/freebsd/contrib/sendmail/editmap/ |
H A D | editmap.c | 90 char *keyname = NULL; local 192 keyname = argv[2]; 200 lower = makelower(keyname); 203 if (keyname != lower) 204 keyname = lower; 321 db_key.data = keyname; 322 db_key.size = strlen(keyname); 332 progname, keyname, mapname); 346 db_key.data = keyname; 347 db_key.size = strlen(keyname); [all …]
|
/freebsd/crypto/openssh/regress/unittests/kex/ |
H A D | test_kex.c | 85 char *keyname = NULL; in do_kex_with_key() local 99 keyname = strdup(sshkey_ssh_name(private)); in do_kex_with_key() 100 ASSERT_PTR_NE(keyname, NULL); in do_kex_with_key() 101 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname; in do_kex_with_key() 173 free(keyname); in do_kex_with_key()
|
/freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | kex_fuzz.cc | 183 char *myproposal[PROPOSAL_MAX] = {0}, *keyname = NULL; in do_kex_with_key() local 196 keyname = xstrdup(sshkey_ssh_name(privkey)); in do_kex_with_key() 198 debug_f("%s %s clobber client %zu", kex, keyname, in do_kex_with_key() 201 debug_f("%s %s clobber server %zu", kex, keyname, in do_kex_with_key() 204 debug_f("%s %s noclobber", kex, keyname); in do_kex_with_key() 213 ccp = keyname; in do_kex_with_key() 248 free(keyname); in do_kex_with_key()
|
/freebsd/crypto/openssh/regress/unittests/sshsig/ |
H A D | tests.c | 55 check_sig(const char *keyname, const char *signame, const struct sshbuf *msg, in check_sig() argument 62 k = load_key(keyname); in check_sig()
|
/freebsd/contrib/nvi/cl/ |
H A D | cl_term.c | 230 CHAR_T keyname[64]; in cl_pfmap() local 245 nlen = SPRINTF(keyname, in cl_pfmap() 246 SIZE(keyname), L("function key %d"), in cl_pfmap() 250 return (seq_set(sp, keyname, nlen, in cl_pfmap()
|
/freebsd/sbin/savecore/ |
H A D | savecore.c | 285 writekey(int savedirfd, const char *keyname, uint8_t *dumpkey, in writekey() argument 290 fd = openat(savedirfd, keyname, O_WRONLY | O_CREAT | O_TRUNC, 0600); in writekey() 293 keyname); in writekey() 298 logmsg(LOG_ERR, "Unable to write the key to %s: %m.", keyname); in writekey() 926 char infoname[32], corename[32], linkname[32], keyname[32]; in DoFile() local 1201 snprintf(keyname, sizeof(keyname), "key.%d", bounds); in DoFile() 1202 ret = writekey(savedirfd, keyname, dumpkey, dumpkeysize); in DoFile() 1241 if (symlinkat(keyname, savedirfd, "key.last") == -1) { in DoFile()
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | eap_common.c | 247 if (tlvs->keyname) { in erp_parse_tlvs() 252 tlvs->keyname = pos; in erp_parse_tlvs()
|
H A D | eap_common.h | 15 const u8 *keyname; member
|
/freebsd/crypto/openssh/regress/unittests/authopt/ |
H A D | tests.c | 387 #define PREPARE(label, keyname, keywords) \ in test_merge() argument 391 cert = load_key(keyname ".cert"); \ in test_merge() 422 #define FLAG_CASE(keybase, label, keyname, keywords, mostly_off, var, val) \ in test_merge() argument 424 PREPARE(keybase " " label, keyname, keywords); \ in test_merge()
|
/freebsd/contrib/ncurses/ncurses/trace/ |
H A D | trace_tries.c | 60 _nc_visbuf((char *) my_buffer), keyname(tree->value)); in recur_tries()
|
/freebsd/contrib/ldns/ldns/ |
H A D | tsig.h | 29 const char *keyname; member
|
/freebsd/contrib/smbfs/lib/smb/ |
H A D | rcfile.c | 56 static struct rckey *rc_sect_findkey(struct rcsection *rsp, const char *keyname); 192 rc_sect_findkey(struct rcsection *rsp, const char *keyname) in rc_sect_findkey() argument 197 if (strcmp(p->rk_name, keyname)==0) in rc_sect_findkey()
|
/freebsd/crypto/openssl/apps/ |
H A D | pkcs12.c | 157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; in pkcs12_main() local 284 keyname = opt_arg(); in pkcs12_main() 383 if (keyname != NULL) in pkcs12_main() 535 key = load_key(keyname ? keyname : infile, in pkcs12_main() 537 keyname ? in pkcs12_main()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server.c | 63 const char *keyname) in eap_erp_get_key() argument 66 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); in eap_erp_get_key() 848 if (!parse.keyname) { in SM_STATE() 855 parse.keyname, parse.keyname_len); in SM_STATE() 861 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE() 874 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE() 897 start = parse.keyname + parse.keyname_len; in SM_STATE() 2030 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) in eap_erp_update_identity() 2034 parse.keyname, parse.keyname_len); in eap_erp_update_identity() 2038 os_memcpy(sm->identity, parse.keyname, parse.keyname_len); in eap_erp_update_identity()
|
H A D | eap.h | 106 const char *keyname);
|
/freebsd/contrib/wpa/src/eapol_auth/ |
H A D | eapol_auth_sm.h | 61 const char *keyname);
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_set_session_ticket_cb.pod | 17 const unsigned char *keyname, 44 the session data. The B<keyname> and B<keyname_len> arguments identify the key 73 The B<keyname> and B<keyname_len> arguments to B<dec_cb> may be used to identify
|
/freebsd/contrib/ldns/ |
H A D | tsig.c | 30 return tc->keyname; in ldns_tsig_keyname() 42 return strdup(tc->keyname); in ldns_tsig_keyname_clone()
|
/freebsd/contrib/libpcap/ |
H A D | pcap-npf.c | 1472 char keyname[512]; in pcap_activate_npf() local 1474 snprintf(keyname, sizeof(keyname), "%s\\CardParams\\%s", in pcap_activate_npf() 1479 status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, keyname, 0, KEY_READ, &dagkey); in pcap_activate_npf()
|
/freebsd/contrib/dialog/ |
H A D | trace.c | 195 if (fkey > KEY_MAX || (fkey_name = keyname(fkey)) == 0) { in dlg_trace_chr()
|
/freebsd/crypto/openssl/test/ |
H A D | evp_test.c | 3095 char *keyname; /* Key name to store key or NULL */ in keygen_test_init() 3125 data->keyname = NULL; in keygen_test_init() 3140 OPENSSL_free(keygen->keyname); in keygen_test_cleanup() 3151 return TEST_ptr(keygen->keyname = OPENSSL_strdup(value)); in keygen_test_parse() 3169 TEST_info("Warning: legacy key generated %s", keygen->keyname); in keygen_test_run() 3172 if (keygen->keyname != NULL) { in keygen_test_run() 3176 if (find_key(NULL, keygen->keyname, private_keys)) { in keygen_test_run() 3177 TEST_info("Duplicate key %s", keygen->keyname); in keygen_test_run() 3183 key->name = keygen->keyname; in keygen_test_run() 3184 keygen->keyname in keygen_test_run() 3092 char *keyname; /* Key name to store key or NULL */ global() member [all...] |
/freebsd/contrib/ncurses/man/ |
H A D | man_db.renames.in | 215 keyname.3x keyname.3ncurses
|
H A D | manhtml.aliases | 69 keyname(3X) curs_util(3X)
|
/freebsd/lib/libsecureboot/ |
H A D | README.rst | 37 --quick-generate-key --batch --passphrase '' "keyname" RSA
|
/freebsd/contrib/wpa/src/radius/ |
H A D | radius_server.c | 543 radius_server_erp_find_key(struct radius_server_data *data, const char *keyname) in radius_server_erp_find_key() argument 549 if (os_strcmp(erp->keyname_nai, keyname) == 0) in radius_server_erp_find_key() 2573 radius_server_erp_get_key(void *ctx, const char *keyname) in radius_server_erp_get_key() argument 2578 return radius_server_erp_find_key(data, keyname); in radius_server_erp_get_key()
|