Searched refs:keyname (Results 1 - 25 of 34) sorted by relevance

12

/freebsd-12-stable/contrib/sendmail/editmap/
H A Deditmap.c89 char *keyname = NULL; local
191 keyname = argv[2];
199 for (p = keyname; *p != '\0'; p++)
320 db_key.data = keyname;
321 db_key.size = strlen(keyname);
331 progname, keyname, mapname);
345 db_key.data = keyname;
346 db_key.size = strlen(keyname);
360 progname, keyname, value, mapname,
370 db_key.data = keyname;
[all...]
/freebsd-12-stable/contrib/wpa/src/eap_common/
H A Deap_common.h15 const u8 *keyname; member in struct:erp_tlvs
H A Deap_common.c247 if (tlvs->keyname) {
252 tlvs->keyname = pos;
/freebsd-12-stable/usr.sbin/nandsim/
H A Dnandsim_cfgparse.h49 * keyname = name of a key,
62 const char *keyname; member in struct:nandsim_key
H A Dnandsim_cfgparse.c592 getres = rc_getstring(f, sect_name, sectno, key->keyname, STRBUFSIZ,
597 error(MSG_MANDATORYKEYMISSING, key->keyname,
633 getres = rc_getint(f, sect_name, sectno, key->keyname, &val);
637 error(MSG_MANDATORYKEYMISSING, key->keyname,
662 getres = rc_getstring(f, sect_name, sectno, key->keyname, STRBUFSIZ,
667 error(MSG_MANDATORYKEYMISSING, key->keyname,
685 getres = rc_getbool(f, sect_name, sectno, key->keyname, &val);
688 error(MSG_MANDATORYKEYMISSING, key->keyname,
718 sect_name, key->keyname, TYPE(key->valuetype),
758 } while ((++key)->keyname !
[all...]
H A Dnandsim_rcfile.c56 const char *keyname);
176 rc_sect_findkey(struct rcsection *rsp, const char *keyname) argument
181 if (strcmp(p->rk_name, keyname)==0)
261 continue; /* become 'keyname=' */
/freebsd-12-stable/contrib/ncurses/ncurses/trace/
H A Dtrace_tries.c59 _nc_visbuf((char *) my_buffer), keyname(tree->value));
/freebsd-12-stable/contrib/ldns/ldns/
H A Dtsig.h29 const char *keyname; member in struct:ldns_tsig_credentials_struct
/freebsd-12-stable/crypto/openssh/regress/unittests/kex/
H A Dtest_kex.c88 char *keyname = NULL; local
102 keyname = strdup(sshkey_ssh_name(private));
103 ASSERT_PTR_NE(keyname, NULL);
104 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname;
174 free(keyname);
/freebsd-12-stable/contrib/llvm-project/llvm/lib/Target/NVPTX/
H A DNVPTXUtilities.cpp61 std::string keyname = prop->getString().str(); local
62 if (retval.find(keyname) != retval.end())
63 retval[keyname].push_back(Val->getZExtValue());
67 retval[keyname] = tmp;
/freebsd-12-stable/crypto/openssh/regress/misc/kexfuzz/
H A Dkexfuzz.c208 char *keyname = NULL; local
219 keyname = strdup(sshkey_ssh_name(prvkey));
220 ASSERT_PTR_NE(keyname, NULL);
221 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname;
307 free(keyname);
/freebsd-12-stable/contrib/wpa/src/eapol_auth/
H A Deapol_auth_sm.h84 const char *keyname);
/freebsd-12-stable/contrib/nvi/cl/
H A Dcl_term.c233 CHAR_T keyname[64]; local
248 nlen = SPRINTF(keyname,
249 SIZE(keyname), L("function key %d"),
253 return (seq_set(sp, keyname, nlen,
/freebsd-12-stable/sbin/savecore/
H A Dsavecore.c225 writekey(const char *keyname, uint8_t *dumpkey, uint32_t dumpkeysize) argument
229 fd = open(keyname, O_WRONLY | O_CREAT | O_TRUNC, 0600);
232 keyname);
237 syslog(LOG_ERR, "Unable to write the key to %s: %m.", keyname);
533 static char keyname[PATH_MAX]; local
828 snprintf(keyname, sizeof(keyname), "key.%d", bounds);
829 ret = writekey(keyname, dumpkey, dumpkeysize);
867 if (symlink(keyname, "key.last") == -1) {
/freebsd-12-stable/contrib/amd/amd/
H A Dreaddir.c59 static int key_already_in_chain(char *keyname, const nfsentry *chain);
74 key_already_in_chain(char *keyname, const nfsentry *chain) argument
79 if (keyname && tmpchain->ne_name && STREQ(keyname, tmpchain->ne_name))
501 key_already_in_chain3(char *keyname, const am_entry3 *chain) argument
506 if (keyname && tmpchain->name && STREQ(keyname, tmpchain->name))
/freebsd-12-stable/contrib/smbfs/lib/smb/
H A Drcfile.c59 static struct rckey *rc_sect_findkey(struct rcsection *rsp, const char *keyname);
195 rc_sect_findkey(struct rcsection *rsp, const char *keyname) argument
200 if (strcmp(p->rk_name, keyname)==0)
291 continue; /* become 'keyname=' */
/freebsd-12-stable/contrib/wpa/src/eap_server/
H A Deap.h106 const char *keyname);
H A Deap_server.c64 const char *keyname)
67 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname);
839 if (!parse.keyname) {
846 parse.keyname, parse.keyname_len);
852 os_memcpy(nai, parse.keyname, parse.keyname_len);
865 sm->identity = (u8 *) dup_binstr(parse.keyname,
888 start = parse.keyname + parse.keyname_len;
2053 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname)
2057 parse.keyname, parse.keyname_len);
2061 os_memcpy(sm->identity, parse.keyname, pars
63 eap_erp_get_key(struct eap_sm *sm, const char *keyname) argument
[all...]
/freebsd-12-stable/contrib/dialog/
H A Dtrace.c150 if (fkey > KEY_MAX || (fkey_name = keyname(fkey)) == 0) {
/freebsd-12-stable/crypto/openssh/regress/unittests/authopt/
H A Dtests.c382 #define PREPARE(label, keyname, keywords) \
386 cert = load_key(keyname ".cert"); \
417 #define FLAG_CASE(keybase, label, keyname, keywords, mostly_off, var, val) \
419 PREPARE(keybase " " label, keyname, keywords); \
/freebsd-12-stable/usr.sbin/ndiscvt/
H A Dinf.c723 const char *keyname; local
725 keyname = r->subkey + strlen("Ndi\\params\\");
726 fprintf(ofp, "\n\t{ \"%s\",", keyname);
/freebsd-12-stable/contrib/ldns/
H A Dtsig.c30 return tc->keyname;
42 return strdup(tc->keyname);
/freebsd-12-stable/contrib/libpcap/
H A Dpcap-npf.c1167 char keyname[512]; local
1169 pcap_snprintf(keyname, sizeof(keyname), "%s\\CardParams\\%s",
1174 status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, keyname, 0, KEY_READ, &dagkey);
/freebsd-12-stable/crypto/openssl/apps/
H A Dpkcs12.c120 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; local
231 keyname = opt_arg();
356 key = load_key(keyname ? keyname : infile,
/freebsd-12-stable/contrib/wpa/src/drivers/
H A Ddriver_ndis.c2401 TCHAR keyname[256], devname[256]; local
2436 len = sizeof(keyname);
2437 ret = RegEnumKeyEx(hk, i, keyname, &len, NULL, NULL, NULL,
2446 ret = RegOpenKeyEx(hk, keyname, 0, 0, &hk2);

Completed in 414 milliseconds

12