Searched refs:keyname (Results 1 - 25 of 35) sorted by relevance

12

/freebsd-current/contrib/sendmail/editmap/
H A Deditmap.c90 char *keyname = NULL; local
192 keyname = argv[2];
200 lower = makelower(keyname);
203 if (keyname != lower)
204 keyname = lower;
321 db_key.data = keyname;
322 db_key.size = strlen(keyname);
332 progname, keyname, mapname);
346 db_key.data = keyname;
347 db_key.size = strlen(keyname);
[all...]
/freebsd-current/contrib/wpa/src/eap_common/
H A Deap_common.h15 const u8 *keyname; member in struct:erp_tlvs
H A Deap_common.c247 if (tlvs->keyname) {
252 tlvs->keyname = pos;
/freebsd-current/contrib/ldns/ldns/
H A Dtsig.h29 const char *keyname; member in struct:ldns_tsig_credentials_struct
/freebsd-current/contrib/ncurses/ncurses/trace/
H A Dtrace_tries.c60 _nc_visbuf((char *) my_buffer), keyname(tree->value));
/freebsd-current/crypto/openssh/regress/unittests/kex/
H A Dtest_kex.c85 char *keyname = NULL; local
99 keyname = strdup(sshkey_ssh_name(private));
100 ASSERT_PTR_NE(keyname, NULL);
101 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname;
173 free(keyname);
/freebsd-current/crypto/openssh/regress/unittests/sshsig/
H A Dtests.c55 check_sig(const char *keyname, const char *signame, const struct sshbuf *msg, argument
62 k = load_key(keyname);
/freebsd-current/contrib/wpa/src/eapol_auth/
H A Deapol_auth_sm.h60 const char *keyname);
H A Deapol_auth_sm.c1053 const char *keyname)
1056 return sm->eapol->cb.erp_get_key(sm->eapol->conf.ctx, keyname);
1052 eapol_sm_erp_get_key(void *ctx, const char *keyname) argument
/freebsd-current/crypto/openssh/regress/misc/fuzz-harness/
H A Dkex_fuzz.cc183 char *myproposal[PROPOSAL_MAX] = {0}, *keyname = NULL; local
196 keyname = xstrdup(sshkey_ssh_name(privkey));
198 debug_f("%s %s clobber client %zu", kex, keyname,
201 debug_f("%s %s clobber server %zu", kex, keyname,
204 debug_f("%s %s noclobber", kex, keyname);
213 ccp = keyname;
248 free(keyname);
/freebsd-current/contrib/nvi/cl/
H A Dcl_term.c230 CHAR_T keyname[64]; local
245 nlen = SPRINTF(keyname,
246 SIZE(keyname), L("function key %d"),
250 return (seq_set(sp, keyname, nlen,
/freebsd-current/contrib/llvm-project/llvm/lib/Target/NVPTX/
H A DNVPTXUtilities.cpp69 std::string keyname = prop->getString().str(); local
70 if (retval.find(keyname) != retval.end())
71 retval[keyname].push_back(Val->getZExtValue());
75 retval[keyname] = tmp;
/freebsd-current/sbin/savecore/
H A Dsavecore.c285 writekey(int savedirfd, const char *keyname, uint8_t *dumpkey, argument
290 fd = openat(savedirfd, keyname, O_WRONLY | O_CREAT | O_TRUNC, 0600);
293 keyname);
298 logmsg(LOG_ERR, "Unable to write the key to %s: %m.", keyname);
926 char infoname[32], corename[32], linkname[32], keyname[32]; local
1201 snprintf(keyname, sizeof(keyname), "key.%d", bounds);
1202 ret = writekey(savedirfd, keyname, dumpkey, dumpkeysize);
1241 if (symlinkat(keyname, savedirfd, "key.last") == -1) {
/freebsd-current/contrib/smbfs/lib/smb/
H A Drcfile.c56 static struct rckey *rc_sect_findkey(struct rcsection *rsp, const char *keyname);
192 rc_sect_findkey(struct rcsection *rsp, const char *keyname) argument
197 if (strcmp(p->rk_name, keyname)==0)
288 continue; /* become 'keyname=' */
/freebsd-current/contrib/wpa/src/eap_server/
H A Deap.h106 const char *keyname);
H A Deap_server.c63 const char *keyname)
66 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname);
848 if (!parse.keyname) {
855 parse.keyname, parse.keyname_len);
861 os_memcpy(nai, parse.keyname, parse.keyname_len);
874 sm->identity = (u8 *) dup_binstr(parse.keyname,
897 start = parse.keyname + parse.keyname_len;
2030 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname)
2034 parse.keyname, parse.keyname_len);
2038 os_memcpy(sm->identity, parse.keyname, pars
62 eap_erp_get_key(struct eap_sm *sm, const char *keyname) argument
[all...]
/freebsd-current/crypto/openssh/regress/unittests/authopt/
H A Dtests.c387 #define PREPARE(label, keyname, keywords) \
391 cert = load_key(keyname ".cert"); \
422 #define FLAG_CASE(keybase, label, keyname, keywords, mostly_off, var, val) \
424 PREPARE(keybase " " label, keyname, keywords); \
/freebsd-current/crypto/openssl/apps/
H A Dpkcs12.c157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; local
284 keyname = opt_arg();
383 if (keyname != NULL)
535 key = load_key(keyname ? keyname : infile,
537 keyname ?
/freebsd-current/contrib/ncurses/test/
H A Dmove_field.c100 const char *code = keyname(commands[n].code);
299 keyname(DO_DEMO));
H A Ddup_field.c91 const char *code = keyname(commands[n].code);
/freebsd-current/contrib/ldns/
H A Dtsig.c30 return tc->keyname;
42 return strdup(tc->keyname);
/freebsd-current/contrib/dialog/
H A Dtrace.c195 if (fkey > KEY_MAX || (fkey_name = keyname(fkey)) == 0) {
/freebsd-current/contrib/libpcap/
H A Dpcap-npf.c1450 char keyname[512]; local
1452 snprintf(keyname, sizeof(keyname), "%s\\CardParams\\%s",
1457 status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, keyname, 0, KEY_READ, &dagkey);
/freebsd-current/crypto/openssl/test/
H A Devp_test.c3092 char *keyname; /* Key name to store key or NULL */ member in struct:keygen_test_data_st
3122 data->keyname = NULL;
3137 OPENSSL_free(keygen->keyname);
3148 return TEST_ptr(keygen->keyname = OPENSSL_strdup(value));
3166 TEST_info("Warning: legacy key generated %s", keygen->keyname);
3169 if (keygen->keyname != NULL) {
3173 if (find_key(NULL, keygen->keyname, private_keys)) {
3174 TEST_info("Duplicate key %s", keygen->keyname);
3180 key->name = keygen->keyname;
3181 keygen->keyname
[all...]
/freebsd-current/contrib/wpa/src/eap_peer/
H A Deap.c1878 if (!parse.keyname) {
1885 parse.keyname, parse.keyname_len);
1891 os_memcpy(nai, parse.keyname, parse.keyname_len);
1902 start = parse.keyname + parse.keyname_len;

Completed in 454 milliseconds

12