keyname
char *keyname;
(err = nwam_value_get_string(keynameval, &keyname))
(void) strlcpy(name, keyname, NWAM_MAX_VALUE_LEN);
char keyname[NWAM_MAX_VALUE_LEN];
(s.nwamd_wifi_scan_curr[i].nww_essid, keyname)
(key = nwamd_wlan_get_key_named(keyname,
char keyname[DLADM_SECOBJ_NAME_MAX];
nwamd_set_key_name(essid, bssid, keyname, DLADM_SECOBJ_NAME_MAX);
return (nwamd_wlan_get_key_named(keyname, security_mode));
keyname = argv[2];
for (p = keyname; *p != '\0'; p++)
db_key.data = keyname;
db_key.size = strlen(keyname);
progname, keyname, mapname);
db_key.data = keyname;
db_key.size = strlen(keyname);
progname, keyname, value, mapname,
db_key.data = keyname;
db_key.size = strlen(keyname);
progname, keyname, mapname);
progname, keyname, mapname);
char *keyname = NULL;
const char *keyname,
const char *keyname,
if (!keyname)
keyname = KRB5_KDB_M_NAME; /* XXX external? */
keylen = strlen(keyname);
strcpy(fname, keyname);
char *keyname,
char *keyname,
retval = get_key(keyname, &y);
keyname, error_message(retval));
pkiDebug("failed to load user's private key from '%s'\n", keyname);
char keyname[1024];
(void) snprintf(keyname, sizeof(keyname), "%s/%s", dirname, dentry->d_name);
len = strlen(keyname);
keyname[len - 3] = 'k';
keyname[len - 2] = 'e';
keyname[len - 1] = 'y';
certname, keyname, i);
char *certname, *keyname;
keyname = strtok(NULL, ",");
idopts->key_filename = strdup(keyname ? keyname : certname);
char *keyname;
if (nwam_value_get_string(value, &keyname) != NWAM_SUCCESS)
if (!dladm_valid_secobj_name(keyname))
uint32_t secmode, uint_t keyslot, const char *keyname)
if (keyname != NULL) {
if ((err = nwam_value_create_string((char *)keyname,
const char *keyname)
if (keyname != NULL) {
char keyname[PATH_MAX];
} else if (strlen(in_keyname) >= sizeof(keyname)) {
strcpy(keyname, in_keyname);
if ((pubkey = dst_s_read_public_key(keyname, in_id, in_alg)) == NULL)
if (!(dg_key = dst_s_get_key_struct(keyname, pubkey->dk_alg,
if (dst_s_read_private_key_file(keyname, dg_key, pubkey->dk_id,
rc_sect_findkey(struct rcsection *rsp, const char *keyname)
if (strcmp(p->rk_name, keyname) == 0)
extern const char *keyname(int);
extern char *keyname(int);
remove_uuid(char *keyname)
if (strcmp(key, keyname))
find_uuid(char *keyname, TSS_UUID *uu)
if (strcmp(key, keyname) == 0) {
add_uuid(char *keyname, TSS_UUID *uu)
(void) fprintf(fp, "%s %s\n", keyname, idstr);
promplat_free(keyname, keynamelen);
prom_get_security_key(char *keyname, caddr_t buf, int buflen, int *keylen,
if ((uintptr_t)keyname > (uint32_t)-1) {
okeyname = keyname;
keyname = promplat_alloc(keynamelen);
if (keyname == NULL)
(void) prom_strcpy(keyname, okeyname);
promplat_free(keyname, keynamelen);
ci[3] = p1275_ptr2cell(keyname);
promplat_free(keyname, keynamelen);
prom_set_security_key(char *keyname, caddr_t buf, int buflen, int *reslen,
if ((uintptr_t)keyname > (uint32_t)-1) {
okeyname = keyname;
keyname = promplat_alloc(keynamelen);
if (keyname == NULL)
(void) prom_strcpy(keyname, okeyname);
promplat_free(keyname, keynamelen);
ci[3] = p1275_ptr2cell(keyname);
rfs4_index_create(rfs4_table_t *table, char *keyname,
idx->dbi_keyname = kmem_alloc(strlen(keyname) + 1, KM_SLEEP);
(void) strcpy(idx->dbi_keyname, keyname);
int prom_set_security_key(char *keyname, caddr_t buf, int buflen, int *reslen,
int prom_get_security_key(char *keyname, caddr_t buf, int buflen, int *keylen,
int prom_set_security_key(char *keyname, caddr_t buf, int buflen, int *reslen,
int prom_get_security_key(char *keyname, caddr_t buf, int buflen, int *keylen,