HomeSort by: relevance | last modified time | path
    Searched refs:key_name (Results 1 - 25 of 65) sorted by relevancy

1 2 3

  /src/external/apache2/mDNSResponder/dist/ServiceRegistration/
keydump.c 33 const char *key_name = "com.apple.srp-client.host-key"; local
36 key = srp_get_key(key_name, NULL);
39 printf("Unable to load key from %s.", key_name);
srp-filedata.c 174 srp_load_key_data(void *host_context, const char *key_name, uint8_t *buffer, uint16_t *length, uint16_t buffer_size)
176 if (srp_load_file_data(host_context, key_name, buffer, length, buffer_size)) {
183 srp_store_key_data(void *host_context, const char *key_name, uint8_t *buffer, uint16_t length)
185 if (!srp_store_file_data(host_context, key_name, buffer, length)) {
192 srp_remove_key_file(void *host_context, const char *key_name)
194 if (unlink(key_name) < 0) {
sign-macos.c 101 srp_get_key_internal(const char *key_name, bool delete)
118 CFStringRef str = CFStringCreateWithCString(NULL, key_name, kCFStringEncodingUTF8);
173 (void)key_name;
179 srp_get_key(const char *key_name, void *__unused os_context)
181 return srp_get_key_internal(key_name, false);
186 srp_reset_key(const char *key_name, void *__unused os_context)
188 srp_get_key_internal(key_name, true);
srp-crypto.h 124 int srp_load_key_data(void *NULLABLE host_context, const char *NONNULL key_name,
132 int srp_store_key_data(void *NULLABLE host_context, const char *NONNULL key_name, uint8_t *NONNULL buffer,
135 int srp_remove_key_file(void *NULLABLE host_context, const char *NONNULL key_name);
srp-api.h 113 srp_key_t *NULLABLE srp_get_key(const char *NONNULL key_name, void *NULLABLE host_context);
116 int srp_reset_key(const char *NONNULL key_name, void *NULLABLE host_context);
sign-mbedtls.c 340 srp_get_key(const char *key_name, void *os_context)
349 err = srp_load_key_data(os_context, key_name, buf, &buf_length, sizeof buf);
369 err = srp_store_key_data(os_context, key_name, key_bytes, (uint16_t)keydata_length);
502 srp_reset_key(const char *key_name, void *UNUSED os_context)
504 return srp_remove_key_file(os_context, key_name);
  /src/sys/external/bsd/drm2/dist/drm/amd/display/amdgpu_dm/
amdgpu_dm_services.c 58 const char *key_name,
70 const char *key_name,
  /src/external/mpl/bind/dist/bin/tests/system/
ans.pl 175 my($dbtype, $key_name, $key_data) = split(/ /,$pattern);
176 print "[handleUDP] $dbtype, $key_name, $key_data\n";
182 if (defined($key_name) && defined($key_data)) {
186 "$key_name/$key_data\n";
190 "$key_name TSIG $key_data");
193 name => $key_name,
394 my($dbtype, $key_name, $key_data, $tname) = split(/ /,$pattern);
395 print "[handleTCP] $dbtype, $key_name, $key_data, $tname \n";
401 while (defined($key_name) &&
402 ($key_name eq "NOTIMP" || $key_name eq "EDNS=NOTIMP" |
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/xfer-servers-list/
tests_xfer_servers_list.py 34 def wait_for_sending_notify(ns1, ns, key_name):
36 f"zone test/IN: sending notify to {ns.ip}#[0-9]+ : TSIG \\({key_name}\\)"
56 for ns, key_name in seq:
57 wait_for_sending_notify(ns1, ns, key_name)
  /src/crypto/external/apache2/openssl/dist/test/
fake_cipherprov.c 25 char key_name[MAX_KEYNAME]; member in struct:prov_cipher_fake_ctx_st
32 char key_name[MAX_KEYNAME]; local
33 char *pval = key_name;
35 memset(key_name, 0, MAX_KEYNAME);
39 if (!OSSL_PARAM_get_utf8_string(p, &pval, sizeof(key_name))) {
44 memcpy(pctx->key_name, key_name, sizeof(key_name));
88 ctx->key_name,
89 strlen(ctx->key_name));
    [all...]
  /src/external/bsd/nsd/dist/contrib/
nsd.zones2nsd.conf 45 key_name = key_content.readline()
46 key_name = key_name[:-1]
56 key = key_name
57 keys[key_name] = {
  /src/crypto/external/apache2/openssl/dist/apps/
skeyutl.c 115 const char *key_name = EVP_SKEY_get0_key_id(skey); local
118 key_name ? key_name : "<unknown>");
  /src/crypto/external/apache2/openssl/dist/crypto/asn1/
d2i_pr.c 36 const char *key_name = NULL; local
45 key_name = evp_pkey_type2name(keytype);
46 if (key_name == NULL)
65 if (key_name == NULL
68 key_name = keytypebuf;
78 dctx = OSSL_DECODER_CTX_new_for_pkey(ppkey, "DER", structure, key_name,
  /src/external/bsd/nsd/dist/
tsig.c 109 dname_name(tsig->key_name),
110 tsig->key_name->name_size);
355 key = (tsig_key_type*)tsig_find_key(tsig->key_name);
447 tsig->key_name = tsig->key->name;
591 tsig->key_name = NULL;
597 tsig->key_name = dname_make_from_packet(tsig->rr_region, packet, 1, 1);
598 if (!tsig->key_name) {
677 if(tsig->key_name)
678 buffer_write(packet, dname_name(tsig->key_name),
679 tsig->key_name->name_size)
    [all...]
axfr.c 226 : acl->key_name )
261 acl->ip_address_spec, acl->key_name?acl->key_name:"NOKEY",
266 acl->ip_address_spec, acl->key_name?acl->key_name:"NOKEY"));
tsig.h 120 const dname_type *key_name; member in struct:tsig_record
options.c 297 acl->key_options = key_options_find(opt, acl->key_name);
300 acl->key_name, pat->pname);
306 acl->key_options = key_options_find(opt, acl->key_name);
309 acl->key_name, pat->pname);
323 acl->key_options = key_options_find(opt, acl->key_name);
326 acl->key_name, pat->pname);
339 acl->key_options = key_options_find(opt, acl->key_name);
342 acl->key_name, pat->pname);
348 acl->key_options = key_options_find(opt, acl->key_name);
351 acl->key_name, pat->pname)
    [all...]
nsd-checkconf.c 210 (acl->key_name?acl->key_name:"(null)")),
215 (acl->key_name?acl->key_name:"(null)")));
233 (acl->key_name?acl->key_name:"(null)")),
238 (acl->key_name?acl->key_name:"(null)")));
  /src/crypto/external/apache2/openssl/dist/crypto/evp/
p_lib.c 2219 int EVP_PKEY_get_bn_param(const EVP_PKEY *pkey, const char *key_name,
2228 if (key_name == NULL
2233 params[0] = OSSL_PARAM_construct_BN(key_name, buffer, sizeof(buffer));
2268 int EVP_PKEY_get_octet_string_param(const EVP_PKEY *pkey, const char *key_name,
2275 if (key_name == NULL)
2278 params[0] = OSSL_PARAM_construct_octet_string(key_name, buf, max_buf_sz);
2287 int EVP_PKEY_get_utf8_string_param(const EVP_PKEY *pkey, const char *key_name,
2294 if (key_name == NULL)
2297 params[0] = OSSL_PARAM_construct_utf8_string(key_name, str, max_buf_sz);
2314 int EVP_PKEY_get_int_param(const EVP_PKEY *pkey, const char *key_name,
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/evp/
p_lib.c 2154 int EVP_PKEY_get_bn_param(const EVP_PKEY *pkey, const char *key_name,
2163 if (key_name == NULL
2168 params[0] = OSSL_PARAM_construct_BN(key_name, buffer, sizeof(buffer));
2203 int EVP_PKEY_get_octet_string_param(const EVP_PKEY *pkey, const char *key_name,
2210 if (key_name == NULL)
2213 params[0] = OSSL_PARAM_construct_octet_string(key_name, buf, max_buf_sz);
2222 int EVP_PKEY_get_utf8_string_param(const EVP_PKEY *pkey, const char *key_name,
2229 if (key_name == NULL)
2232 params[0] = OSSL_PARAM_construct_utf8_string(key_name, str, max_buf_sz);
2249 int EVP_PKEY_get_int_param(const EVP_PKEY *pkey, const char *key_name,
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/asn1/
d2i_pr.c 34 const char *key_name = NULL; local
39 key_name = evp_pkey_type2name(keytype);
40 if (key_name == NULL)
50 input_structures[i], key_name,
  /src/sys/dev/ic/
apple_smc_fan.c 327 char key_name[4 + 1]; local
336 (void)snprintf(key_name, sizeof(key_name), "F%d%s",
338 KASSERT(strlen(key_name) == 4);
342 error = apple_smc_named_key(sc->sc_smc, key_name, APPLE_SMC_TYPE_FPE2,
  /src/external/bsd/unbound/dist/util/
net_help.c 97 unsigned char *key_name; member in struct:tls_session_ticket_key
109 * @param key_name: secret name, 16 bytes
119 int tls_session_ticket_key_cb(SSL *s, unsigned char* key_name,
1839 keys->key_name = data;
1845 keys->key_name = NULL;
1854 int tls_session_ticket_key_cb(SSL *ATTR_UNUSED(sslctx), unsigned char* key_name, variable
1879 memcpy(key_name, ticket_keys->key_name, 16);
1912 for(key = ticket_keys; key->key_name != NULL; key++) {
1913 if (!memcmp(key_name, key->key_name, 16))
    [all...]
  /src/sys/external/bsd/drm2/dist/drm/amd/display/dc/
dm_services.h 296 const char *key_name,
330 const char *key_name,
  /src/usr.sbin/inetd/
parse_v2.c 558 char *key_name, save, *cp = *cpp; local
569 key_name = cp;
589 handler = get_handler(key_name);
592 ERR("Unknown option '%s'", key_name);

Completed in 54 milliseconds

1 2 3