source3/lib/fault.c 	DEBUG(0,("INTERNAL ERROR: Signal %d in pid %d (%s)",sig,(int)sys_getpid(),samba_version_string()));
sig                73 source3/lib/fault.c static void sig_fault(int sig)
sig                75 source3/lib/fault.c 	fault_report(sig);
sig                35 source3/libads/authdata.c 					  struct PAC_SIGNATURE_DATA *sig,
sig                43 source3/libads/authdata.c 	smb_krb5_checksum_from_pac_sig(&cksum, sig);
sig                30 source3/libads/sasl.c 	DATA_BLOB sig;
sig                41 source3/libads/sasl.c 						&sig);
sig                46 source3/libads/sasl.c 						&sig);
sig                53 source3/libads/sasl.c 	       sig.data, NTLMSSP_SIG_SIZE);
sig                55 source3/libads/sasl.c 	data_blob_free(&sig);
sig                69 source3/libads/sasl.c 	DATA_BLOB sig;
sig                74 source3/libads/sasl.c 	sig = data_blob_const(ads->ldap.in.buf + 4, NTLMSSP_SIG_SIZE);
sig                81 source3/libads/sasl.c 						  &sig);
sig                86 source3/libads/sasl.c 						 &sig);
sig               937 source3/libsmb/clikrb5.c 				     struct PAC_SIGNATURE_DATA *sig)
sig               940 source3/libsmb/clikrb5.c 	cksum->cksumtype	= (krb5_cksumtype)sig->type;
sig               941 source3/libsmb/clikrb5.c 	cksum->checksum.length	= sig->signature.length;
sig               942 source3/libsmb/clikrb5.c 	cksum->checksum.data	= sig->signature.data;
sig               944 source3/libsmb/clikrb5.c 	cksum->checksum_type	= (krb5_cksumtype)sig->type;
sig               945 source3/libsmb/clikrb5.c 	cksum->length		= sig->signature.length;
sig               946 source3/libsmb/clikrb5.c 	cksum->contents		= sig->signature.data;
sig                64 source3/libsmb/ntlmssp_sign.c 						DATA_BLOB *sig,
sig                72 source3/libsmb/ntlmssp_sign.c 		*sig = data_blob(NULL, NTLMSSP_SIG_SIZE);
sig                73 source3/libsmb/ntlmssp_sign.c 		if (!sig->data) {
sig               118 source3/libsmb/ntlmssp_sign.c 		SIVAL(sig->data, 0, NTLMSSP_SIGN_VERSION);
sig               119 source3/libsmb/ntlmssp_sign.c 		memcpy(sig->data + 4, digest, 8);
sig               120 source3/libsmb/ntlmssp_sign.c 		memcpy(sig->data + 12, seq_num, 4);
sig               122 source3/libsmb/ntlmssp_sign.c 		dump_data_pw("ntlmssp v2 sig ", sig->data, sig->length);
sig               127 source3/libsmb/ntlmssp_sign.c 		if (!msrpc_gen(sig, "dddd", NTLMSSP_SIGN_VERSION, 0, crc, ntlmssp_state->ntlmv1_seq_num)) {
sig               134 source3/libsmb/ntlmssp_sign.c 		arcfour_crypt_sbox(&ntlmssp_state->ntlmv1_arc4_state, sig->data+4, sig->length-4);
sig               142 source3/libsmb/ntlmssp_sign.c 				    DATA_BLOB *sig) 
sig               159 source3/libsmb/ntlmssp_sign.c 						NTLMSSP_SEND, sig, True);
sig               173 source3/libsmb/ntlmssp_sign.c 				const DATA_BLOB *sig) 
sig               183 source3/libsmb/ntlmssp_sign.c 	if (sig->length < 8) {
sig               185 source3/libsmb/ntlmssp_sign.c 			  (unsigned long)sig->length));
sig               200 source3/libsmb/ntlmssp_sign.c 		if (local_sig.length != sig->length ||
sig               201 source3/libsmb/ntlmssp_sign.c 				memcmp(local_sig.data, sig->data, sig->length) != 0) {
sig               206 source3/libsmb/ntlmssp_sign.c 			dump_data(5, sig->data, sig->length);
sig               213 source3/libsmb/ntlmssp_sign.c 		if (local_sig.length != sig->length ||
sig               214 source3/libsmb/ntlmssp_sign.c 				memcmp(local_sig.data + 8, sig->data + 8, sig->length - 8) != 0) {
sig               219 source3/libsmb/ntlmssp_sign.c 			dump_data(5, sig->data, sig->length);
sig               226 source3/libsmb/ntlmssp_sign.c 	dump_data_pw("checked ntlmssp signature\n", sig->data, sig->length);
sig               241 source3/libsmb/ntlmssp_sign.c 			     DATA_BLOB *sig)
sig               262 source3/libsmb/ntlmssp_sign.c 							NTLMSSP_SEND, sig, False);
sig               269 source3/libsmb/ntlmssp_sign.c 			arcfour_crypt_sbox(&ntlmssp_state->send_seal_arc4_state, sig->data+4, 8);
sig               274 source3/libsmb/ntlmssp_sign.c 		if (!msrpc_gen(sig, "dddd", NTLMSSP_SIGN_VERSION, 0, crc, ntlmssp_state->ntlmv1_seq_num)) {
sig               289 source3/libsmb/ntlmssp_sign.c 		arcfour_crypt_sbox(&ntlmssp_state->ntlmv1_arc4_state, sig->data+4, sig->length-4);
sig               293 source3/libsmb/ntlmssp_sign.c 	dump_data_pw("ntlmssp signature\n", sig->data, sig->length);
sig               307 source3/libsmb/ntlmssp_sign.c 				DATA_BLOB *sig)
sig               325 source3/libsmb/ntlmssp_sign.c 	return ntlmssp_check_packet(ntlmssp_state, data, length, whole_pdu, pdu_length, sig);
sig                68 source3/libsmb/smb_seal.c 	DATA_BLOB sig;
sig                80 source3/libsmb/smb_seal.c 	sig = data_blob_const(inbuf+8, NTLMSSP_SIG_SIZE);
sig                87 source3/libsmb/smb_seal.c 		&sig);
sig               118 source3/libsmb/smb_seal.c 	DATA_BLOB sig;
sig               139 source3/libsmb/smb_seal.c 	ZERO_STRUCT(sig);
sig               146 source3/libsmb/smb_seal.c 		&sig);
sig               149 source3/libsmb/smb_seal.c 		data_blob_free(&sig);
sig               155 source3/libsmb/smb_seal.c 	memcpy(buf_out + 8, sig.data, NTLMSSP_SIG_SIZE);
sig               156 source3/libsmb/smb_seal.c 	data_blob_free(&sig);
sig               116 source3/nmbd/asyncdns.c static void sig_term(int sig)
sig              1407 source3/rpc_parse/parse_prs.c 	MD5Update(&ctx3, verf->sig, sizeof(verf->sig));
sig              1480 source3/rpc_parse/parse_prs.c 			      const uchar sig[8],
sig              1487 source3/rpc_parse/parse_prs.c 	memcpy(chk->sig, sig, sizeof(chk->sig));
sig              1637 source3/rpc_parse/parse_prs.c 	if (memcmp(verf->sig, schannel_sig, sizeof(verf->sig))) {
sig              1640 source3/rpc_parse/parse_prs.c 		dump_data(2, verf->sig, sizeof(verf->sig));
sig               626 source3/rpc_parse/parse_rpc.c 	if ( !prs_uint8s(False, "sig  ", ps, depth, chk->sig, sizeof(chk->sig)) )
sig                28 source3/script/tests/timelimit.c static void sig_alrm_kill(int sig)
sig                35 source3/script/tests/timelimit.c static void sig_alrm_term(int sig)
sig                42 source3/script/tests/timelimit.c static void sig_term(int sig)
sig                49 source3/script/tests/timelimit.c static void sig_usr1(int sig)
sig               157 source3/smbd/server.c 	int sig;
sig               159 source3/smbd/server.c 	if (data->length != sizeof(sig)) {
sig               166 source3/smbd/server.c 	sig = *(int *)data->data;
sig               167 source3/smbd/server.c 	if (sig == -1) {
sig               174 source3/smbd/server.c 		  procid_str_static(&src), sig, strsignal(sig)));
sig               177 source3/smbd/server.c 		  procid_str_static(&src), sig));
sig               180 source3/smbd/server.c 	kill(sys_getpid(), sig);
sig               108 source3/torture/nbio.c static void sigsegv(int sig)
sig               331 source3/utils/smbcontrol.c 		int sig = 0;
sig               334 source3/utils/smbcontrol.c 			sig = SIGBUS;
sig               336 source3/utils/smbcontrol.c 			sig = SIGHUP;
sig               338 source3/utils/smbcontrol.c 			sig = SIGTERM;
sig               340 source3/utils/smbcontrol.c 			sig = SIGSEGV;
sig               343 source3/utils/smbcontrol.c 			sig = -1;
sig               350 source3/utils/smbcontrol.c 				    &sig, sizeof(int));
sig                70 source3/utils/smbget.c static void change_columns(int sig)
sig               820 source4/auth/gensec/gensec.c 			      const DATA_BLOB *sig)
sig               832 source4/auth/gensec/gensec.c 						   sig);
sig               839 source4/auth/gensec/gensec.c 			     const DATA_BLOB *sig)
sig               848 source4/auth/gensec/gensec.c 	return gensec_security->ops->check_packet(gensec_security, mem_ctx, data, length, whole_pdu, pdu_length, sig);
sig               855 source4/auth/gensec/gensec.c 			    DATA_BLOB *sig)
sig               864 source4/auth/gensec/gensec.c 	return gensec_security->ops->seal_packet(gensec_security, mem_ctx, data, length, whole_pdu, pdu_length, sig);
sig               871 source4/auth/gensec/gensec.c 			    DATA_BLOB *sig)
sig               880 source4/auth/gensec/gensec.c 	return gensec_security->ops->sign_packet(gensec_security, mem_ctx, data, length, whole_pdu, pdu_length, sig);
sig               108 source4/auth/gensec/gensec.h 				DATA_BLOB *sig);
sig               112 source4/auth/gensec/gensec.h 				DATA_BLOB *sig);
sig               119 source4/auth/gensec/gensec.h 				 const DATA_BLOB *sig);
sig               123 source4/auth/gensec/gensec.h 				  const DATA_BLOB *sig);
sig               259 source4/auth/gensec/gensec.h 			      const DATA_BLOB *sig);
sig               264 source4/auth/gensec/gensec.h 			     const DATA_BLOB *sig);
sig               270 source4/auth/gensec/gensec.h 			    DATA_BLOB *sig);
sig               275 source4/auth/gensec/gensec.h 			    DATA_BLOB *sig);
sig               927 source4/auth/gensec/gensec_gssapi.c 					  DATA_BLOB *sig)
sig               960 source4/auth/gensec/gensec_gssapi.c 	*sig = data_blob_talloc(mem_ctx, (uint8_t *)output_token.value, sig_length);
sig               962 source4/auth/gensec/gensec_gssapi.c 	dump_data_pw("gensec_gssapi_seal_packet: sig\n", sig->data, sig->length);
sig               979 source4/auth/gensec/gensec_gssapi.c 					    const DATA_BLOB *sig)
sig               989 source4/auth/gensec/gensec_gssapi.c 	dump_data_pw("gensec_gssapi_unseal_packet: sig\n", sig->data, sig->length);
sig               991 source4/auth/gensec/gensec_gssapi.c 	in = data_blob_talloc(mem_ctx, NULL, sig->length + length);
sig               993 source4/auth/gensec/gensec_gssapi.c 	memcpy(in.data, sig->data, sig->length);
sig               994 source4/auth/gensec/gensec_gssapi.c 	memcpy(in.data + sig->length, data, length);
sig              1030 source4/auth/gensec/gensec_gssapi.c 					  DATA_BLOB *sig)
sig              1056 source4/auth/gensec/gensec_gssapi.c 	*sig = data_blob_talloc(mem_ctx, (uint8_t *)output_token.value, output_token.length);
sig              1058 source4/auth/gensec/gensec_gssapi.c 	dump_data_pw("gensec_gssapi_seal_packet: sig\n", sig->data, sig->length);
sig              1069 source4/auth/gensec/gensec_gssapi.c 					   const DATA_BLOB *sig)
sig              1078 source4/auth/gensec/gensec_gssapi.c 	dump_data_pw("gensec_gssapi_seal_packet: sig\n", sig->data, sig->length);
sig              1088 source4/auth/gensec/gensec_gssapi.c 	input_token.length = sig->length;
sig              1089 source4/auth/gensec/gensec_gssapi.c 	input_token.value = sig->data;
sig               108 source4/auth/gensec/schannel_sign.c 				const DATA_BLOB *sig)
sig               118 source4/auth/gensec/schannel_sign.c 	if (sig->length != 32) {
sig               122 source4/auth/gensec/schannel_sign.c 	memcpy(confounder, sig->data+24, 8);
sig               135 source4/auth/gensec/schannel_sign.c 	if (memcmp(digest_final, sig->data+16, 8) != 0) {
sig               137 source4/auth/gensec/schannel_sign.c 		dump_data_pw("wire digest:", sig->data+16, 8);
sig               143 source4/auth/gensec/schannel_sign.c 	if (memcmp(seq_num, sig->data+8, 8) != 0) {
sig               145 source4/auth/gensec/schannel_sign.c 		dump_data_pw("wire seq num:", sig->data+8, 8);
sig               159 source4/auth/gensec/schannel_sign.c 			       const DATA_BLOB *sig)
sig               168 source4/auth/gensec/schannel_sign.c 	if (sig->length != 32 && sig->length != 24) {
sig               184 source4/auth/gensec/schannel_sign.c 	if (memcmp(seq_num, sig->data+8, 8) != 0) {
sig               186 source4/auth/gensec/schannel_sign.c 		dump_data_pw("wire seq num:", sig->data+8, 8);
sig               190 source4/auth/gensec/schannel_sign.c 	if (memcmp(digest_final, sig->data+16, 8) != 0) {
sig               192 source4/auth/gensec/schannel_sign.c 		dump_data_pw("wire digest:", sig->data+16, 8);
sig               207 source4/auth/gensec/schannel_sign.c 			      DATA_BLOB *sig)
sig               232 source4/auth/gensec/schannel_sign.c 	(*sig) = data_blob_talloc(mem_ctx, NULL, 32);
sig               234 source4/auth/gensec/schannel_sign.c 	memcpy(sig->data, netsec_sig, 8);
sig               235 source4/auth/gensec/schannel_sign.c 	memcpy(sig->data+8, seq_num, 8);
sig               236 source4/auth/gensec/schannel_sign.c 	memcpy(sig->data+16, digest_final, 8);
sig               237 source4/auth/gensec/schannel_sign.c 	memcpy(sig->data+24, confounder, 8);
sig               239 source4/auth/gensec/schannel_sign.c 	dump_data_pw("signature:", sig->data+ 0, 8);
sig               240 source4/auth/gensec/schannel_sign.c 	dump_data_pw("seq_num  :", sig->data+ 8, 8);
sig               241 source4/auth/gensec/schannel_sign.c 	dump_data_pw("digest   :", sig->data+16, 8);
sig               242 source4/auth/gensec/schannel_sign.c 	dump_data_pw("confound :", sig->data+24, 8);
sig               255 source4/auth/gensec/schannel_sign.c 			      DATA_BLOB *sig)
sig               272 source4/auth/gensec/schannel_sign.c 	(*sig) = data_blob_talloc(mem_ctx, NULL, 32);
sig               274 source4/auth/gensec/schannel_sign.c 	memcpy(sig->data, netsec_sig, 8);
sig               275 source4/auth/gensec/schannel_sign.c 	memcpy(sig->data+8, seq_num, 8);
sig               276 source4/auth/gensec/schannel_sign.c 	memcpy(sig->data+16, digest_final, 8);
sig               277 source4/auth/gensec/schannel_sign.c 	memset(sig->data+24, 0, 8);
sig               279 source4/auth/gensec/schannel_sign.c 	dump_data_pw("signature:", sig->data+ 0, 8);
sig               280 source4/auth/gensec/schannel_sign.c 	dump_data_pw("seq_num  :", sig->data+ 8, 8);
sig               281 source4/auth/gensec/schannel_sign.c 	dump_data_pw("digest   :", sig->data+16, 8);
sig               282 source4/auth/gensec/schannel_sign.c 	dump_data_pw("confound :", sig->data+24, 8);
sig                98 source4/auth/gensec/spnego.c 					    const DATA_BLOB *sig)
sig               111 source4/auth/gensec/spnego.c 				    sig); 
sig               118 source4/auth/gensec/spnego.c 					   const DATA_BLOB *sig)
sig               131 source4/auth/gensec/spnego.c 				   sig);
sig               138 source4/auth/gensec/spnego.c 					  DATA_BLOB *sig)
sig               151 source4/auth/gensec/spnego.c 				  sig);
sig               158 source4/auth/gensec/spnego.c 					  DATA_BLOB *sig)
sig               171 source4/auth/gensec/spnego.c 				  sig);
sig                36 source4/auth/kerberos/kerberos_pac.c 				   struct PAC_SIGNATURE_DATA *sig,
sig                44 source4/auth/kerberos/kerberos_pac.c 	cksum.cksumtype		= (CKSUMTYPE)sig->type;
sig                45 source4/auth/kerberos/kerberos_pac.c 	cksum.checksum.length	= sig->signature.length;
sig                46 source4/auth/kerberos/kerberos_pac.c 	cksum.checksum.data	= sig->signature.data;
sig               385 source4/auth/kerberos/kerberos_pac.c 					 struct PAC_SIGNATURE_DATA *sig,
sig               421 source4/auth/kerberos/kerberos_pac.c 	sig->type = cksum.cksumtype;
sig               422 source4/auth/kerberos/kerberos_pac.c 	sig->signature = data_blob_talloc(mem_ctx, cksum.checksum.data, cksum.checksum.length);
sig                68 source4/auth/ntlmssp/ntlmssp_sign.c 					      DATA_BLOB *sig, bool encrypt_sig)
sig                76 source4/auth/ntlmssp/ntlmssp_sign.c 		*sig = data_blob_talloc(sig_mem_ctx, NULL, NTLMSSP_SIG_SIZE);
sig                77 source4/auth/ntlmssp/ntlmssp_sign.c 		if (!sig->data) {
sig               110 source4/auth/ntlmssp/ntlmssp_sign.c 		SIVAL(sig->data, 0, NTLMSSP_SIGN_VERSION);
sig               111 source4/auth/ntlmssp/ntlmssp_sign.c 		memcpy(sig->data + 4, digest, 8);
sig               112 source4/auth/ntlmssp/ntlmssp_sign.c 		memcpy(sig->data + 12, seq_num, 4);
sig               115 source4/auth/ntlmssp/ntlmssp_sign.c 		dump_data(11, sig->data, sig->length);
sig               121 source4/auth/ntlmssp/ntlmssp_sign.c 			       sig, "dddd", NTLMSSP_SIGN_VERSION, 0, crc, gensec_ntlmssp_state->crypt.ntlm.seq_num)) {
sig               126 source4/auth/ntlmssp/ntlmssp_sign.c 		arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm.arcfour_state, sig->data+4, sig->length-4);
sig               129 source4/auth/ntlmssp/ntlmssp_sign.c 		dump_data(11, sig->data, sig->length);
sig               139 source4/auth/ntlmssp/ntlmssp_sign.c 				    DATA_BLOB *sig)
sig               146 source4/auth/ntlmssp/ntlmssp_sign.c 					     NTLMSSP_SEND, sig, true);
sig               158 source4/auth/ntlmssp/ntlmssp_sign.c 				     const DATA_BLOB *sig)
sig               181 source4/auth/ntlmssp/ntlmssp_sign.c 		if (local_sig.length != sig->length ||
sig               183 source4/auth/ntlmssp/ntlmssp_sign.c 			   sig->data, sig->length) != 0) {
sig               188 source4/auth/ntlmssp/ntlmssp_sign.c 			dump_data(5, sig->data, sig->length);
sig               194 source4/auth/ntlmssp/ntlmssp_sign.c 		if (local_sig.length != sig->length ||
sig               196 source4/auth/ntlmssp/ntlmssp_sign.c 			   sig->data + 8, sig->length - 8) != 0) {
sig               201 source4/auth/ntlmssp/ntlmssp_sign.c 			dump_data(5, sig->data, sig->length);
sig               207 source4/auth/ntlmssp/ntlmssp_sign.c 	dump_data_pw("checked ntlmssp signature\n", sig->data, sig->length);
sig               222 source4/auth/ntlmssp/ntlmssp_sign.c 				    DATA_BLOB *sig)
sig               240 source4/auth/ntlmssp/ntlmssp_sign.c 							  NTLMSSP_SEND, sig, false);
sig               243 source4/auth/ntlmssp/ntlmssp_sign.c 			arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm2.send_seal_arcfour_state, sig->data+4, 8);
sig               249 source4/auth/ntlmssp/ntlmssp_sign.c 			       sig, "dddd", NTLMSSP_SIGN_VERSION, 0, crc, gensec_ntlmssp_state->crypt.ntlm.seq_num)) {
sig               260 source4/auth/ntlmssp/ntlmssp_sign.c 		arcfour_crypt_sbox(gensec_ntlmssp_state->crypt.ntlm.arcfour_state, sig->data+4, sig->length-4);
sig               265 source4/auth/ntlmssp/ntlmssp_sign.c 	dump_data_pw("ntlmssp signature\n", sig->data, sig->length);
sig               284 source4/auth/ntlmssp/ntlmssp_sign.c 				      const DATA_BLOB *sig)
sig               299 source4/auth/ntlmssp/ntlmssp_sign.c 	return gensec_ntlmssp_check_packet(gensec_security, sig_mem_ctx, data, length, whole_pdu, pdu_length, sig);
sig               456 source4/auth/ntlmssp/ntlmssp_sign.c 	DATA_BLOB sig;
sig               472 source4/auth/ntlmssp/ntlmssp_sign.c 						       &sig);
sig               475 source4/auth/ntlmssp/ntlmssp_sign.c 			memcpy(out->data, sig.data, NTLMSSP_SIG_SIZE);
sig               492 source4/auth/ntlmssp/ntlmssp_sign.c 						       &sig);
sig               495 source4/auth/ntlmssp/ntlmssp_sign.c 			memcpy(out->data, sig.data, NTLMSSP_SIG_SIZE);
sig               511 source4/auth/ntlmssp/ntlmssp_sign.c 	DATA_BLOB sig;
sig               517 source4/auth/ntlmssp/ntlmssp_sign.c 		sig.data = in->data;
sig               518 source4/auth/ntlmssp/ntlmssp_sign.c 		sig.length = NTLMSSP_SIG_SIZE;
sig               525 source4/auth/ntlmssp/ntlmssp_sign.c 						    &sig);
sig               531 source4/auth/ntlmssp/ntlmssp_sign.c 		sig.data = in->data;
sig               532 source4/auth/ntlmssp/ntlmssp_sign.c 		sig.length = NTLMSSP_SIG_SIZE;
sig               539 source4/auth/ntlmssp/ntlmssp_sign.c 						   &sig);
sig                44 source4/client/cifsdd.c static void dd_handle_signal(int sig)
sig                46 source4/client/cifsdd.c 	switch (sig)
sig                55 source4/client/smbmount.c static void exit_parent(int sig)
sig               122 source4/heimdal/lib/hcrypto/dsa.c 	   const unsigned char *sig, int sig_len, DSA *dsa)
sig                57 source4/heimdal/lib/hcrypto/rand-timer.c sigALRM(int sig)
sig                87 source4/heimdal/lib/hcrypto/rand-timer.c (*fake_signal(int sig, RETSIGTYPE (*f)(int)))(int)
sig                93 source4/heimdal/lib/hcrypto/rand-timer.c     sigaction(sig, &sa, &osa);
sig                51 source4/heimdal/lib/hcrypto/ui.c intr(int sig)
sig              2296 source4/heimdal/lib/hx509/cert.c 		       const heim_octet_string *sig)
sig              2298 source4/heimdal/lib/hx509/cert.c     return _hx509_verify_signature(context, signer->data, alg, data, sig);
sig              1197 source4/heimdal/lib/hx509/cms.c 	heim_octet_string sig;
sig              1210 source4/heimdal/lib/hx509/cms.c 				      &sig);
sig              1217 source4/heimdal/lib/hx509/cms.c 			   &sig,
sig              1220 source4/heimdal/lib/hx509/cms.c 	der_free_octet_string(&sig);
sig               197 source4/heimdal/lib/hx509/crypto.c 		     const heim_octet_string *sig)
sig               244 source4/heimdal/lib/hx509/crypto.c     retsize = RSA_public_decrypt(sig->length, (unsigned char *)sig->data,
sig               319 source4/heimdal/lib/hx509/crypto.c 		     heim_octet_string *sig)
sig               386 source4/heimdal/lib/hx509/crypto.c     sig->length = RSA_size(signer->private_key.rsa);
sig               387 source4/heimdal/lib/hx509/crypto.c     sig->data = malloc(sig->length);
sig               388 source4/heimdal/lib/hx509/crypto.c     if (sig->data == NULL) {
sig               395 source4/heimdal/lib/hx509/crypto.c 			      sig->data,
sig               406 source4/heimdal/lib/hx509/crypto.c     if (ret > sig->length)
sig               409 source4/heimdal/lib/hx509/crypto.c     sig->length = ret;
sig               579 source4/heimdal/lib/hx509/crypto.c 		     const heim_octet_string *sig)
sig               640 source4/heimdal/lib/hx509/crypto.c 		     (unsigned char*)sig->data, sig->length,
sig               688 source4/heimdal/lib/hx509/crypto.c 		      const heim_octet_string *sig)
sig               693 source4/heimdal/lib/hx509/crypto.c     if (sig->length != SHA_DIGEST_LENGTH) {
sig               703 source4/heimdal/lib/hx509/crypto.c     if (memcmp(digest, sig->data, SHA_DIGEST_LENGTH) != 0) {
sig               719 source4/heimdal/lib/hx509/crypto.c 			heim_octet_string *sig)
sig               723 source4/heimdal/lib/hx509/crypto.c     memset(sig, 0, sizeof(*sig));
sig               734 source4/heimdal/lib/hx509/crypto.c     sig->data = malloc(SHA256_DIGEST_LENGTH);
sig               735 source4/heimdal/lib/hx509/crypto.c     if (sig->data == NULL) {
sig               736 source4/heimdal/lib/hx509/crypto.c 	sig->length = 0;
sig               739 source4/heimdal/lib/hx509/crypto.c     sig->length = SHA256_DIGEST_LENGTH;
sig               743 source4/heimdal/lib/hx509/crypto.c     SHA256_Final (sig->data, &m);
sig               754 source4/heimdal/lib/hx509/crypto.c 			const heim_octet_string *sig)
sig               759 source4/heimdal/lib/hx509/crypto.c     if (sig->length != SHA256_DIGEST_LENGTH) {
sig               769 source4/heimdal/lib/hx509/crypto.c     if (memcmp(digest, sig->data, SHA256_DIGEST_LENGTH) != 0) {
sig               785 source4/heimdal/lib/hx509/crypto.c 		      heim_octet_string *sig)
sig               789 source4/heimdal/lib/hx509/crypto.c     memset(sig, 0, sizeof(*sig));
sig               800 source4/heimdal/lib/hx509/crypto.c     sig->data = malloc(SHA_DIGEST_LENGTH);
sig               801 source4/heimdal/lib/hx509/crypto.c     if (sig->data == NULL) {
sig               802 source4/heimdal/lib/hx509/crypto.c 	sig->length = 0;
sig               805 source4/heimdal/lib/hx509/crypto.c     sig->length = SHA_DIGEST_LENGTH;
sig               809 source4/heimdal/lib/hx509/crypto.c     SHA1_Final (sig->data, &m);
sig               820 source4/heimdal/lib/hx509/crypto.c 		     const heim_octet_string *sig)
sig               825 source4/heimdal/lib/hx509/crypto.c     if (sig->length != MD5_DIGEST_LENGTH) {
sig               835 source4/heimdal/lib/hx509/crypto.c     if (memcmp(digest, sig->data, MD5_DIGEST_LENGTH) != 0) {
sig               850 source4/heimdal/lib/hx509/crypto.c 		     const heim_octet_string *sig)
sig               855 source4/heimdal/lib/hx509/crypto.c     if (sig->length != MD2_DIGEST_LENGTH) {
sig               865 source4/heimdal/lib/hx509/crypto.c     if (memcmp(digest, sig->data, MD2_DIGEST_LENGTH) != 0) {
sig              1051 source4/heimdal/lib/hx509/crypto.c 			const heim_octet_string *sig)
sig              1077 source4/heimdal/lib/hx509/crypto.c     return (*md->verify_signature)(context, md, signer, alg, data, sig);
sig              1085 source4/heimdal/lib/hx509/crypto.c 				  const heim_bit_string *sig)
sig              1089 source4/heimdal/lib/hx509/crypto.c     if (sig->length & 7) {
sig              1095 source4/heimdal/lib/hx509/crypto.c     os.data = sig->data;
sig              1096 source4/heimdal/lib/hx509/crypto.c     os.length = sig->length / 8;
sig              1107 source4/heimdal/lib/hx509/crypto.c 			heim_octet_string *sig)
sig              1115 source4/heimdal/lib/hx509/crypto.c 				    signatureAlgorithm, sig);
sig              1132 source4/heimdal/lib/hx509/crypto.c 				   signatureAlgorithm, sig);
sig              1141 source4/heimdal/lib/hx509/crypto.c 				  heim_bit_string *sig)
sig              1150 source4/heimdal/lib/hx509/crypto.c     sig->data = os.data;
sig              1151 source4/heimdal/lib/hx509/crypto.c     sig->length = os.length * 8;
sig               119 source4/heimdal/lib/hx509/ks_keychain.c     CSSM_DATA sig, in;
sig               140 source4/heimdal/lib/hx509/ks_keychain.c     sig.Data = (uint8 *)to;
sig               141 source4/heimdal/lib/hx509/ks_keychain.c     sig.Length = kc->keysize;
sig               143 source4/heimdal/lib/hx509/ks_keychain.c     cret = CSSM_SignData(sigHandle, &in, 1, CSSM_ALGID_NONE, &sig);
sig               148 source4/heimdal/lib/hx509/ks_keychain.c 	fret = sig.Length;
sig               412 source4/heimdal/lib/krb5/pac.c 		const struct PAC_INFO_BUFFER *sig,
sig               425 source4/heimdal/lib/krb5/pac.c     sp = krb5_storage_from_mem((char *)data->data + sig->offset_lo,
sig               426 source4/heimdal/lib/krb5/pac.c 			       sig->buffersize);
sig               436 source4/heimdal/lib/krb5/pac.c 	sig->buffersize - krb5_storage_seek(sp, 0, SEEK_CUR);
sig               483 source4/heimdal/lib/krb5/pac.c 		void *sig, size_t siglen)
sig               505 source4/heimdal/lib/krb5/pac.c     memcpy(sig, cksum.checksum.data, siglen);
sig               408 source4/heimdal/lib/ntlm/ntlm.c     unsigned char sig[8];
sig               422 source4/heimdal/lib/ntlm/ntlm.c     CHECK(krb5_storage_read(in, sig, sizeof(sig)), sizeof(sig));
sig               423 source4/heimdal/lib/ntlm/ntlm.c     CHECK(memcmp(ntlmsigature, sig, sizeof(ntlmsigature)), 0);
sig               552 source4/heimdal/lib/ntlm/ntlm.c     unsigned char sig[8];
sig               567 source4/heimdal/lib/ntlm/ntlm.c     CHECK(krb5_storage_read(in, sig, sizeof(sig)), sizeof(sig));
sig               568 source4/heimdal/lib/ntlm/ntlm.c     CHECK(memcmp(ntlmsigature, sig, sizeof(ntlmsigature)), 0);
sig               708 source4/heimdal/lib/ntlm/ntlm.c     unsigned char sig[8];
sig               723 source4/heimdal/lib/ntlm/ntlm.c     CHECK(krb5_storage_read(in, sig, sizeof(sig)), sizeof(sig));
sig               724 source4/heimdal/lib/ntlm/ntlm.c     CHECK(memcmp(ntlmsigature, sig, sizeof(ntlmsigature)), 0);
sig                69 source4/heimdal/lib/roken/resolve.c     DECL(sig),
sig               296 source4/heimdal/lib/roken/resolve.c 	rr->u.sig = malloc(sizeof(*rr->u.sig)
sig               298 source4/heimdal/lib/roken/resolve.c 	if (rr->u.sig == NULL) {
sig               302 source4/heimdal/lib/roken/resolve.c 	rr->u.sig->type           = (p[0] << 8) | p[1];
sig               303 source4/heimdal/lib/roken/resolve.c 	rr->u.sig->algorithm      = p[2];
sig               304 source4/heimdal/lib/roken/resolve.c 	rr->u.sig->labels         = p[3];
sig               305 source4/heimdal/lib/roken/resolve.c 	rr->u.sig->orig_ttl       = (p[4] << 24) | (p[5] << 16)
sig               307 source4/heimdal/lib/roken/resolve.c 	rr->u.sig->sig_expiration = (p[8] << 24) | (p[9] << 16)
sig               309 source4/heimdal/lib/roken/resolve.c 	rr->u.sig->sig_inception  = (p[12] << 24) | (p[13] << 16)
sig               311 source4/heimdal/lib/roken/resolve.c 	rr->u.sig->key_tag        = (p[16] << 8) | p[17];
sig               312 source4/heimdal/lib/roken/resolve.c 	rr->u.sig->sig_len        = sig_len;
sig               313 source4/heimdal/lib/roken/resolve.c 	memcpy (rr->u.sig->sig_data, p + 18 + status, sig_len);
sig               314 source4/heimdal/lib/roken/resolve.c 	rr->u.sig->signer         = &rr->u.sig->sig_data[sig_len];
sig               315 source4/heimdal/lib/roken/resolve.c 	strlcpy(rr->u.sig->signer, host, hostlen + 1);
sig               253 source4/heimdal/lib/roken/resolve.h 	struct sig_record *sig;
sig                82 source4/heimdal/lib/roken/simple_exec.c sigtimeout(int sig)
sig                92 source4/heimdal/lib/roken/simple_exec.c     RETSIGTYPE (*old_func)(int sig) = NULL;
sig                78 source4/libcli/smb2/signing.c 	uint8_t sig[16];
sig                97 source4/libcli/smb2/signing.c 	memcpy(sig, buf->hdr+SMB2_HDR_SIGNATURE, 16);
sig               106 source4/libcli/smb2/signing.c 	memcpy(buf->hdr+SMB2_HDR_SIGNATURE, sig, 16);
sig               108 source4/libcli/smb2/signing.c 	if (memcmp(res, sig, 16) != 0) {
sig               111 source4/libcli/smb2/signing.c 		dump_data(0, sig, 16);
sig               445 source4/smbd/process_thread.c static void thread_sig_fault(int sig)
sig               449 source4/smbd/process_thread.c 		sig,(uint32_t)pthread_self(),
sig               475 source4/smbd/process_thread.c static void thread_fault_handler(int sig)
sig               486 source4/smbd/process_thread.c 		sig,(uint32_t)pthread_self(),
sig               100 source4/smbd/server.c static void sig_hup(int sig)
sig               105 source4/smbd/server.c static void sig_term(int sig)
sig                33 source4/torture/auth/ntlmssp.c 	DATA_BLOB sig, expected_sig;
sig                65 source4/torture/auth/ntlmssp.c 				   data.data, data.length, data.data, data.length, &sig);
sig                69 source4/torture/auth/ntlmssp.c 	dump_data_pw("NTLMSSP calc sig:     ", sig.data, sig.length);
sig                72 source4/torture/auth/ntlmssp.c 	torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length");
sig                74 source4/torture/auth/ntlmssp.c 	torture_assert_mem_equal(tctx, sig.data, expected_sig.data, sig.length,
sig                79 source4/torture/auth/ntlmssp.c 								  data.data, data.length, data.data, data.length, &sig),
sig                86 source4/torture/auth/ntlmssp.c 								  data.data, data.length, data.data, data.length, &sig),
sig               120 source4/torture/auth/ntlmssp.c 			    data.data, data.length, data.data, data.length, &sig);
sig               124 source4/torture/auth/ntlmssp.c 	dump_data_pw("NTLMSSP calc sig:     ", sig.data, sig.length);
sig               127 source4/torture/auth/ntlmssp.c 	torture_assert_int_equal(tctx, sig.length, expected_sig.length, "Wrong sig length");
sig               129 source4/torture/auth/ntlmssp.c 	torture_assert_mem_equal(tctx, sig.data+8, expected_sig.data+8, sig.length-8,
sig               134 source4/torture/auth/ntlmssp.c 								  data.data, data.length, data.data, data.length, &sig),
sig               137 source4/torture/auth/ntlmssp.c 	sig.length /= 2;
sig               141 source4/torture/auth/ntlmssp.c 								  data.data, data.length, data.data, data.length, &sig),
sig               251 source4/torture/nbench/nbio.c void nb_alarm(int sig)
sig               306 source4/torture/smbtorture.c _NORETURN_ static void max_runtime_handler(int sig)
sig               610 source4/torture/util_smb.c static void sigcont(int sig)