/freebsd-12-stable/contrib/sendmail/editmap/ |
H A D | editmap.c | 89 char *keyname = NULL; local 191 keyname = argv[2]; 199 for (p = keyname; *p != '\0'; p++) 320 db_key.data = keyname; 321 db_key.size = strlen(keyname); 331 progname, keyname, mapname); 345 db_key.data = keyname; 346 db_key.size = strlen(keyname); 360 progname, keyname, value, mapname, 370 db_key.data = keyname; [all...] |
/freebsd-12-stable/contrib/wpa/src/eap_common/ |
H A D | eap_common.h | 15 const u8 *keyname; member in struct:erp_tlvs
|
H A D | eap_common.c | 247 if (tlvs->keyname) { 252 tlvs->keyname = pos;
|
/freebsd-12-stable/usr.sbin/nandsim/ |
H A D | nandsim_cfgparse.h | 49 * keyname = name of a key, 62 const char *keyname; member in struct:nandsim_key
|
H A D | nandsim_cfgparse.c | 592 getres = rc_getstring(f, sect_name, sectno, key->keyname, STRBUFSIZ, 597 error(MSG_MANDATORYKEYMISSING, key->keyname, 633 getres = rc_getint(f, sect_name, sectno, key->keyname, &val); 637 error(MSG_MANDATORYKEYMISSING, key->keyname, 662 getres = rc_getstring(f, sect_name, sectno, key->keyname, STRBUFSIZ, 667 error(MSG_MANDATORYKEYMISSING, key->keyname, 685 getres = rc_getbool(f, sect_name, sectno, key->keyname, &val); 688 error(MSG_MANDATORYKEYMISSING, key->keyname, 718 sect_name, key->keyname, TYPE(key->valuetype), 758 } while ((++key)->keyname ! [all...] |
H A D | nandsim_rcfile.c | 56 const char *keyname); 176 rc_sect_findkey(struct rcsection *rsp, const char *keyname) argument 181 if (strcmp(p->rk_name, keyname)==0) 261 continue; /* become 'keyname=' */
|
/freebsd-12-stable/contrib/ncurses/ncurses/trace/ |
H A D | trace_tries.c | 59 _nc_visbuf((char *) my_buffer), keyname(tree->value));
|
/freebsd-12-stable/contrib/ldns/ldns/ |
H A D | tsig.h | 29 const char *keyname; member in struct:ldns_tsig_credentials_struct
|
/freebsd-12-stable/crypto/openssh/regress/unittests/kex/ |
H A D | test_kex.c | 88 char *keyname = NULL; local 102 keyname = strdup(sshkey_ssh_name(private)); 103 ASSERT_PTR_NE(keyname, NULL); 104 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname; 174 free(keyname);
|
/freebsd-12-stable/contrib/llvm-project/llvm/lib/Target/NVPTX/ |
H A D | NVPTXUtilities.cpp | 61 std::string keyname = prop->getString().str(); local 62 if (retval.find(keyname) != retval.end()) 63 retval[keyname].push_back(Val->getZExtValue()); 67 retval[keyname] = tmp;
|
/freebsd-12-stable/crypto/openssh/regress/misc/kexfuzz/ |
H A D | kexfuzz.c | 208 char *keyname = NULL; local 219 keyname = strdup(sshkey_ssh_name(prvkey)); 220 ASSERT_PTR_NE(keyname, NULL); 221 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname; 307 free(keyname);
|
/freebsd-12-stable/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 84 const char *keyname);
|
/freebsd-12-stable/contrib/nvi/cl/ |
H A D | cl_term.c | 233 CHAR_T keyname[64]; local 248 nlen = SPRINTF(keyname, 249 SIZE(keyname), L("function key %d"), 253 return (seq_set(sp, keyname, nlen,
|
/freebsd-12-stable/sbin/savecore/ |
H A D | savecore.c | 225 writekey(const char *keyname, uint8_t *dumpkey, uint32_t dumpkeysize) argument 229 fd = open(keyname, O_WRONLY | O_CREAT | O_TRUNC, 0600); 232 keyname); 237 syslog(LOG_ERR, "Unable to write the key to %s: %m.", keyname); 533 static char keyname[PATH_MAX]; local 828 snprintf(keyname, sizeof(keyname), "key.%d", bounds); 829 ret = writekey(keyname, dumpkey, dumpkeysize); 867 if (symlink(keyname, "key.last") == -1) {
|
/freebsd-12-stable/contrib/amd/amd/ |
H A D | readdir.c | 59 static int key_already_in_chain(char *keyname, const nfsentry *chain); 74 key_already_in_chain(char *keyname, const nfsentry *chain) argument 79 if (keyname && tmpchain->ne_name && STREQ(keyname, tmpchain->ne_name)) 501 key_already_in_chain3(char *keyname, const am_entry3 *chain) argument 506 if (keyname && tmpchain->name && STREQ(keyname, tmpchain->name))
|
/freebsd-12-stable/contrib/smbfs/lib/smb/ |
H A D | rcfile.c | 59 static struct rckey *rc_sect_findkey(struct rcsection *rsp, const char *keyname); 195 rc_sect_findkey(struct rcsection *rsp, const char *keyname) argument 200 if (strcmp(p->rk_name, keyname)==0) 291 continue; /* become 'keyname=' */
|
/freebsd-12-stable/contrib/wpa/src/eap_server/ |
H A D | eap.h | 106 const char *keyname);
|
H A D | eap_server.c | 64 const char *keyname) 67 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); 839 if (!parse.keyname) { 846 parse.keyname, parse.keyname_len); 852 os_memcpy(nai, parse.keyname, parse.keyname_len); 865 sm->identity = (u8 *) dup_binstr(parse.keyname, 888 start = parse.keyname + parse.keyname_len; 2053 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) 2057 parse.keyname, parse.keyname_len); 2061 os_memcpy(sm->identity, parse.keyname, pars 63 eap_erp_get_key(struct eap_sm *sm, const char *keyname) argument [all...] |
/freebsd-12-stable/contrib/dialog/ |
H A D | trace.c | 150 if (fkey > KEY_MAX || (fkey_name = keyname(fkey)) == 0) {
|
/freebsd-12-stable/crypto/openssh/regress/unittests/authopt/ |
H A D | tests.c | 382 #define PREPARE(label, keyname, keywords) \ 386 cert = load_key(keyname ".cert"); \ 417 #define FLAG_CASE(keybase, label, keyname, keywords, mostly_off, var, val) \ 419 PREPARE(keybase " " label, keyname, keywords); \
|
/freebsd-12-stable/usr.sbin/ndiscvt/ |
H A D | inf.c | 723 const char *keyname; local 725 keyname = r->subkey + strlen("Ndi\\params\\"); 726 fprintf(ofp, "\n\t{ \"%s\",", keyname);
|
/freebsd-12-stable/contrib/ldns/ |
H A D | tsig.c | 30 return tc->keyname; 42 return strdup(tc->keyname);
|
/freebsd-12-stable/contrib/libpcap/ |
H A D | pcap-npf.c | 1167 char keyname[512]; local 1169 pcap_snprintf(keyname, sizeof(keyname), "%s\\CardParams\\%s", 1174 status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, keyname, 0, KEY_READ, &dagkey);
|
/freebsd-12-stable/crypto/openssl/apps/ |
H A D | pkcs12.c | 120 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; local 231 keyname = opt_arg(); 356 key = load_key(keyname ? keyname : infile,
|
/freebsd-12-stable/contrib/wpa/src/drivers/ |
H A D | driver_ndis.c | 2401 TCHAR keyname[256], devname[256]; local 2436 len = sizeof(keyname); 2437 ret = RegEnumKeyEx(hk, i, keyname, &len, NULL, NULL, NULL, 2446 ret = RegOpenKeyEx(hk, keyname, 0, 0, &hk2);
|