Searched refs:key_name (Results 1 - 15 of 15) sorted by relevance

/freebsd-11-stable/contrib/ldns/ldns/
H A Dtsig.h46 * \param[in] key_name the name of the shared key
51 bool ldns_pkt_tsig_verify(ldns_pkt *pkt, uint8_t *wire, size_t wire_size, const char *key_name, const char *key_data, ldns_rdf *mac);
59 * \param[in] key_name the name of the shared key
66 bool ldns_pkt_tsig_verify_next(ldns_pkt *pkt, uint8_t *wire, size_t wire_size, const char *key_name, const char *key_data, ldns_rdf *mac,
72 * \param[in] key_name the name of the shared key
79 ldns_status ldns_pkt_tsig_sign(ldns_pkt *pkt, const char *key_name, const char *key_data, uint16_t fudge,
85 * \param[in] key_name the name of the shared key
94 ldns_status ldns_pkt_tsig_sign_next(ldns_pkt *pkt, const char *key_name, const char *key_data, uint16_t fudge,
/freebsd-11-stable/contrib/ncurses/ncurses/widechar/
H A Dlib_key_name.c32 ** The routine key_name().
41 key_name(wchar_t c) function
/freebsd-11-stable/tools/tools/locale/tools/
H A Dutf8-rollup.pl250 my $key_name;
285 $key_name = $1;
286 $key_name =~ s/_/ /g;
287 if (already_seen_RO (hex($utf8map{$key_name}))) {
300 $key_name = $1;
301 $key_name =~ s/_/ /g;
302 $curr_ID = hex($utf8map{$key_name});
/freebsd-11-stable/contrib/ldns/
H A Dtsig.c276 ldns_pkt_tsig_verify(ldns_pkt *pkt, uint8_t *wire, size_t wirelen, const char *key_name, argument
279 return ldns_pkt_tsig_verify_next(pkt, wire, wirelen, key_name, key_data, orig_mac_rdf, 0);
283 ldns_pkt_tsig_verify_next(ldns_pkt *pkt, uint8_t *wire, size_t wirelen, const char* key_name, argument
294 ldns_rdf *key_name_rdf = ldns_rdf_new_frm_str(LDNS_RDF_TYPE_DNAME, key_name);
352 ldns_pkt_tsig_sign(ldns_pkt *pkt, const char *key_name, const char *key_data, argument
355 return ldns_pkt_tsig_sign_next(pkt, key_name, key_data, fudge, algorithm_name, query_mac, 0);
359 ldns_pkt_tsig_sign_next(ldns_pkt *pkt, const char *key_name, const char *key_data, argument
363 ldns_rdf *key_name_rdf = ldns_rdf_new_frm_str(LDNS_RDF_TYPE_DNAME, key_name);
H A Ddnssec_verify.c104 ldns_rdf *key_name,
114 key_name,
120 key_name,
127 key_name,
155 ldns_rdf *key_name,
175 key_name,
181 key_name,
198 key_name,
204 key_name,
283 ldns_rdf *name = NULL, *key_name local
99 ldns_dnssec_build_data_chain_dnskey(ldns_resolver *res, uint16_t qflags, const ldns_pkt *pkt, ldns_rr_list *signatures, ldns_dnssec_data_chain *new_chain, ldns_rdf *key_name, ldns_rr_class c) argument
152 ldns_dnssec_build_data_chain_other(ldns_resolver *res, uint16_t qflags, ldns_dnssec_data_chain *new_chain, ldns_rdf *key_name, ldns_rr_class c, ldns_rr_list *dss) argument
[all...]
/freebsd-11-stable/contrib/llvm-project/lldb/source/Host/common/
H A DXML.cpp439 std::string key_name;
440 if (key_node.GetElementText(key_name)) {
441 if (key_name == key) {
500 std::string key_name;
501 key_node.GetElementText(key_name);
502 dict_sp->AddItem(key_name, CreatePlistValue(node));
/freebsd-11-stable/contrib/unbound/util/
H A Dnet_help.c83 unsigned char *key_name; member in struct:tls_session_ticket_key
94 * @param key_name: secret name, 16 bytes
104 int tls_session_ticket_key_cb(SSL *s, unsigned char* key_name,
1434 keys->key_name = data;
1440 keys->key_name = NULL;
1462 int tls_session_ticket_key_cb(SSL *ATTR_UNUSED(sslctx), unsigned char* key_name, variable
1487 memcpy(key_name, ticket_keys->key_name, 16);
1520 for(key = ticket_keys; key->key_name != NULL; key++) {
1521 if (!memcmp(key_name, ke
[all...]
/freebsd-11-stable/contrib/hyperv/tools/
H A Dhv_kvp_daemon.c1217 char *key_name, *key_value; local
1245 key_name = (char *)op_msg->body.kvp_enum_data.data.key;
1253 strcpy(key_name, "FullyQualifiedDomainName");
1257 strcpy(key_name, "IntegrationServicesVersion");
1264 strcpy(key_name, "NetworkAddressIPv4");
1270 strcpy(key_name, "NetworkAddressIPv6");
1275 strcpy(key_name, "OSBuildNumber");
1280 strcpy(key_name, "OSName");
1285 strcpy(key_name, "OSMajorVersion");
1290 strcpy(key_name, "OSMinorVersio
[all...]
/freebsd-11-stable/sys/dev/gpio/
H A Dgpiokeys.c265 const char *key_name; local
277 key_name = name;
279 key_name = "unknown";
303 key_name, code);
307 key_name);
311 device_printf(sc->sc_dev, "<%s> failed to map pin\n", key_name);
320 device_printf(sc->sc_dev, "<%s> cannot allocate interrupt\n", key_name);
331 device_printf(sc->sc_dev, "<%s> unable to setup the irq handler\n", key_name);
344 "repeat=%d, repeat_delay=%d\n", key_name, key->keycode,
/freebsd-11-stable/sys/dev/hyperv/utilities/
H A Dhv_kvp.c470 char *key_name, *value; local
485 key_name = umsg->body.kvp_enum_data.data.key;
488 key_name, strlen(key_name),
/freebsd-11-stable/crypto/openssl/ssl/
H A Dssltest.c526 static int cb_ticket0(SSL* s, unsigned char* key_name, unsigned char *iv, EVP_CIPHER_CTX *ctx, HMAC_CTX *hctx, int enc) argument
531 static int cb_ticket1(SSL* s, unsigned char* key_name, unsigned char *iv, EVP_CIPHER_CTX *ctx, HMAC_CTX *hctx, int enc) argument
541 memcpy(key_name, name, 16);
544 if (memcmp(key_name, name, 16) == 0) {
553 static int cb_ticket2(SSL* s, unsigned char* key_name, unsigned char *iv, EVP_CIPHER_CTX *ctx, HMAC_CTX *hctx, int enc) argument
H A Ds3_srvr.c3451 unsigned char key_name[16]; local
3517 int ret = tctx->tlsext_ticket_key_cb(s, key_name, iv, &ctx,
3542 memcpy(key_name, tctx->tlsext_tick_key_name, 16);
3556 memcpy(p, key_name, 16);
/freebsd-11-stable/contrib/llvm-project/lldb/source/Core/
H A DIOHandlerCursesGUI.cpp765 Menu(const char *name, const char *key_name, int key_value,
862 Menu::Menu(const char *name, const char *key_name, int key_value, argument
872 if (key_name && key_name[0])
873 m_key_name = key_name;
/freebsd-11-stable/lib/ncurses/ncurses/
H A DMakefile1016 curs_util.3 key_name.3 \
/freebsd-11-stable/contrib/netbsd-tests/lib/libcurses/slave/
H A Dcurses_commands.c6947 report_status(key_name(w));

Completed in 389 milliseconds