Searched defs:keyname (Results 1 - 19 of 19) sorted by relevance

/illumos-gate/usr/src/lib/libxcurses/src/libc/xcurses/
H A Dkeyname.c30 * keyname.c
40 static char rcsID[] = "$Header: /rd/src/libc/xcurses/rcs/keyname.c 1.5 1995/10/02 19:40:13 ant Exp $";
52 keyname(ch) function
59 __m_trace("keyname(%d)", ch);
74 __m_trace("keyname returned %p = \"%s\".", str, str);
/illumos-gate/usr/src/lib/libxcurses2/src/libc/xcurses/
H A Dkeyname.c32 * keyname.c
44 "libxcurses/src/libc/xcurses/rcs/keyname.c 1.3 1998/05/29 15:58:43 "
52 keyname(int ch) function
/illumos-gate/usr/src/psm/promif/ieee1275/common/
H A Dprom_key.c41 prom_set_security_key(char *keyname, caddr_t buf, int buflen, int *reslen, argument
52 if ((uintptr_t)keyname > (uint32_t)-1) {
53 okeyname = keyname;
55 keyname = promplat_alloc(keynamelen);
56 if (keyname == NULL)
58 (void) prom_strcpy(keyname, okeyname);
69 promplat_free(keyname, keynamelen);
93 ci[3] = p1275_ptr2cell(keyname);
103 promplat_free(keyname, keynamelen);
123 prom_get_security_key(char *keyname, caddr_ argument
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wanboot/ickey/
H A Dickey.c52 * name specified on the command line. The keyname is the name this
58 const char *keyname; member in struct:keylist
161 (void) strlcpy(wkio.wk_keyname, k->keyname, WANBOOT_MAXKEYNAMELEN);
197 (void) strlcpy(wkio.wk_keyname, k->keyname, WANBOOT_MAXKEYNAMELEN);
/illumos-gate/usr/src/cmd/sendmail/aux/
H A Deditmap.c92 char *keyname = NULL; local
198 keyname = argv[2];
206 for (p = keyname; *p != '\0'; p++)
327 db_key.data = keyname;
328 db_key.size = strlen(keyname);
338 progname, keyname, mapname);
352 db_key.data = keyname;
353 db_key.size = strlen(keyname);
367 progname, keyname, value, mapname,
377 db_key.data = keyname;
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/lib/nwamd/
H A Dknown_wlans.c250 * Store the key and keyname if a match is found - we use the last match
446 char *keyname; local
453 (err = nwam_value_get_string(keynameval, &keyname))
455 (void) strlcpy(name, keyname, NWAM_MAX_VALUE_LEN);
H A Dncu_phys.c385 /* Found matching keyname so terminate walk */
474 * (bssid is appended if an object, with the same keyname,
662 char keyname[DLADM_SECOBJ_NAME_MAX]; local
664 nwamd_set_key_name(essid, bssid, keyname, DLADM_SECOBJ_NAME_MAX);
666 return (nwamd_wlan_get_key_named(keyname, security_mode));
1369 char keyname[NWAM_MAX_VALUE_LEN]; local
1389 (s.nwamd_wifi_scan_curr[i].nww_essid, keyname)
1391 (key = nwamd_wlan_get_key_named(keyname,
1401 nlog(LOG_DEBUG, "found matching keyname for \
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_identity.c357 char *certname, *keyname; local
368 keyname = strtok(NULL, ",");
374 idopts->key_filename = strdup(keyname ? keyname : certname);
H A Dpkinit_crypto_openssl.c4980 char *keyname,
4997 retval = get_key(keyname, &y);
5002 keyname, error_message(retval));
5003 pkiDebug("failed to load user's private key from '%s'\n", keyname);
5075 char keyname[1024]; local
5125 (void) snprintf(keyname, sizeof(keyname), "%s/%s", dirname, dentry->d_name);
5126 len = strlen(keyname);
5127 keyname[len - 3] = 'k';
5128 keyname[le
4977 pkinit_load_fs_cert_and_key(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, char *certname, char *keyname, int cindex) argument
[all...]
/illumos-gate/usr/src/lib/libsmbfs/smb/
H A Drcfile.c266 rc_sect_findkey(struct rcsection *rsp, const char *keyname) argument
273 if (strcmp(p->rk_name, keyname) == 0)
432 continue; /* become 'keyname=' */
/illumos-gate/usr/src/lib/libnwam/common/
H A Dlibnwam_known_wlan.c498 char *keyname; local
500 if (nwam_value_get_string(value, &keyname) != NWAM_SUCCESS)
503 if (!dladm_valid_secobj_name(keyname))
578 * BSSID and keyname can be NULL.
582 uint32_t secmode, uint_t keyslot, const char *keyname)
719 if (keyname != NULL) {
720 if ((err = nwam_value_create_string((char *)keyname,
749 * Remove the given BSSID/keyname from the bssids/keyname property for the
754 const char *keyname)
581 nwam_known_wlan_add_to_known_wlans(const char *essid, const char *bssid, uint32_t secmode, uint_t keyslot, const char *keyname) argument
753 nwam_known_wlan_remove_from_known_wlans(const char *essid, const char *bssid, const char *keyname) argument
[all...]
/illumos-gate/usr/src/lib/libresolv2/common/dst/
H A Ddst_api.c327 char keyname[PATH_MAX]; local
340 } else if (strlen(in_keyname) >= sizeof(keyname)) {
341 EREPORT(("dst_read_private_key(): keyname too big\n"));
344 strcpy(keyname, in_keyname);
347 if ((pubkey = dst_s_read_public_key(keyname, in_id, in_alg)) == NULL)
353 if (!(dg_key = dst_s_get_key_struct(keyname, pubkey->dk_alg,
358 if (dst_s_read_private_key_file(keyname, dg_key, pubkey->dk_id,
/illumos-gate/usr/src/uts/common/fs/nfs/
H A Dnfs4_db.c372 rfs4_index_create(rfs4_table_t *table, char *keyname, argument
385 idx->dbi_keyname = kmem_alloc(strlen(keyname) + 1, KM_SLEEP);
386 (void) strcpy(idx->dbi_keyname, keyname);
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dtpm_specific.c296 remove_uuid(char *keyname) argument
327 if (strcmp(key, keyname))
343 find_uuid(char *keyname, TSS_UUID *uu) argument
375 if (strcmp(key, keyname) == 0) {
406 add_uuid(char *keyname, TSS_UUID *uu) argument
431 (void) fprintf(fp, "%s %s\n", keyname, idstr);
/illumos-gate/usr/src/lib/libpp/common/
H A Dpplib.h446 #define keyname(x) ppkeyname(x,0) macro
/illumos-gate/usr/src/lib/krb5/kdb/
H A Dkdb5.c1523 const char *keyname,
1532 if (!keyname)
1533 keyname = KRB5_KDB_M_NAME; /* XXX external? */
1535 keylen = strlen(keyname);
1541 strcpy(fname, keyname);
1522 krb5_db_setup_mkey_name(krb5_context context, const char *keyname, const char *realm, char **fullname, krb5_principal * principal) argument
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DuDNS.c353 debugf("GetAuthInfoForName %##s Matched %##s Key name %##s", name->c, ptr->domain.c, ptr->keyname.c);
376 LogInfo("GetAuthInfoForName_internal deleting expired key %##s %##s", info->domain.c, info->keyname.c);
410 const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, mDNSBool autoTunnel)
416 LogInfo("mDNS_SetSecretForDomain: domain %##s key %##s%s", domain->c, keyname->c, autoTunnel ? " AutoTunnel" : "");
420 AssignDomainName(&info->keyname, keyname);
433 LogMsg("mDNS_SetSecretForDomain: ERROR: Could not convert shared secret from base64: domain %##s key %##s %s", domain->c, keyname->c, mDNS_LoggingEnabled ? b64keydata : "");
2891 if (AuthInfo) tsigSize = DomainNameLength(&AuthInfo->keyname) + rr_base_size + 58;
5941 mDNSexport mStatus mDNS_SetSecretForDomain(mDNS *m, DomainAuthInfo *info, const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, mDNSBool autoTunnel) argument
5946 (void) keyname;
409 mDNS_SetSecretForDomain(mDNS *m, DomainAuthInfo *info, const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, mDNSBool autoTunnel) argument
[all...]
H A DmDNSEmbeddedAPI.h1835 domainname keyname; member in struct:DomainAuthInfo
3003 const domainname *domain, const domainname *keyname, const char *b64keydata, const domainname *hostname, mDNSIPPort *port, mDNSBool autoTunnel);
/illumos-gate/usr/src/man/man3curses/
H A DMakefile265 keyname.3curses \
943 keyname.3curses := LINKSRC = curs_util.3curses

Completed in 166 milliseconds