HomeSort by: relevance | last modified time | path
    Searched defs:inkey (Results 1 - 11 of 11) sorted by relevancy

  /src/usr.bin/ypmatch/
ypmatch.c 57 char *inkey, *outbuf; local
130 inkey = argv[c];
132 len = strlen(inkey);
135 r = yp_match(domainname, inmap, inkey, len,
140 printf("%s: ", inkey);
150 inkey, inmap, yperr_string(r));
  /src/lib/libcurses/
get_wch.c 55 static int inkey(wchar_t *wc, int to, int delay);
73 * inkey - do the work to process keyboard input, check for multi-key
78 inkey(wchar_t *wc, int to, int delay) function
90 __CTRACE(__CTRACE_INPUT, "inkey (%p, %d, %d)\n", wc, to, delay);
106 "inkey (wstate normal) got '%s'\n", unctrl(k));
113 "inkey: NORM=>ASSEMBLING: start(%d), "
122 "inkey: BACKOUT=>ASSEMBLING, start(%d), "
148 "inkey (wstate assembling) got '%s'\n", unctrl(k));
158 "inkey: ASSEMBLING=>TIMEOUT, start(%d), "
166 "inkey: ASSEMBLING: start(%d),
    [all...]
getch.c 50 short _cursesi_state; /* state of the inkey function */
222 static wchar_t inkey(int to, int delay);
438 /* init the inkey state variable */
487 perror("Inkey: Cannot allocate new keymap");
516 perror("inkey: Cannot allocate new key entry chunk");
529 * inkey - do the work to process keyboard input, check for multi-key
535 inkey(int to, int delay) function
544 __CTRACE(__CTRACE_INPUT, "inkey (%d, %d)\n", to, delay);
561 "inkey (state normal) got '%s'\n", unctrl(k));
602 "inkey (state assembling) got '%s'\n", unctrl(k))
    [all...]
  /src/sys/arch/hpcmips/vr/
vrkiu.c 254 unsigned char inkey[KIU_NSCANLINE], *prevkey, *reskey; local
263 inkey[i] = reskey[i];
267 if (countbits(inkey[i]) > 1) {
269 if (i != j && (inkey[i] & inkey[j])) {
274 i, inkey[i], prevkey[i]));
276 j, inkey[j], prevkey[j]));
  /src/external/gpl2/texinfo/dist/info/
pcterm.c 376 int inkey;
494 for (i = 0; DJGPP_keytab[i].inkey; i++)
495 if (key == DJGPP_keytab[i].inkey)
375 int inkey; member in struct:__anon9538
  /src/crypto/external/bsd/openssl.old/dist/apps/
pkeyutl.c 63 {"inkey", OPT_INKEY, 's', "Input private key file"},
92 const char *inkey = NULL; local
123 inkey = opt_arg();
207 } else if (inkey == NULL) {
209 "%s: no private key given (-inkey parameter).\n", prog);
216 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type,
ts.c 50 const char *queryfile, const char *passin, const char *inkey,
57 const char *inkey, const EVP_MD *md, const char *signer,
106 {"inkey", OPT_INKEY, 's', "File with private key for reply"},
134 " [-signer tsa_cert.pem] [-inkey private_key.pem]",
160 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local
242 inkey = opt_arg();
305 password, inkey, md, signer, chain, policy,
557 const char *queryfile, const char *passin, const char *inkey,
580 passin, inkey, md, signer, chain, policy);
666 const char *inkey, const EVP_MD *md, const char *signer
    [all...]
  /src/crypto/external/bsd/openssl/dist/apps/
pkeyutl.c 73 {"inkey", OPT_INKEY, 's', "Input private key file"},
121 const char *inkey = NULL; local
158 inkey = opt_arg();
290 } else if (inkey == NULL) {
292 "%s: no private key given (-inkey parameter).\n", prog);
306 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type,
ts.c 50 const char *queryfile, const char *passin, const char *inkey,
57 const char *inkey, const EVP_MD *md, const char *signer,
97 {"inkey", OPT_INKEY, 's', "File with private key for reply"},
143 " [-signer tsa_cert.pem] [-inkey private_key.pem]",
169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local
256 inkey = opt_arg();
331 password, inkey, md, signer, chain, policy,
588 const char *queryfile, const char *passin, const char *inkey,
611 passin, inkey, md, signer, chain, policy);
697 const char *inkey, const EVP_MD *md, const char *signer
    [all...]
  /src/crypto/external/apache2/openssl/dist/apps/
pkeyutl.c 114 { "inkey", OPT_INKEY, 's', "Input key, by default private key" },
167 const char *inkey = NULL; local
207 inkey = opt_arg();
327 } else if (inkey == NULL) {
329 "%s: no private key given (-inkey parameter).\n", prog);
341 pkey = get_pkey(kdfalg, inkey, keyform, key_type, passinarg, pkey_op, e);
ts.c 48 const char *queryfile, const char *passin, const char *inkey,
55 const char *inkey, const EVP_MD *md, const char *signer,
118 { "inkey", OPT_INKEY, 's', "File with private key for reply" },
164 " [-signer tsa_cert.pem] [-inkey private_key.pem]",
190 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; local
280 inkey = opt_arg();
355 password, inkey, md, signer, chain, policy,
612 const char *queryfile, const char *passin, const char *inkey,
635 passin, inkey, md, signer, chain, policy);
721 const char *inkey, const EVP_MD *md, const char *signer
    [all...]

Completed in 36 milliseconds