/freebsd-current/contrib/sendmail/editmap/ |
H A D | editmap.c | 90 char *keyname = NULL; local 192 keyname = argv[2]; 200 lower = makelower(keyname); 203 if (keyname != lower) 204 keyname = lower; 321 db_key.data = keyname; 322 db_key.size = strlen(keyname); 332 progname, keyname, mapname); 346 db_key.data = keyname; 347 db_key.size = strlen(keyname); [all...] |
/freebsd-current/contrib/wpa/src/eap_common/ |
H A D | eap_common.h | 15 const u8 *keyname; member in struct:erp_tlvs
|
H A D | eap_common.c | 247 if (tlvs->keyname) { 252 tlvs->keyname = pos;
|
/freebsd-current/contrib/ldns/ldns/ |
H A D | tsig.h | 29 const char *keyname; member in struct:ldns_tsig_credentials_struct
|
/freebsd-current/contrib/ncurses/ncurses/trace/ |
H A D | trace_tries.c | 60 _nc_visbuf((char *) my_buffer), keyname(tree->value));
|
/freebsd-current/crypto/openssh/regress/unittests/kex/ |
H A D | test_kex.c | 85 char *keyname = NULL; local 99 keyname = strdup(sshkey_ssh_name(private)); 100 ASSERT_PTR_NE(keyname, NULL); 101 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname; 173 free(keyname);
|
/freebsd-current/crypto/openssh/regress/unittests/sshsig/ |
H A D | tests.c | 55 check_sig(const char *keyname, const char *signame, const struct sshbuf *msg, argument 62 k = load_key(keyname);
|
/freebsd-current/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 60 const char *keyname);
|
H A D | eapol_auth_sm.c | 1053 const char *keyname) 1056 return sm->eapol->cb.erp_get_key(sm->eapol->conf.ctx, keyname); 1052 eapol_sm_erp_get_key(void *ctx, const char *keyname) argument
|
/freebsd-current/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | kex_fuzz.cc | 183 char *myproposal[PROPOSAL_MAX] = {0}, *keyname = NULL; local 196 keyname = xstrdup(sshkey_ssh_name(privkey)); 198 debug_f("%s %s clobber client %zu", kex, keyname, 201 debug_f("%s %s clobber server %zu", kex, keyname, 204 debug_f("%s %s noclobber", kex, keyname); 213 ccp = keyname; 248 free(keyname);
|
/freebsd-current/contrib/nvi/cl/ |
H A D | cl_term.c | 230 CHAR_T keyname[64]; local 245 nlen = SPRINTF(keyname, 246 SIZE(keyname), L("function key %d"), 250 return (seq_set(sp, keyname, nlen,
|
/freebsd-current/contrib/llvm-project/llvm/lib/Target/NVPTX/ |
H A D | NVPTXUtilities.cpp | 69 std::string keyname = prop->getString().str(); local 70 if (retval.find(keyname) != retval.end()) 71 retval[keyname].push_back(Val->getZExtValue()); 75 retval[keyname] = tmp;
|
/freebsd-current/sbin/savecore/ |
H A D | savecore.c | 285 writekey(int savedirfd, const char *keyname, uint8_t *dumpkey, argument 290 fd = openat(savedirfd, keyname, O_WRONLY | O_CREAT | O_TRUNC, 0600); 293 keyname); 298 logmsg(LOG_ERR, "Unable to write the key to %s: %m.", keyname); 926 char infoname[32], corename[32], linkname[32], keyname[32]; local 1201 snprintf(keyname, sizeof(keyname), "key.%d", bounds); 1202 ret = writekey(savedirfd, keyname, dumpkey, dumpkeysize); 1241 if (symlinkat(keyname, savedirfd, "key.last") == -1) {
|
/freebsd-current/contrib/smbfs/lib/smb/ |
H A D | rcfile.c | 56 static struct rckey *rc_sect_findkey(struct rcsection *rsp, const char *keyname); 192 rc_sect_findkey(struct rcsection *rsp, const char *keyname) argument 197 if (strcmp(p->rk_name, keyname)==0) 288 continue; /* become 'keyname=' */
|
/freebsd-current/contrib/wpa/src/eap_server/ |
H A D | eap.h | 106 const char *keyname);
|
H A D | eap_server.c | 63 const char *keyname) 66 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); 848 if (!parse.keyname) { 855 parse.keyname, parse.keyname_len); 861 os_memcpy(nai, parse.keyname, parse.keyname_len); 874 sm->identity = (u8 *) dup_binstr(parse.keyname, 897 start = parse.keyname + parse.keyname_len; 2030 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) 2034 parse.keyname, parse.keyname_len); 2038 os_memcpy(sm->identity, parse.keyname, pars 62 eap_erp_get_key(struct eap_sm *sm, const char *keyname) argument [all...] |
/freebsd-current/crypto/openssh/regress/unittests/authopt/ |
H A D | tests.c | 387 #define PREPARE(label, keyname, keywords) \ 391 cert = load_key(keyname ".cert"); \ 422 #define FLAG_CASE(keybase, label, keyname, keywords, mostly_off, var, val) \ 424 PREPARE(keybase " " label, keyname, keywords); \
|
/freebsd-current/crypto/openssl/apps/ |
H A D | pkcs12.c | 157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; local 284 keyname = opt_arg(); 383 if (keyname != NULL) 535 key = load_key(keyname ? keyname : infile, 537 keyname ?
|
/freebsd-current/contrib/ncurses/test/ |
H A D | move_field.c | 100 const char *code = keyname(commands[n].code); 299 keyname(DO_DEMO));
|
H A D | dup_field.c | 91 const char *code = keyname(commands[n].code);
|
/freebsd-current/contrib/ldns/ |
H A D | tsig.c | 30 return tc->keyname; 42 return strdup(tc->keyname);
|
/freebsd-current/contrib/dialog/ |
H A D | trace.c | 195 if (fkey > KEY_MAX || (fkey_name = keyname(fkey)) == 0) {
|
/freebsd-current/contrib/libpcap/ |
H A D | pcap-npf.c | 1450 char keyname[512]; local 1452 snprintf(keyname, sizeof(keyname), "%s\\CardParams\\%s", 1457 status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, keyname, 0, KEY_READ, &dagkey);
|
/freebsd-current/crypto/openssl/test/ |
H A D | evp_test.c | 3092 char *keyname; /* Key name to store key or NULL */ member in struct:keygen_test_data_st 3122 data->keyname = NULL; 3137 OPENSSL_free(keygen->keyname); 3148 return TEST_ptr(keygen->keyname = OPENSSL_strdup(value)); 3166 TEST_info("Warning: legacy key generated %s", keygen->keyname); 3169 if (keygen->keyname != NULL) { 3173 if (find_key(NULL, keygen->keyname, private_keys)) { 3174 TEST_info("Duplicate key %s", keygen->keyname); 3180 key->name = keygen->keyname; 3181 keygen->keyname [all...] |
/freebsd-current/contrib/wpa/src/eap_peer/ |
H A D | eap.c | 1878 if (!parse.keyname) { 1885 parse.keyname, parse.keyname_len); 1891 os_memcpy(nai, parse.keyname, parse.keyname_len); 1902 start = parse.keyname + parse.keyname_len;
|