/freebsd-11-stable/contrib/ldns/ldns/ |
H A D | tsig.h | 46 * \param[in] key_name the name of the shared key 51 bool ldns_pkt_tsig_verify(ldns_pkt *pkt, uint8_t *wire, size_t wire_size, const char *key_name, const char *key_data, ldns_rdf *mac); 59 * \param[in] key_name the name of the shared key 66 bool ldns_pkt_tsig_verify_next(ldns_pkt *pkt, uint8_t *wire, size_t wire_size, const char *key_name, const char *key_data, ldns_rdf *mac, 72 * \param[in] key_name the name of the shared key 79 ldns_status ldns_pkt_tsig_sign(ldns_pkt *pkt, const char *key_name, const char *key_data, uint16_t fudge, 85 * \param[in] key_name the name of the shared key 94 ldns_status ldns_pkt_tsig_sign_next(ldns_pkt *pkt, const char *key_name, const char *key_data, uint16_t fudge,
|
/freebsd-11-stable/contrib/ncurses/ncurses/widechar/ |
H A D | lib_key_name.c | 32 ** The routine key_name(). 41 key_name(wchar_t c) function
|
/freebsd-11-stable/tools/tools/locale/tools/ |
H A D | utf8-rollup.pl | 250 my $key_name; 285 $key_name = $1; 286 $key_name =~ s/_/ /g; 287 if (already_seen_RO (hex($utf8map{$key_name}))) { 300 $key_name = $1; 301 $key_name =~ s/_/ /g; 302 $curr_ID = hex($utf8map{$key_name});
|
/freebsd-11-stable/contrib/ldns/ |
H A D | tsig.c | 276 ldns_pkt_tsig_verify(ldns_pkt *pkt, uint8_t *wire, size_t wirelen, const char *key_name, argument 279 return ldns_pkt_tsig_verify_next(pkt, wire, wirelen, key_name, key_data, orig_mac_rdf, 0); 283 ldns_pkt_tsig_verify_next(ldns_pkt *pkt, uint8_t *wire, size_t wirelen, const char* key_name, argument 294 ldns_rdf *key_name_rdf = ldns_rdf_new_frm_str(LDNS_RDF_TYPE_DNAME, key_name); 352 ldns_pkt_tsig_sign(ldns_pkt *pkt, const char *key_name, const char *key_data, argument 355 return ldns_pkt_tsig_sign_next(pkt, key_name, key_data, fudge, algorithm_name, query_mac, 0); 359 ldns_pkt_tsig_sign_next(ldns_pkt *pkt, const char *key_name, const char *key_data, argument 363 ldns_rdf *key_name_rdf = ldns_rdf_new_frm_str(LDNS_RDF_TYPE_DNAME, key_name);
|
H A D | dnssec_verify.c | 104 ldns_rdf *key_name, 114 key_name, 120 key_name, 127 key_name, 155 ldns_rdf *key_name, 175 key_name, 181 key_name, 198 key_name, 204 key_name, 283 ldns_rdf *name = NULL, *key_name local 99 ldns_dnssec_build_data_chain_dnskey(ldns_resolver *res, uint16_t qflags, const ldns_pkt *pkt, ldns_rr_list *signatures, ldns_dnssec_data_chain *new_chain, ldns_rdf *key_name, ldns_rr_class c) argument 152 ldns_dnssec_build_data_chain_other(ldns_resolver *res, uint16_t qflags, ldns_dnssec_data_chain *new_chain, ldns_rdf *key_name, ldns_rr_class c, ldns_rr_list *dss) argument [all...] |
/freebsd-11-stable/contrib/llvm-project/lldb/source/Host/common/ |
H A D | XML.cpp | 439 std::string key_name; 440 if (key_node.GetElementText(key_name)) { 441 if (key_name == key) { 500 std::string key_name; 501 key_node.GetElementText(key_name); 502 dict_sp->AddItem(key_name, CreatePlistValue(node));
|
/freebsd-11-stable/contrib/unbound/util/ |
H A D | net_help.c | 83 unsigned char *key_name; member in struct:tls_session_ticket_key 94 * @param key_name: secret name, 16 bytes 104 int tls_session_ticket_key_cb(SSL *s, unsigned char* key_name, 1434 keys->key_name = data; 1440 keys->key_name = NULL; 1462 int tls_session_ticket_key_cb(SSL *ATTR_UNUSED(sslctx), unsigned char* key_name, variable 1487 memcpy(key_name, ticket_keys->key_name, 16); 1520 for(key = ticket_keys; key->key_name != NULL; key++) { 1521 if (!memcmp(key_name, ke [all...] |
/freebsd-11-stable/contrib/hyperv/tools/ |
H A D | hv_kvp_daemon.c | 1217 char *key_name, *key_value; local 1245 key_name = (char *)op_msg->body.kvp_enum_data.data.key; 1253 strcpy(key_name, "FullyQualifiedDomainName"); 1257 strcpy(key_name, "IntegrationServicesVersion"); 1264 strcpy(key_name, "NetworkAddressIPv4"); 1270 strcpy(key_name, "NetworkAddressIPv6"); 1275 strcpy(key_name, "OSBuildNumber"); 1280 strcpy(key_name, "OSName"); 1285 strcpy(key_name, "OSMajorVersion"); 1290 strcpy(key_name, "OSMinorVersio [all...] |
/freebsd-11-stable/sys/dev/gpio/ |
H A D | gpiokeys.c | 265 const char *key_name; local 277 key_name = name; 279 key_name = "unknown"; 303 key_name, code); 307 key_name); 311 device_printf(sc->sc_dev, "<%s> failed to map pin\n", key_name); 320 device_printf(sc->sc_dev, "<%s> cannot allocate interrupt\n", key_name); 331 device_printf(sc->sc_dev, "<%s> unable to setup the irq handler\n", key_name); 344 "repeat=%d, repeat_delay=%d\n", key_name, key->keycode,
|
/freebsd-11-stable/sys/dev/hyperv/utilities/ |
H A D | hv_kvp.c | 470 char *key_name, *value; local 485 key_name = umsg->body.kvp_enum_data.data.key; 488 key_name, strlen(key_name),
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssltest.c | 526 static int cb_ticket0(SSL* s, unsigned char* key_name, unsigned char *iv, EVP_CIPHER_CTX *ctx, HMAC_CTX *hctx, int enc) argument 531 static int cb_ticket1(SSL* s, unsigned char* key_name, unsigned char *iv, EVP_CIPHER_CTX *ctx, HMAC_CTX *hctx, int enc) argument 541 memcpy(key_name, name, 16); 544 if (memcmp(key_name, name, 16) == 0) { 553 static int cb_ticket2(SSL* s, unsigned char* key_name, unsigned char *iv, EVP_CIPHER_CTX *ctx, HMAC_CTX *hctx, int enc) argument
|
H A D | s3_srvr.c | 3451 unsigned char key_name[16]; local 3517 int ret = tctx->tlsext_ticket_key_cb(s, key_name, iv, &ctx, 3542 memcpy(key_name, tctx->tlsext_tick_key_name, 16); 3556 memcpy(p, key_name, 16);
|
/freebsd-11-stable/contrib/llvm-project/lldb/source/Core/ |
H A D | IOHandlerCursesGUI.cpp | 765 Menu(const char *name, const char *key_name, int key_value, 862 Menu::Menu(const char *name, const char *key_name, int key_value, argument 872 if (key_name && key_name[0]) 873 m_key_name = key_name;
|
/freebsd-11-stable/lib/ncurses/ncurses/ |
H A D | Makefile | 1016 curs_util.3 key_name.3 \
|
/freebsd-11-stable/contrib/netbsd-tests/lib/libcurses/slave/ |
H A D | curses_commands.c | 6947 report_status(key_name(w));
|