Symbol: keyname
lib/libc/include/thread_private.h
149
#define _THREAD_PRIVATE(keyname, storage, error) &(storage)
lib/libc/include/thread_private.h
150
#define _THREAD_PRIVATE_DT(keyname, storage, dt, error) &(storage)
lib/libc/include/thread_private.h
174
#define _THREAD_PRIVATE(keyname, storage, error) \
lib/libc/include/thread_private.h
176
_thread_cb.tc_tag_storage(&(__THREAD_NAME(keyname)), \
lib/libc/include/thread_private.h
179
#define _THREAD_PRIVATE_DT(keyname, storage, dt, error) \
lib/libc/include/thread_private.h
181
_thread_cb.tc_tag_storage(&(__THREAD_NAME(keyname)), \
lib/libcurses/curses.h
1034
extern NCURSES_EXPORT(NCURSES_CONST char *) NCURSES_SP_NAME(keyname) (SCREEN*, int); /* implemented:SP_FUNC */
lib/libcurses/curses.h
686
extern NCURSES_EXPORT(NCURSES_CONST char *) keyname (int); /* implemented */
lib/libcurses/curses.priv.h
2622
#define safe_keyname NCURSES_SP_NAME(keyname)
lib/libtls/tls_server.c
143
tls_server_ticket_key(struct tls_config *config, unsigned char *keyname)
lib/libtls/tls_server.c
161
if (keyname == NULL || timingsafe_memcmp(keyname,
lib/libtls/tls_server.c
171
tls_server_ticket_cb(SSL *ssl, unsigned char *keyname, unsigned char *iv,
lib/libtls/tls_server.c
189
memcpy(keyname, key->key_name, sizeof(key->key_name));
lib/libtls/tls_server.c
206
key = tls_server_ticket_key(tls_ctx->config, keyname);
regress/sys/kern/sysvmsg/msgtest.c
128
msgkey = ftok(keyname, 4160);
regress/sys/kern/sysvmsg/msgtest.c
273
remove(keyname);
regress/sys/kern/sysvmsg/msgtest.c
79
char keyname[] = "/tmp/msgtestXXXXXXXX";
regress/sys/kern/sysvmsg/msgtest.c
92
if ((fd = mkstemp(keyname)) < 0)
regress/sys/kern/sysvsem/semtest.c
124
semkey = ftok(keyname, arc4random() & INT_MAX);
regress/sys/kern/sysvsem/semtest.c
284
remove(keyname);
regress/sys/kern/sysvsem/semtest.c
65
char keyname[] = "/tmp/msgtestXXXXXXXX";
regress/sys/kern/sysvsem/semtest.c
88
if ((fd = mkstemp(keyname)) < 0)
regress/sys/kern/sysvshm/shmtest.c
248
remove(keyname);
regress/sys/kern/sysvshm/shmtest.c
65
char keyname[] = "/tmp/msgtestXXXXXXXX";
regress/sys/kern/sysvshm/shmtest.c
82
if ((fd = mkstemp(keyname)) < 0)
regress/usr.bin/ssh/unittests/authopt/tests.c
384
#define PREPARE(label, keyname, keywords) \
regress/usr.bin/ssh/unittests/authopt/tests.c
388
cert = load_key(keyname ".cert"); \
regress/usr.bin/ssh/unittests/authopt/tests.c
419
#define FLAG_CASE(keybase, label, keyname, keywords, mostly_off, var, val) \
regress/usr.bin/ssh/unittests/authopt/tests.c
421
PREPARE(keybase " " label, keyname, keywords); \
regress/usr.bin/ssh/unittests/kex/test_kex.c
111
keyname = strdup(sshkey_ssh_name(private));
regress/usr.bin/ssh/unittests/kex/test_kex.c
112
ASSERT_PTR_NE(keyname, NULL);
regress/usr.bin/ssh/unittests/kex/test_kex.c
113
kex_params.proposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = keyname;
regress/usr.bin/ssh/unittests/kex/test_kex.c
186
free(keyname);
regress/usr.bin/ssh/unittests/kex/test_kex.c
84
char *keyname = NULL;
regress/usr.bin/ssh/unittests/sshsig/tests.c
49
check_sig(const char *keyname, const char *signame, const struct sshbuf *msg,
regress/usr.bin/ssh/unittests/sshsig/tests.c
56
k = load_key(keyname);
sys/dev/pv/hypervic.c
152
const char *keyname;
sys/dev/pv/hypervic.c
804
kvp_pool_auto[i].keyname, kvp_pool_auto[i].value,
usr.bin/dig/dighost.c
1032
const char *keyname;
usr.bin/dig/dighost.c
1055
keyname = cfg_obj_asstring(cfg_map_getname(keyobj));
usr.bin/dig/dighost.c
1059
strlcpy(keynametext, keyname, sizeof(keynametext));
usr.bin/dig/dighost.c
874
dns_name_t keyname;
usr.bin/dig/dighost.c
882
dns_name_init(&keyname, NULL);
usr.bin/dig/dighost.c
902
result = dns_name_fromtext(&keyname, namebuf, dns_rootname, 0, namebuf);
usr.bin/dig/dighost.c
906
result = dns_tsigkey_create(&keyname, hmacname, secretstore,
usr.bin/dig/dighost.c
917
dns_name_invalidate(&keyname);
usr.bin/dig/lib/dns/tsig.c
1045
dns_name_t *keyname;
usr.bin/dig/lib/dns/tsig.c
1090
keyname = msg->tsigname;
usr.bin/dig/lib/dns/tsig.c
1102
if (!dns_name_equal(keyname, &tsigkey->name) ||
usr.bin/dig/lib/dns/tsig.c
709
dns_name_t *keyname;
usr.bin/dig/lib/dns/tsig.c
754
keyname = msg->tsigname;
usr.bin/dig/lib/dns/tsig.c
776
(!dns_name_equal(keyname, &tsigkey->name) ||
usr.bin/dig/lib/dns/tsig.c
796
ret = dns_tsigkey_create(keyname, &tsig.algorithm,
usr.bin/openssl/pkcs12.c
104
char *keyname;
usr.bin/openssl/pkcs12.c
354
.opt.arg = &cfg.keyname,
usr.bin/openssl/pkcs12.c
613
key = load_key(bio_err, cfg.keyname ?
usr.bin/openssl/pkcs12.c
614
cfg.keyname : cfg.infile,
usr.bin/signify/signify.c
403
const char *keyname = check_keyname_compliance(NULL,
usr.bin/signify/signify.c
406
VERIFYWITH "%.*s.pub", (int)strlen(keyname) - 4, keyname);
usr.bin/ssh/sshkey.c
270
sshkey_match_keyname_to_sigalgs(const char *keyname, const char *sigalgs)
usr.bin/ssh/sshkey.c
275
(ktype = sshkey_type_from_name(keyname)) == KEY_UNSPEC)
usr.bin/ssh/sshkey.c
300
return match_pattern_list(keyname, sigalgs, 0) == 1;
usr.bin/tic/tic.c
2740
fprintf(stderr, " %s", keyname(data->keycode));
usr.sbin/ikectl/ikeca.c
1000
ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
1004
warn("Problem with certificate for '%s'", keyname);
usr.sbin/ikectl/ikeca.c
1013
if (keyname)
usr.sbin/ikectl/ikeca.c
1025
if (keyname) {
usr.sbin/ikectl/ikeca.c
1074
ca_setcnf(struct ca *ca, const char *keyname)
usr.sbin/ikectl/ikeca.c
1089
ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
1093
ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
132
ca_key_create(struct ca *ca, char *keyname)
usr.sbin/ikectl/ikeca.c
139
ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
156
ca_key_import(struct ca *ca, char *keyname, char *import)
usr.sbin/ikectl/ikeca.c
167
len = snprintf(dst, sizeof(dst), "%s/private/%s.key", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
177
ca_key_delete(struct ca *ca, char *keyname)
usr.sbin/ikectl/ikeca.c
183
ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
192
ca_delkey(struct ca *ca, char *keyname)
usr.sbin/ikectl/ikeca.c
197
len = snprintf(file, sizeof(file), "%s/%s.crt", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
202
len = snprintf(file, sizeof(file), "%s/private/%s.key", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
207
len = snprintf(file, sizeof(file), "%s/private/%s.csr", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
212
len = snprintf(file, sizeof(file), "%s/private/%s.pfx", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
221
ca_request(struct ca *ca, char *keyname, int type)
usr.sbin/ikectl/ikeca.c
229
ca_setenv("$ENV::CERT_CN", keyname);
usr.sbin/ikectl/ikeca.c
231
strlcpy(name, keyname, sizeof(name));
usr.sbin/ikectl/ikeca.c
237
if (!strcmp(keyname, "local")) {
usr.sbin/ikectl/ikeca.c
248
ca_setcnf(ca, keyname);
usr.sbin/ikectl/ikeca.c
250
len = snprintf(key, sizeof(key), "%s/private/%s.key", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
253
len = snprintf(path, sizeof(path), "%s/private/%s.csr", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
266
ca_sign(struct ca *ca, char *keyname, int type)
usr.sbin/ikectl/ikeca.c
287
ca_setcnf(ca, keyname);
usr.sbin/ikectl/ikeca.c
295
len = snprintf(out, sizeof(out), "%s/%s.crt", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
298
len = snprintf(in, sizeof(in), "%s/private/%s.csr", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
312
ca_certificate(struct ca *ca, char *keyname, int type, int action)
usr.sbin/ikectl/ikeca.c
338
ca_key_create(ca, keyname);
usr.sbin/ikectl/ikeca.c
339
ca_request(ca, keyname, type);
usr.sbin/ikectl/ikeca.c
340
ca_sign(ca, keyname, type);
usr.sbin/ikectl/ikeca.c
346
ca_key_install(struct ca *ca, char *keyname, char *dir)
usr.sbin/ikectl/ikeca.c
355
len = snprintf(src, sizeof(src), "%s/private/%s.key", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
390
ca_cert_install(struct ca *ca, char *keyname, char *dir)
usr.sbin/ikectl/ikeca.c
403
if ((r = ca_key_install(ca, keyname, dir)) != 0) {
usr.sbin/ikectl/ikeca.c
408
len = snprintf(src, sizeof(src), "%s/%s.crt", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
411
len = snprintf(dst, sizeof(dst), "%s/certs/%s.crt", dir, keyname);
usr.sbin/ikectl/ikeca.c
712
ca_export(struct ca *ca, char *keyname, char *myname, char *password)
usr.sbin/ikectl/ikeca.c
734
if (keyname != NULL) {
usr.sbin/ikectl/ikeca.c
735
if (strlcpy(oname, keyname, sizeof(oname)) >= sizeof(oname))
usr.sbin/ikectl/ikeca.c
764
len = snprintf(key, sizeof(key), "%s/private/%s.key", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
767
len = snprintf(crt, sizeof(crt), "%s/%s.crt", ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
779
if (keyname != NULL) {
usr.sbin/ikectl/ikeca.c
781
"-name", keyname, "-CAfile", cacrt, "-inkey", key,
usr.sbin/ikectl/ikeca.c
847
if (keyname != NULL) {
usr.sbin/ikectl/ikeca.c
858
ca->sslpath, keyname);
usr.sbin/ikectl/ikeca.c
861
len = snprintf(dst, sizeof(dst), "%s/private/%s.key", p, keyname);
usr.sbin/ikectl/ikeca.c
871
keyname);
usr.sbin/ikectl/ikeca.c
874
len = snprintf(dst, sizeof(dst), "%s/certs/%s.crt", p, keyname);
usr.sbin/ikectl/ikeca.c
891
if (keyname == NULL) {
usr.sbin/ikectl/ikeca.c
990
ca_revoke(struct ca *ca, char *keyname)
usr.sbin/ikectl/ikeca.c
998
if (keyname) {
usr.sbin/relayd/config.c
151
struct keyname *keyname;
usr.sbin/relayd/config.c
191
while ((keyname =
usr.sbin/relayd/config.c
193
TAILQ_REMOVE(&proto->tlscerts, keyname, entry);
usr.sbin/relayd/config.c
194
free(keyname->name);
usr.sbin/relayd/config.c
195
free(keyname);
usr.sbin/relayd/parse.y
1345
struct keyname *name;
usr.sbin/relayd/parse.y
1853
struct keyname *name;
usr.sbin/relayd/parse.y
3412
struct keyname *name;
usr.sbin/relayd/relayd.h
727
TAILQ_ENTRY(keyname) entry;
usr.sbin/relayd/relayd.h
730
TAILQ_HEAD(keynamelist, keyname);