/illumos-gate/usr/src/lib/libxcurses/src/libc/xcurses/ |
H A D | keyname.c | 30 * keyname.c 40 static char rcsID[] = "$Header: /rd/src/libc/xcurses/rcs/keyname.c 1.5 1995/10/02 19:40:13 ant Exp $"; 52 keyname(ch) function 59 __m_trace("keyname(%d)", ch); 74 __m_trace("keyname returned %p = \"%s\".", str, str);
|
/illumos-gate/usr/src/lib/libxcurses2/src/libc/xcurses/ |
H A D | keyname.c | 32 * keyname.c 44 "libxcurses/src/libc/xcurses/rcs/keyname.c 1.3 1998/05/29 15:58:43 " 52 keyname(int ch) function
|
/illumos-gate/usr/src/psm/promif/ieee1275/common/ |
H A D | prom_key.c | 41 prom_set_security_key(char *keyname, caddr_t buf, int buflen, int *reslen, argument 52 if ((uintptr_t)keyname > (uint32_t)-1) { 53 okeyname = keyname; 55 keyname = promplat_alloc(keynamelen); 56 if (keyname == NULL) 58 (void) prom_strcpy(keyname, okeyname); 69 promplat_free(keyname, keynamelen); 93 ci[3] = p1275_ptr2cell(keyname); 103 promplat_free(keyname, keynamelen); 123 prom_get_security_key(char *keyname, caddr_ argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/ickey/ |
H A D | ickey.c | 52 * name specified on the command line. The keyname is the name this 58 const char *keyname; member in struct:keylist 161 (void) strlcpy(wkio.wk_keyname, k->keyname, WANBOOT_MAXKEYNAMELEN); 197 (void) strlcpy(wkio.wk_keyname, k->keyname, WANBOOT_MAXKEYNAMELEN);
|
/illumos-gate/usr/src/cmd/sendmail/aux/ |
H A D | editmap.c | 92 char *keyname = NULL; local 198 keyname = argv[2]; 206 for (p = keyname; *p != '\0'; p++) 327 db_key.data = keyname; 328 db_key.size = strlen(keyname); 338 progname, keyname, mapname); 352 db_key.data = keyname; 353 db_key.size = strlen(keyname); 367 progname, keyname, value, mapname, 377 db_key.data = keyname; [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/lib/nwamd/ |
H A D | known_wlans.c | 250 * Store the key and keyname if a match is found - we use the last match 446 char *keyname; local 453 (err = nwam_value_get_string(keynameval, &keyname)) 455 (void) strlcpy(name, keyname, NWAM_MAX_VALUE_LEN);
|
H A D | ncu_phys.c | 385 /* Found matching keyname so terminate walk */ 474 * (bssid is appended if an object, with the same keyname, 662 char keyname[DLADM_SECOBJ_NAME_MAX]; local 664 nwamd_set_key_name(essid, bssid, keyname, DLADM_SECOBJ_NAME_MAX); 666 return (nwamd_wlan_get_key_named(keyname, security_mode)); 1369 char keyname[NWAM_MAX_VALUE_LEN]; local 1389 (s.nwamd_wifi_scan_curr[i].nww_essid, keyname) 1391 (key = nwamd_wlan_get_key_named(keyname, 1401 nlog(LOG_DEBUG, "found matching keyname for \
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_identity.c | 357 char *certname, *keyname; local 368 keyname = strtok(NULL, ","); 374 idopts->key_filename = strdup(keyname ? keyname : certname);
|
H A D | pkinit_crypto_openssl.c | 4980 char *keyname, 4997 retval = get_key(keyname, &y); 5002 keyname, error_message(retval)); 5003 pkiDebug("failed to load user's private key from '%s'\n", keyname); 5075 char keyname[1024]; local 5125 (void) snprintf(keyname, sizeof(keyname), "%s/%s", dirname, dentry->d_name); 5126 len = strlen(keyname); 5127 keyname[len - 3] = 'k'; 5128 keyname[le 4977 pkinit_load_fs_cert_and_key(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, char *certname, char *keyname, int cindex) argument [all...] |
/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | rcfile.c | 266 rc_sect_findkey(struct rcsection *rsp, const char *keyname) argument 273 if (strcmp(p->rk_name, keyname) == 0) 432 continue; /* become 'keyname=' */
|
/illumos-gate/usr/src/lib/libnwam/common/ |
H A D | libnwam_known_wlan.c | 498 char *keyname; local 500 if (nwam_value_get_string(value, &keyname) != NWAM_SUCCESS) 503 if (!dladm_valid_secobj_name(keyname)) 578 * BSSID and keyname can be NULL. 582 uint32_t secmode, uint_t keyslot, const char *keyname) 719 if (keyname != NULL) { 720 if ((err = nwam_value_create_string((char *)keyname, 749 * Remove the given BSSID/keyname from the bssids/keyname property for the 754 const char *keyname) 581 nwam_known_wlan_add_to_known_wlans(const char *essid, const char *bssid, uint32_t secmode, uint_t keyslot, const char *keyname) argument 753 nwam_known_wlan_remove_from_known_wlans(const char *essid, const char *bssid, const char *keyname) argument [all...] |
/illumos-gate/usr/src/lib/libresolv2/common/dst/ |
H A D | dst_api.c | 327 char keyname[PATH_MAX]; local 340 } else if (strlen(in_keyname) >= sizeof(keyname)) { 341 EREPORT(("dst_read_private_key(): keyname too big\n")); 344 strcpy(keyname, in_keyname); 347 if ((pubkey = dst_s_read_public_key(keyname, in_id, in_alg)) == NULL) 353 if (!(dg_key = dst_s_get_key_struct(keyname, pubkey->dk_alg, 358 if (dst_s_read_private_key_file(keyname, dg_key, pubkey->dk_id,
|
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_db.c | 372 rfs4_index_create(rfs4_table_t *table, char *keyname, argument 385 idx->dbi_keyname = kmem_alloc(strlen(keyname) + 1, KM_SLEEP); 386 (void) strcpy(idx->dbi_keyname, keyname);
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | tpm_specific.c | 296 remove_uuid(char *keyname) argument 327 if (strcmp(key, keyname)) 343 find_uuid(char *keyname, TSS_UUID *uu) argument 375 if (strcmp(key, keyname) == 0) { 406 add_uuid(char *keyname, TSS_UUID *uu) argument 431 (void) fprintf(fp, "%s %s\n", keyname, idstr);
|
/illumos-gate/usr/src/lib/libpp/common/ |
H A D | pplib.h | 446 #define keyname(x) ppkeyname(x,0) macro
|
/illumos-gate/usr/src/lib/krb5/kdb/ |
H A D | kdb5.c | 1523 const char *keyname, 1532 if (!keyname) 1533 keyname = KRB5_KDB_M_NAME; /* XXX external? */ 1535 keylen = strlen(keyname); 1541 strcpy(fname, keyname); 1522 krb5_db_setup_mkey_name(krb5_context context, const char *keyname, const char *realm, char **fullname, krb5_principal * principal) argument
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | uDNS.c | 353 debugf("GetAuthInfoForName %##s Matched %##s Key name %##s", name->c, ptr->domain.c, ptr->keyname.c); 376 LogInfo("GetAuthInfoForName_internal deleting expired key %##s %##s", info->domain.c, info->keyname.c); 410 const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, mDNSBool autoTunnel) 416 LogInfo("mDNS_SetSecretForDomain: domain %##s key %##s%s", domain->c, keyname->c, autoTunnel ? " AutoTunnel" : ""); 420 AssignDomainName(&info->keyname, keyname); 433 LogMsg("mDNS_SetSecretForDomain: ERROR: Could not convert shared secret from base64: domain %##s key %##s %s", domain->c, keyname->c, mDNS_LoggingEnabled ? b64keydata : ""); 2891 if (AuthInfo) tsigSize = DomainNameLength(&AuthInfo->keyname) + rr_base_size + 58; 5941 mDNSexport mStatus mDNS_SetSecretForDomain(mDNS *m, DomainAuthInfo *info, const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, mDNSBool autoTunnel) argument 5946 (void) keyname; 409 mDNS_SetSecretForDomain(mDNS *m, DomainAuthInfo *info, const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, mDNSBool autoTunnel) argument [all...] |
H A D | mDNSEmbeddedAPI.h | 1835 domainname keyname; member in struct:DomainAuthInfo 3003 const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, mDNSBool autoTunnel);
|
/illumos-gate/usr/src/man/man3curses/ |
H A D | Makefile | 265 keyname.3curses \ 943 keyname.3curses := LINKSRC = curs_util.3curses
|