keyname
const char *keyname,
krb5_db_setup_mkey_name(krb5_context context, const char *keyname,
if (!keyname)
keyname = KRB5_KDB_M_NAME; /* XXX external? */
if (asprintf(&fname, "%s%s%s", keyname, REALM_SEP_STRING, realm) < 0)
char *keyname = NULL;
ret = krb5_unparse_name(context, creds->server, &keyname);
keyname, data->cache_id));
ret = add_cred_key(keyname, buf.data, buf.len, data->cache_id,
krb5_free_unparsed_name(context, keyname);
char *keyname,
fsname = reassemble_files_name(certname, keyname);
retval = get_key(context, id_cryptoctx, keyname, fsname, &y, password);
keyname);
char *certname = NULL, *keyname = NULL;
retval = k5_path_join(dirname, name, &keyname);
len = strlen(keyname);
keyname[len - 3] = 'k';
keyname[len - 2] = 'e';
keyname[len - 1] = 'y';
certname, keyname, ncreds);
free(keyname);
certname = keyname = NULL;
free(keyname);
char *certname, *keyname, *save;
keyname = strtok_r(NULL, ",", &save);
key_filename = strdup((keyname != NULL) ? keyname : certname);
char *myproposal[PROPOSAL_MAX] = {0}, *keyname = NULL;
keyname = xstrdup(sshkey_ssh_name(privkey));
debug_f("%s %s clobber client %zu", kex, keyname,
debug_f("%s %s clobber server %zu", kex, keyname,
debug_f("%s %s noclobber", kex, keyname);
ccp = keyname;
free(keyname);
#define PREPARE(label, keyname, keywords) \
cert = load_key(keyname ".cert"); \
#define FLAG_CASE(keybase, label, keyname, keywords, mostly_off, var, val) \
PREPARE(keybase " " label, keyname, keywords); \
keyname = strdup(sshkey_ssh_name(private));
ASSERT_PTR_NE(keyname, NULL);
kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname;
free(keyname);
char *keyname = NULL;
check_sig(const char *keyname, const char *signame, const struct sshbuf *msg,
k = load_key(keyname);
sshkey_match_keyname_to_sigalgs(const char *keyname, const char *sigalgs)
(ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC)
return match_pattern_list(keyname, sigalgs, 0) == 1;
const char *keyname;
if ((keyname = EVP_PKEY_get0_type_name(key)) == NULL)
keyname = "?";
BIO_printf(out, "%s\n", keyname);
char *infile = NULL, *outfile = NULL, *keyname = NULL, *certfile = NULL;
keyname = opt_arg();
if (keyname != NULL)
key = load_key(keyname ? keyname : infile,
keyname ? "private key from -inkey file" : "private key from -in file");
#define HT_START_KEY_DEFN(keyname) \
typedef struct keyname##_st { \
#define HT_END_KEY_DEFN(keyname) \
const unsigned char *keyname,
char *keyname;
OPENSSL_free(kdata->keyname);
return TEST_ptr(kdata->keyname = OPENSSL_strdup(value));
if (kdata->keyname != NULL) {
found_key = find_key(&pkey, kdata->keyname, private_keys);
TEST_info("skipping, key '%s' is disabled", kdata->keyname);
static int pkey_test_init_keyctx(EVP_TEST *t, const char *keyname,
rv = find_key(&pkey, keyname, public_keys);
rv = find_key(&pkey, keyname, private_keys);
TEST_info("skipping, key '%s' is disabled", keyname);
char *keyname; /* Key name to store key or NULL */
data->keyname = NULL;
OPENSSL_free(keygen->keyname);
return TEST_ptr(keygen->keyname = OPENSSL_strdup(value));
TEST_info("Warning: legacy key generated %s", keygen->keyname);
if (keygen->keyname != NULL) {
if (find_key(NULL, keygen->keyname, private_keys)) {
TEST_info("Duplicate key %s", keygen->keyname);
key->name = keygen->keyname;
keygen->keyname = NULL;
const unsigned char *keyname,
const unsigned char *keyname,
snprintf(keyname, sizeof(keyname), "key.%d", bounds);
ret = writekey(savedirfd, keyname, dumpkey, dumpkeysize);
if (symlinkat(keyname, savedirfd, "key.last") == -1) {
writekey(int savedirfd, const char *keyname, uint8_t *dumpkey,
fd = openat(savedirfd, keyname, O_WRONLY | O_CREAT | O_TRUNC, 0600);
keyname);
logmsg(LOG_ERR, "Unable to write the key to %s: %m.", keyname);
char infoname[32], corename[32], linkname[32], keyname[32];