| /src/usr.bin/ypmatch/ |
| ypmatch.c | 57 char *inkey, *outbuf; local 130 inkey = argv[c]; 132 len = strlen(inkey); 135 r = yp_match(domainname, inmap, inkey, len, 140 printf("%s: ", inkey); 150 inkey, inmap, yperr_string(r));
|
| /src/lib/libcurses/ |
| get_wch.c | 55 static int inkey(wchar_t *wc, int to, int delay); 73 * inkey - do the work to process keyboard input, check for multi-key 78 inkey(wchar_t *wc, int to, int delay) function 90 __CTRACE(__CTRACE_INPUT, "inkey (%p, %d, %d)\n", wc, to, delay); 106 "inkey (wstate normal) got '%s'\n", unctrl(k)); 113 "inkey: NORM=>ASSEMBLING: start(%d), " 122 "inkey: BACKOUT=>ASSEMBLING, start(%d), " 148 "inkey (wstate assembling) got '%s'\n", unctrl(k)); 158 "inkey: ASSEMBLING=>TIMEOUT, start(%d), " 166 "inkey: ASSEMBLING: start(%d), [all...] |
| getch.c | 50 short _cursesi_state; /* state of the inkey function */ 222 static wchar_t inkey(int to, int delay); 438 /* init the inkey state variable */ 487 perror("Inkey: Cannot allocate new keymap"); 516 perror("inkey: Cannot allocate new key entry chunk"); 529 * inkey - do the work to process keyboard input, check for multi-key 535 inkey(int to, int delay) function 544 __CTRACE(__CTRACE_INPUT, "inkey (%d, %d)\n", to, delay); 561 "inkey (state normal) got '%s'\n", unctrl(k)); 602 "inkey (state assembling) got '%s'\n", unctrl(k)) [all...] |
| /src/sys/arch/hpcmips/vr/ |
| vrkiu.c | 254 unsigned char inkey[KIU_NSCANLINE], *prevkey, *reskey; local 263 inkey[i] = reskey[i]; 267 if (countbits(inkey[i]) > 1) { 269 if (i != j && (inkey[i] & inkey[j])) { 274 i, inkey[i], prevkey[i])); 276 j, inkey[j], prevkey[j]));
|
| /src/external/gpl2/texinfo/dist/info/ |
| pcterm.c | 376 int inkey; 494 for (i = 0; DJGPP_keytab[i].inkey; i++) 495 if (key == DJGPP_keytab[i].inkey) 375 int inkey; member in struct:__anon9538
|
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| pkeyutl.c | 63 {"inkey", OPT_INKEY, 's', "Input private key file"}, 92 const char *inkey = NULL; local 123 inkey = opt_arg(); 207 } else if (inkey == NULL) { 209 "%s: no private key given (-inkey parameter).\n", prog); 216 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type,
|
| ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 57 const char *inkey, const EVP_MD *md, const char *signer, 106 {"inkey", OPT_INKEY, 's', "File with private key for reply"}, 134 " [-signer tsa_cert.pem] [-inkey private_key.pem]", 160 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local 242 inkey = opt_arg(); 305 password, inkey, md, signer, chain, policy, 557 const char *queryfile, const char *passin, const char *inkey, 580 passin, inkey, md, signer, chain, policy); 666 const char *inkey, const EVP_MD *md, const char *signer [all...] |
| /src/crypto/external/bsd/openssl/dist/apps/ |
| pkeyutl.c | 73 {"inkey", OPT_INKEY, 's', "Input private key file"}, 121 const char *inkey = NULL; local 158 inkey = opt_arg(); 290 } else if (inkey == NULL) { 292 "%s: no private key given (-inkey parameter).\n", prog); 306 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type,
|
| ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 57 const char *inkey, const EVP_MD *md, const char *signer, 97 {"inkey", OPT_INKEY, 's', "File with private key for reply"}, 143 " [-signer tsa_cert.pem] [-inkey private_key.pem]", 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local 256 inkey = opt_arg(); 331 password, inkey, md, signer, chain, policy, 588 const char *queryfile, const char *passin, const char *inkey, 611 passin, inkey, md, signer, chain, policy); 697 const char *inkey, const EVP_MD *md, const char *signer [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| pkeyutl.c | 114 { "inkey", OPT_INKEY, 's', "Input key, by default private key" }, 167 const char *inkey = NULL; local 207 inkey = opt_arg(); 327 } else if (inkey == NULL) { 329 "%s: no private key given (-inkey parameter).\n", prog); 341 pkey = get_pkey(kdfalg, inkey, keyform, key_type, passinarg, pkey_op, e);
|
| ts.c | 48 const char *queryfile, const char *passin, const char *inkey, 55 const char *inkey, const EVP_MD *md, const char *signer, 118 { "inkey", OPT_INKEY, 's', "File with private key for reply" }, 164 " [-signer tsa_cert.pem] [-inkey private_key.pem]", 190 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local 280 inkey = opt_arg(); 355 password, inkey, md, signer, chain, policy, 612 const char *queryfile, const char *passin, const char *inkey, 635 passin, inkey, md, signer, chain, policy); 721 const char *inkey, const EVP_MD *md, const char *signer [all...] |