| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| keydump.c | 33 const char *key_name = "com.apple.srp-client.host-key"; local 36 key = srp_get_key(key_name, NULL); 39 printf("Unable to load key from %s.", key_name);
|
| srp-filedata.c | 174 srp_load_key_data(void *host_context, const char *key_name, uint8_t *buffer, uint16_t *length, uint16_t buffer_size) 176 if (srp_load_file_data(host_context, key_name, buffer, length, buffer_size)) { 183 srp_store_key_data(void *host_context, const char *key_name, uint8_t *buffer, uint16_t length) 185 if (!srp_store_file_data(host_context, key_name, buffer, length)) { 192 srp_remove_key_file(void *host_context, const char *key_name) 194 if (unlink(key_name) < 0) {
|
| sign-macos.c | 101 srp_get_key_internal(const char *key_name, bool delete) 118 CFStringRef str = CFStringCreateWithCString(NULL, key_name, kCFStringEncodingUTF8); 173 (void)key_name; 179 srp_get_key(const char *key_name, void *__unused os_context) 181 return srp_get_key_internal(key_name, false); 186 srp_reset_key(const char *key_name, void *__unused os_context) 188 srp_get_key_internal(key_name, true);
|
| srp-crypto.h | 124 int srp_load_key_data(void *NULLABLE host_context, const char *NONNULL key_name, 132 int srp_store_key_data(void *NULLABLE host_context, const char *NONNULL key_name, uint8_t *NONNULL buffer, 135 int srp_remove_key_file(void *NULLABLE host_context, const char *NONNULL key_name);
|
| srp-api.h | 113 srp_key_t *NULLABLE srp_get_key(const char *NONNULL key_name, void *NULLABLE host_context); 116 int srp_reset_key(const char *NONNULL key_name, void *NULLABLE host_context);
|
| sign-mbedtls.c | 340 srp_get_key(const char *key_name, void *os_context) 349 err = srp_load_key_data(os_context, key_name, buf, &buf_length, sizeof buf); 369 err = srp_store_key_data(os_context, key_name, key_bytes, (uint16_t)keydata_length); 502 srp_reset_key(const char *key_name, void *UNUSED os_context) 504 return srp_remove_key_file(os_context, key_name);
|
| /src/sys/external/bsd/drm2/dist/drm/amd/display/amdgpu_dm/ |
| amdgpu_dm_services.c | 58 const char *key_name, 70 const char *key_name,
|
| /src/external/mpl/bind/dist/bin/tests/system/ |
| ans.pl | 175 my($dbtype, $key_name, $key_data) = split(/ /,$pattern); 176 print "[handleUDP] $dbtype, $key_name, $key_data\n"; 182 if (defined($key_name) && defined($key_data)) { 186 "$key_name/$key_data\n"; 190 "$key_name TSIG $key_data"); 193 name => $key_name, 394 my($dbtype, $key_name, $key_data, $tname) = split(/ /,$pattern); 395 print "[handleTCP] $dbtype, $key_name, $key_data, $tname \n"; 401 while (defined($key_name) && 402 ($key_name eq "NOTIMP" || $key_name eq "EDNS=NOTIMP" | [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/xfer-servers-list/ |
| tests_xfer_servers_list.py | 34 def wait_for_sending_notify(ns1, ns, key_name): 36 f"zone test/IN: sending notify to {ns.ip}#[0-9]+ : TSIG \\({key_name}\\)" 56 for ns, key_name in seq: 57 wait_for_sending_notify(ns1, ns, key_name)
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| fake_cipherprov.c | 25 char key_name[MAX_KEYNAME]; member in struct:prov_cipher_fake_ctx_st 32 char key_name[MAX_KEYNAME]; local 33 char *pval = key_name; 35 memset(key_name, 0, MAX_KEYNAME); 39 if (!OSSL_PARAM_get_utf8_string(p, &pval, sizeof(key_name))) { 44 memcpy(pctx->key_name, key_name, sizeof(key_name)); 88 ctx->key_name, 89 strlen(ctx->key_name)); [all...] |
| /src/external/bsd/nsd/dist/contrib/ |
| nsd.zones2nsd.conf | 45 key_name = key_content.readline() 46 key_name = key_name[:-1] 56 key = key_name 57 keys[key_name] = {
|
| /src/crypto/external/apache2/openssl/dist/apps/ |
| skeyutl.c | 115 const char *key_name = EVP_SKEY_get0_key_id(skey); local 118 key_name ? key_name : "<unknown>");
|
| /src/crypto/external/apache2/openssl/dist/crypto/asn1/ |
| d2i_pr.c | 36 const char *key_name = NULL; local 45 key_name = evp_pkey_type2name(keytype); 46 if (key_name == NULL) 65 if (key_name == NULL 68 key_name = keytypebuf; 78 dctx = OSSL_DECODER_CTX_new_for_pkey(ppkey, "DER", structure, key_name,
|
| /src/external/bsd/nsd/dist/ |
| tsig.c | 109 dname_name(tsig->key_name), 110 tsig->key_name->name_size); 355 key = (tsig_key_type*)tsig_find_key(tsig->key_name); 447 tsig->key_name = tsig->key->name; 591 tsig->key_name = NULL; 597 tsig->key_name = dname_make_from_packet(tsig->rr_region, packet, 1, 1); 598 if (!tsig->key_name) { 677 if(tsig->key_name) 678 buffer_write(packet, dname_name(tsig->key_name), 679 tsig->key_name->name_size) [all...] |
| axfr.c | 226 : acl->key_name ) 261 acl->ip_address_spec, acl->key_name?acl->key_name:"NOKEY", 266 acl->ip_address_spec, acl->key_name?acl->key_name:"NOKEY"));
|
| tsig.h | 120 const dname_type *key_name; member in struct:tsig_record
|
| options.c | 297 acl->key_options = key_options_find(opt, acl->key_name); 300 acl->key_name, pat->pname); 306 acl->key_options = key_options_find(opt, acl->key_name); 309 acl->key_name, pat->pname); 323 acl->key_options = key_options_find(opt, acl->key_name); 326 acl->key_name, pat->pname); 339 acl->key_options = key_options_find(opt, acl->key_name); 342 acl->key_name, pat->pname); 348 acl->key_options = key_options_find(opt, acl->key_name); 351 acl->key_name, pat->pname) [all...] |
| nsd-checkconf.c | 210 (acl->key_name?acl->key_name:"(null)")), 215 (acl->key_name?acl->key_name:"(null)"))); 233 (acl->key_name?acl->key_name:"(null)")), 238 (acl->key_name?acl->key_name:"(null)")));
|
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| p_lib.c | 2219 int EVP_PKEY_get_bn_param(const EVP_PKEY *pkey, const char *key_name, 2228 if (key_name == NULL 2233 params[0] = OSSL_PARAM_construct_BN(key_name, buffer, sizeof(buffer)); 2268 int EVP_PKEY_get_octet_string_param(const EVP_PKEY *pkey, const char *key_name, 2275 if (key_name == NULL) 2278 params[0] = OSSL_PARAM_construct_octet_string(key_name, buf, max_buf_sz); 2287 int EVP_PKEY_get_utf8_string_param(const EVP_PKEY *pkey, const char *key_name, 2294 if (key_name == NULL) 2297 params[0] = OSSL_PARAM_construct_utf8_string(key_name, str, max_buf_sz); 2314 int EVP_PKEY_get_int_param(const EVP_PKEY *pkey, const char *key_name, [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| p_lib.c | 2154 int EVP_PKEY_get_bn_param(const EVP_PKEY *pkey, const char *key_name, 2163 if (key_name == NULL 2168 params[0] = OSSL_PARAM_construct_BN(key_name, buffer, sizeof(buffer)); 2203 int EVP_PKEY_get_octet_string_param(const EVP_PKEY *pkey, const char *key_name, 2210 if (key_name == NULL) 2213 params[0] = OSSL_PARAM_construct_octet_string(key_name, buf, max_buf_sz); 2222 int EVP_PKEY_get_utf8_string_param(const EVP_PKEY *pkey, const char *key_name, 2229 if (key_name == NULL) 2232 params[0] = OSSL_PARAM_construct_utf8_string(key_name, str, max_buf_sz); 2249 int EVP_PKEY_get_int_param(const EVP_PKEY *pkey, const char *key_name, [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/asn1/ |
| d2i_pr.c | 34 const char *key_name = NULL; local 39 key_name = evp_pkey_type2name(keytype); 40 if (key_name == NULL) 50 input_structures[i], key_name,
|
| /src/sys/dev/ic/ |
| apple_smc_fan.c | 327 char key_name[4 + 1]; local 336 (void)snprintf(key_name, sizeof(key_name), "F%d%s", 338 KASSERT(strlen(key_name) == 4); 342 error = apple_smc_named_key(sc->sc_smc, key_name, APPLE_SMC_TYPE_FPE2,
|
| /src/external/bsd/unbound/dist/util/ |
| net_help.c | 97 unsigned char *key_name; member in struct:tls_session_ticket_key 109 * @param key_name: secret name, 16 bytes 119 int tls_session_ticket_key_cb(SSL *s, unsigned char* key_name, 1839 keys->key_name = data; 1845 keys->key_name = NULL; 1854 int tls_session_ticket_key_cb(SSL *ATTR_UNUSED(sslctx), unsigned char* key_name, variable 1879 memcpy(key_name, ticket_keys->key_name, 16); 1912 for(key = ticket_keys; key->key_name != NULL; key++) { 1913 if (!memcmp(key_name, key->key_name, 16)) [all...] |
| /src/sys/external/bsd/drm2/dist/drm/amd/display/dc/ |
| dm_services.h | 296 const char *key_name, 330 const char *key_name,
|
| /src/usr.sbin/inetd/ |
| parse_v2.c | 558 char *key_name, save, *cp = *cpp; local 569 key_name = cp; 589 handler = get_handler(key_name); 592 ERR("Unknown option '%s'", key_name);
|