Symbol: keyname
crypto/krb5/src/include/kdb.h
449
const char *keyname,
crypto/krb5/src/lib/kdb/kdb5.c
1479
krb5_db_setup_mkey_name(krb5_context context, const char *keyname,
crypto/krb5/src/lib/kdb/kdb5.c
1486
if (!keyname)
crypto/krb5/src/lib/kdb/kdb5.c
1487
keyname = KRB5_KDB_M_NAME; /* XXX external? */
crypto/krb5/src/lib/kdb/kdb5.c
1489
if (asprintf(&fname, "%s%s%s", keyname, REALM_SEP_STRING, realm) < 0)
crypto/krb5/src/lib/krb5/ccache/cc_keyring.c
1308
char *keyname = NULL;
crypto/krb5/src/lib/krb5/ccache/cc_keyring.c
1320
ret = krb5_unparse_name(context, creds->server, &keyname);
crypto/krb5/src/lib/krb5/ccache/cc_keyring.c
1333
keyname, data->cache_id));
crypto/krb5/src/lib/krb5/ccache/cc_keyring.c
1334
ret = add_cred_key(keyname, buf.data, buf.len, data->cache_id,
crypto/krb5/src/lib/krb5/ccache/cc_keyring.c
1353
krb5_free_unparsed_name(context, keyname);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4213
char *keyname,
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4222
fsname = reassemble_files_name(certname, keyname);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4236
retval = get_key(context, id_cryptoctx, keyname, fsname, &y, password);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4248
keyname);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4308
char *certname = NULL, *keyname = NULL;
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4339
retval = k5_path_join(dirname, name, &keyname);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4343
len = strlen(keyname);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4344
keyname[len - 3] = 'k';
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4345
keyname[len - 2] = 'e';
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4346
keyname[len - 1] = 'y';
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4349
certname, keyname, ncreds);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4351
free(keyname);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4352
certname = keyname = NULL;
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
4371
free(keyname);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_identity.c
311
char *certname, *keyname, *save;
crypto/krb5/src/plugins/preauth/pkinit/pkinit_identity.c
325
keyname = strtok_r(NULL, ",", &save);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_identity.c
331
key_filename = strdup((keyname != NULL) ? keyname : certname);
crypto/openssh/regress/misc/fuzz-harness/kex_fuzz.cc
182
char *myproposal[PROPOSAL_MAX] = {0}, *keyname = NULL;
crypto/openssh/regress/misc/fuzz-harness/kex_fuzz.cc
195
keyname = xstrdup(sshkey_ssh_name(privkey));
crypto/openssh/regress/misc/fuzz-harness/kex_fuzz.cc
197
debug_f("%s %s clobber client %zu", kex, keyname,
crypto/openssh/regress/misc/fuzz-harness/kex_fuzz.cc
200
debug_f("%s %s clobber server %zu", kex, keyname,
crypto/openssh/regress/misc/fuzz-harness/kex_fuzz.cc
203
debug_f("%s %s noclobber", kex, keyname);
crypto/openssh/regress/misc/fuzz-harness/kex_fuzz.cc
212
ccp = keyname;
crypto/openssh/regress/misc/fuzz-harness/kex_fuzz.cc
247
free(keyname);
crypto/openssh/regress/unittests/authopt/tests.c
387
#define PREPARE(label, keyname, keywords) \
crypto/openssh/regress/unittests/authopt/tests.c
391
cert = load_key(keyname ".cert"); \
crypto/openssh/regress/unittests/authopt/tests.c
422
#define FLAG_CASE(keybase, label, keyname, keywords, mostly_off, var, val) \
crypto/openssh/regress/unittests/authopt/tests.c
424
PREPARE(keybase " " label, keyname, keywords); \
crypto/openssh/regress/unittests/kex/test_kex.c
100
keyname = strdup(sshkey_ssh_name(private));
crypto/openssh/regress/unittests/kex/test_kex.c
101
ASSERT_PTR_NE(keyname, NULL);
crypto/openssh/regress/unittests/kex/test_kex.c
102
kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname;
crypto/openssh/regress/unittests/kex/test_kex.c
175
free(keyname);
crypto/openssh/regress/unittests/kex/test_kex.c
86
char *keyname = NULL;
crypto/openssh/regress/unittests/sshsig/tests.c
55
check_sig(const char *keyname, const char *signame, const struct sshbuf *msg,
crypto/openssh/regress/unittests/sshsig/tests.c
62
k = load_key(keyname);
crypto/openssh/sshkey.c
308
sshkey_match_keyname_to_sigalgs(const char *keyname, const char *sigalgs)
crypto/openssh/sshkey.c
313
(ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC)
crypto/openssh/sshkey.c
327
return match_pattern_list(keyname, sigalgs, 0) == 1;
crypto/openssl/apps/lib/s_cb.c
422
const char *keyname;
crypto/openssl/apps/lib/s_cb.c
439
if ((keyname = EVP_PKEY_get0_type_name(key)) == NULL)
crypto/openssl/apps/lib/s_cb.c
440
keyname = "?";
crypto/openssl/apps/lib/s_cb.c
441
BIO_printf(out, "%s\n", keyname);
crypto/openssl/apps/pkcs12.c
204
char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL;
crypto/openssl/apps/pkcs12.c
347
keyname = opt_arg();
crypto/openssl/apps/pkcs12.c
444
if (keyname != NULL)
crypto/openssl/apps/pkcs12.c
599
key = load_key(keyname ? keyname : infile,
crypto/openssl/apps/pkcs12.c
601
keyname ? "private key from -inkey file" : "private key from -in file");
crypto/openssl/include/internal/hashtable.h
74
#define HT_START_KEY_DEFN(keyname) \
crypto/openssl/include/internal/hashtable.h
75
typedef struct keyname##_st { \
crypto/openssl/include/internal/hashtable.h
82
#define HT_END_KEY_DEFN(keyname) \
crypto/openssl/include/openssl/ssl.h
2865
const unsigned char *keyname,
crypto/openssl/test/evp_test.c
2137
char *keyname;
crypto/openssl/test/evp_test.c
2178
OPENSSL_free(kdata->keyname);
crypto/openssl/test/evp_test.c
2211
return TEST_ptr(kdata->keyname = OPENSSL_strdup(value));
crypto/openssl/test/evp_test.c
2364
if (kdata->keyname != NULL) {
crypto/openssl/test/evp_test.c
2366
found_key = find_key(&pkey, kdata->keyname, private_keys);
crypto/openssl/test/evp_test.c
2368
TEST_info("skipping, key '%s' is disabled", kdata->keyname);
crypto/openssl/test/evp_test.c
2468
static int pkey_test_init_keyctx(EVP_TEST *t, const char *keyname,
crypto/openssl/test/evp_test.c
2476
rv = find_key(&pkey, keyname, public_keys);
crypto/openssl/test/evp_test.c
2478
rv = find_key(&pkey, keyname, private_keys);
crypto/openssl/test/evp_test.c
2480
TEST_info("skipping, key '%s' is disabled", keyname);
crypto/openssl/test/evp_test.c
4279
char *keyname; /* Key name to store key or NULL */
crypto/openssl/test/evp_test.c
4297
data->keyname = NULL;
crypto/openssl/test/evp_test.c
4314
OPENSSL_free(keygen->keyname);
crypto/openssl/test/evp_test.c
4326
return TEST_ptr(keygen->keyname = OPENSSL_strdup(value));
crypto/openssl/test/evp_test.c
4431
TEST_info("Warning: legacy key generated %s", keygen->keyname);
crypto/openssl/test/evp_test.c
4440
if (keygen->keyname != NULL) {
crypto/openssl/test/evp_test.c
4444
if (find_key(NULL, keygen->keyname, private_keys)) {
crypto/openssl/test/evp_test.c
4445
TEST_info("Duplicate key %s", keygen->keyname);
crypto/openssl/test/evp_test.c
4451
key->name = keygen->keyname;
crypto/openssl/test/evp_test.c
4452
keygen->keyname = NULL;
crypto/openssl/test/helpers/handshake.c
465
const unsigned char *keyname,
crypto/openssl/test/sslapitest.c
8489
const unsigned char *keyname,
sbin/savecore/savecore.c
1204
snprintf(keyname, sizeof(keyname), "key.%d", bounds);
sbin/savecore/savecore.c
1205
ret = writekey(savedirfd, keyname, dumpkey, dumpkeysize);
sbin/savecore/savecore.c
1244
if (symlinkat(keyname, savedirfd, "key.last") == -1) {
sbin/savecore/savecore.c
288
writekey(int savedirfd, const char *keyname, uint8_t *dumpkey,
sbin/savecore/savecore.c
293
fd = openat(savedirfd, keyname, O_WRONLY | O_CREAT | O_TRUNC, 0600);
sbin/savecore/savecore.c
296
keyname);
sbin/savecore/savecore.c
301
logmsg(LOG_ERR, "Unable to write the key to %s: %m.", keyname);
sbin/savecore/savecore.c
929
char infoname[32], corename[32], linkname[32], keyname[32];