Home
last modified time | relevance | path

Searched refs:keyname (Results 1 – 25 of 52) sorted by relevance

123

/freebsd/contrib/sendmail/editmap/
H A Deditmap.c90 char *keyname = NULL; local
192 keyname = argv[2];
200 lower = makelower(keyname);
203 if (keyname != lower)
204 keyname = lower;
321 db_key.data = keyname;
322 db_key.size = strlen(keyname);
332 progname, keyname, mapname);
346 db_key.data = keyname;
347 db_key.size = strlen(keyname);
[all …]
/freebsd/crypto/openssh/regress/unittests/kex/
H A Dtest_kex.c85 char *keyname = NULL; in do_kex_with_key() local
99 keyname = strdup(sshkey_ssh_name(private)); in do_kex_with_key()
100 ASSERT_PTR_NE(keyname, NULL); in do_kex_with_key()
101 kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname; in do_kex_with_key()
173 free(keyname); in do_kex_with_key()
/freebsd/crypto/openssh/regress/misc/fuzz-harness/
H A Dkex_fuzz.cc183 char *myproposal[PROPOSAL_MAX] = {0}, *keyname = NULL; in do_kex_with_key() local
196 keyname = xstrdup(sshkey_ssh_name(privkey)); in do_kex_with_key()
198 debug_f("%s %s clobber client %zu", kex, keyname, in do_kex_with_key()
201 debug_f("%s %s clobber server %zu", kex, keyname, in do_kex_with_key()
204 debug_f("%s %s noclobber", kex, keyname); in do_kex_with_key()
213 ccp = keyname; in do_kex_with_key()
248 free(keyname); in do_kex_with_key()
/freebsd/crypto/openssh/regress/unittests/sshsig/
H A Dtests.c55 check_sig(const char *keyname, const char *signame, const struct sshbuf *msg, in check_sig() argument
62 k = load_key(keyname); in check_sig()
/freebsd/contrib/nvi/cl/
H A Dcl_term.c230 CHAR_T keyname[64]; in cl_pfmap() local
245 nlen = SPRINTF(keyname, in cl_pfmap()
246 SIZE(keyname), L("function key %d"), in cl_pfmap()
250 return (seq_set(sp, keyname, nlen, in cl_pfmap()
/freebsd/contrib/llvm-project/llvm/lib/Target/NVPTX/
H A DNVPTXUtilities.cpp69 std::string keyname = prop->getString().str(); in cacheAnnotationFromMD() local
70 if (retval.find(keyname) != retval.end()) in cacheAnnotationFromMD()
71 retval[keyname].push_back(Val->getZExtValue()); in cacheAnnotationFromMD()
75 retval[keyname] = tmp; in cacheAnnotationFromMD()
/freebsd/sbin/savecore/
H A Dsavecore.c285 writekey(int savedirfd, const char *keyname, uint8_t *dumpkey, in writekey() argument
290 fd = openat(savedirfd, keyname, O_WRONLY | O_CREAT | O_TRUNC, 0600); in writekey()
293 keyname); in writekey()
298 logmsg(LOG_ERR, "Unable to write the key to %s: %m.", keyname); in writekey()
926 char infoname[32], corename[32], linkname[32], keyname[32]; in DoFile() local
1201 snprintf(keyname, sizeof(keyname), "key.%d", bounds); in DoFile()
1202 ret = writekey(savedirfd, keyname, dumpkey, dumpkeysize); in DoFile()
1241 if (symlinkat(keyname, savedirfd, "key.last") == -1) { in DoFile()
/freebsd/contrib/wpa/src/eap_common/
H A Deap_common.c247 if (tlvs->keyname) { in erp_parse_tlvs()
252 tlvs->keyname = pos; in erp_parse_tlvs()
H A Deap_common.h15 const u8 *keyname; member
/freebsd/crypto/openssh/regress/unittests/authopt/
H A Dtests.c387 #define PREPARE(label, keyname, keywords) \ in test_merge() argument
391 cert = load_key(keyname ".cert"); \ in test_merge()
422 #define FLAG_CASE(keybase, label, keyname, keywords, mostly_off, var, val) \ in test_merge() argument
424 PREPARE(keybase " " label, keyname, keywords); \ in test_merge()
/freebsd/contrib/ldns/ldns/
H A Dtsig.h29 const char *keyname; member
/freebsd/contrib/ncurses/ncurses/trace/
H A Dtrace_tries.c60 _nc_visbuf((char *) my_buffer), keyname(tree->value)); in recur_tries()
/freebsd/contrib/smbfs/lib/smb/
H A Drcfile.c56 static struct rckey *rc_sect_findkey(struct rcsection *rsp, const char *keyname);
192 rc_sect_findkey(struct rcsection *rsp, const char *keyname) in rc_sect_findkey() argument
197 if (strcmp(p->rk_name, keyname)==0) in rc_sect_findkey()
/freebsd/crypto/openssl/apps/
H A Dpkcs12.c157 char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL; in pkcs12_main() local
284 keyname = opt_arg(); in pkcs12_main()
383 if (keyname != NULL) in pkcs12_main()
535 key = load_key(keyname ? keyname : infile, in pkcs12_main()
537 keyname ? in pkcs12_main()
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server.c63 const char *keyname) in eap_erp_get_key() argument
66 return sm->eapol_cb->erp_get_key(sm->eapol_ctx, keyname); in eap_erp_get_key()
848 if (!parse.keyname) { in SM_STATE()
855 parse.keyname, parse.keyname_len); in SM_STATE()
861 os_memcpy(nai, parse.keyname, parse.keyname_len); in SM_STATE()
874 sm->identity = (u8 *) dup_binstr(parse.keyname, in SM_STATE()
897 start = parse.keyname + parse.keyname_len; in SM_STATE()
2030 if (erp_parse_tlvs(pos, end, &parse, 1) < 0 || !parse.keyname) in eap_erp_update_identity()
2034 parse.keyname, parse.keyname_len); in eap_erp_update_identity()
2038 os_memcpy(sm->identity, parse.keyname, parse.keyname_len); in eap_erp_update_identity()
H A Deap.h106 const char *keyname);
/freebsd/contrib/wpa/src/eapol_auth/
H A Deapol_auth_sm.h60 const char *keyname);
/freebsd/crypto/openssl/doc/man3/
H A DSSL_CTX_set_session_ticket_cb.pod17 const unsigned char *keyname,
44 the session data. The B<keyname> and B<keyname_len> arguments identify the key
73 The B<keyname> and B<keyname_len> arguments to B<dec_cb> may be used to identify
/freebsd/contrib/ncurses/test/
H A Dmove_field.c100 const char *code = keyname(commands[n].code); in my_help_edit_field()
299 keyname(DO_DEMO)); in show_status()
H A Ddup_field.c91 const char *code = keyname(commands[n].code); in my_help_edit_field()
/freebsd/contrib/ldns/
H A Dtsig.c30 return tc->keyname; in ldns_tsig_keyname()
42 return strdup(tc->keyname); in ldns_tsig_keyname_clone()
/freebsd/contrib/libpcap/
H A Dpcap-npf.c1450 char keyname[512]; in pcap_activate_npf() local
1452 snprintf(keyname, sizeof(keyname), "%s\\CardParams\\%s", in pcap_activate_npf()
1457 status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, keyname, 0, KEY_READ, &dagkey); in pcap_activate_npf()
/freebsd/contrib/dialog/
H A Dtrace.c195 if (fkey > KEY_MAX || (fkey_name = keyname(fkey)) == 0) { in dlg_trace_chr()
/freebsd/crypto/openssl/test/
H A Devp_test.c3092 char *keyname; /* Key name to store key or NULL */ member
3122 data->keyname = NULL; in keygen_test_init()
3137 OPENSSL_free(keygen->keyname); in keygen_test_cleanup()
3148 return TEST_ptr(keygen->keyname = OPENSSL_strdup(value)); in keygen_test_parse()
3166 TEST_info("Warning: legacy key generated %s", keygen->keyname); in keygen_test_run()
3169 if (keygen->keyname != NULL) { in keygen_test_run()
3173 if (find_key(NULL, keygen->keyname, private_keys)) { in keygen_test_run()
3174 TEST_info("Duplicate key %s", keygen->keyname); in keygen_test_run()
3180 key->name = keygen->keyname; in keygen_test_run()
3181 keygen->keyname = NULL; in keygen_test_run()
/freebsd/lib/libsecureboot/
H A DREADME.rst37 --quick-generate-key --batch --passphrase '' "keyname" RSA

123