/external/openssh/ |
H A D | ssh-dss.c | 50 ssh_dss_sign(const struct sshkey *key, u_char **sigp, size_t *lenp, argument 61 if (sigp != NULL) 62 *sigp = NULL; 90 if (sigp != NULL) { 91 if ((*sigp = malloc(SIGBLOB_LEN)) == NULL) { 95 memcpy(*sigp, sigblob, SIGBLOB_LEN); 110 if (sigp != NULL) { 111 if ((*sigp = malloc(len)) == NULL) { 115 memcpy(*sigp, sshbuf_ptr(b), len);
|
H A D | ssh-ecdsa.c | 48 ssh_ecdsa_sign(const struct sshkey *key, u_char **sigp, size_t *lenp, argument 60 if (sigp != NULL) 61 *sigp = NULL; 90 if (sigp != NULL) { 91 if ((*sigp = malloc(len)) == NULL) { 95 memcpy(*sigp, sshbuf_ptr(b), len);
|
H A D | ssh-ed25519.c | 36 ssh_ed25519_sign(const struct sshkey *key, u_char **sigp, size_t *lenp, argument 47 if (sigp != NULL) 48 *sigp = NULL; 73 if (sigp != NULL) { 74 if ((*sigp = malloc(len)) == NULL) { 78 memcpy(*sigp, sshbuf_ptr(b), len);
|
H A D | ssh-rsa.c | 41 ssh_rsa_sign(const struct sshkey *key, u_char **sigp, size_t *lenp, argument 53 if (sigp != NULL) 54 *sigp = NULL; 98 if (sigp != NULL) { 99 if ((*sigp = malloc(len)) == NULL) { 103 memcpy(*sigp, sshbuf_ptr(b), len);
|
H A D | authfd.c | 432 u_char **sigp, size_t *lenp, 441 *sigp = NULL; 468 if ((r = sshbuf_get_string(msg, sigp, &len)) != 0) 431 ssh_agent_sign(int sock, struct sshkey *key, u_char **sigp, size_t *lenp, const u_char *data, size_t datalen, u_int compat) argument
|
H A D | key.c | 134 key_sign(const Key *key, u_char **sigp, u_int *lenp, argument 141 if (sigp != NULL) 142 *sigp = NULL; 153 if (sigp != NULL) 154 *sigp = sig;
|
H A D | ssh_api.c | 60 mm_sshkey_sign(struct sshkey *key, u_char **sigp, u_int *lenp, argument
|
H A D | monitor_wrap.c | 220 mm_key_sign(Key *key, u_char **sigp, u_int *lenp, argument 236 *sigp = buffer_get_string(&m, lenp);
|
H A D | sshconnect2.c | 974 identity_sign(struct identity *id, u_char **sigp, size_t *lenp, argument 982 return ssh_agent_sign(id->agent_fd, id->key, sigp, lenp, 990 return (sshkey_sign(id->key, sigp, lenp, data, datalen, 995 ret = sshkey_sign(prv, sigp, lenp, data, datalen, compat); 1464 ssh_keysign(struct sshkey *key, u_char **sigp, size_t *lenp, argument 1474 *sigp = NULL; 1565 if ((r = sshbuf_get_string(b, sigp, lenp)) != 0) {
|
H A D | sshkey.c | 2176 u_char **sigp, size_t *lenp, 2179 if (sigp != NULL) 2180 *sigp = NULL; 2189 return ssh_dss_sign(key, sigp, lenp, data, datalen, compat); 2193 return ssh_ecdsa_sign(key, sigp, lenp, data, datalen, compat); 2197 return ssh_rsa_sign(key, sigp, lenp, data, datalen, compat); 2201 return ssh_ed25519_sign(key, sigp, lenp, data, datalen, compat); 2175 sshkey_sign(const struct sshkey *key, u_char **sigp, size_t *lenp, const u_char *data, size_t datalen, u_int compat) argument
|
/external/ltp/testcases/kernel/hotplug/memory_hotplug/ |
H A D | memtoy.c | 167 int isig = 0, *sigp = signals_to_handle; local 177 while (*sigp) { 178 if (*sigp == sig) 181 ++sigp; 218 int *sigp = signals_to_handle; local 228 while (*sigp) { 230 int sig = *(sigp++);
|
/external/boringssl/src/crypto/dsa/ |
H A D | dsa.c | 756 const uint8_t *sigp = sig; local 757 if (d2i_DSA_SIG(&s, &sigp, sig_len) == NULL || sigp != sig + sig_len) {
|
/external/mksh/src/ |
H A D | jobs.c | 701 waitfor(const char *cp, int *sigp) argument 711 *sigp = 0; 755 *sigp = ksh_sigmask(-rv);
|