/curl/docs/cmdline-opts/ |
H A D | key-type.md | 4 Long: key-type 6 Help: Private key file type (DER/PEM/ENG) 12 - key 14 - --key-type DER --key here $URL 17 # `--key-type` 19 Private key file type. Specify which type your --key provided private key
|
H A D | proxy-key-type.md | 4 Long: proxy-key-type 6 Help: Private key file type for proxy 11 - proxy-key 14 - --proxy-key-type DER --proxy-key here -x https://proxy $URL 17 # `--proxy-key-type` 19 Specify the private key file type your --proxy-key provided private key uses. 22 Equivalent to --key-type but used in HTTPS proxy context.
|
H A D | proxy-key.md | 4 Long: proxy-key 5 Help: Private key for HTTPS proxy 6 Arg: <key> 11 - proxy-key-type 14 - --proxy-key here -x https://proxy $URL 17 # `--proxy-key` 19 Specify the filename for your private key when using client certificates with 20 your HTTPS proxy. This option is the equivalent to --key but used in HTTPS
|
H A D | key.md | 4 Long: key 5 Arg: <key> 7 Help: Private key filename 12 - key-type 15 - --cert certificate --key here $URL 18 # `--key` 20 Private key filename. Allows you to provide your private key in this separate 25 then a PKCS#11 URI (RFC 7512) can be used to specify a private key located in 28 `pkcs11` if none was provided and the --key-type option is set as `ENG` if 32 ignored for TLS protocols (HTTPS, etc). Those backends expect the private key
|
H A D | pubkey.md | 5 Arg: <key> 7 Help: SSH Public key filename 19 Public key filename. Allows you to provide your public key in this separate 22 curl attempts to automatically extract the public key from the private key 24 key extraction requires libcurl to be linked against a copy of libssh2 1.2.8
|
H A D | pass.md | 6 Help: Passphrase for the private key 12 - key 15 - --pass secret --key file $URL 20 Passphrase for the private key.
|
H A D | proxy-pass.md | 6 Help: Passphrase for private key for HTTPS proxy 12 - proxy-key 14 - --proxy-pass secret --proxy-key here -x https://proxy $URL 19 Passphrase for the private key for HTTPS proxy client certificate.
|
H A D | pinnedpubkey.md | 6 Help: Public key to verify peer against 20 Use the specified public key file (or hashes) to verify the peer. This can be 21 a path to a file which contains a single public key in PEM or DER format, or 26 indicating its identity. A public key is extracted from this certificate and 27 if it does not exactly match the public key provided to this option, curl 31 together then the peer is still verified by public key.
|
H A D | proxy-pinnedpubkey.md | 6 Help: FILE/HASHES public key to verify proxy with 21 Use the specified public key file (or hashes) to verify the proxy. This can be 22 a path to a file which contains a single public key in PEM or DER format, or 27 indicating its identity. A public key is extracted from this certificate and 28 if it does not exactly match the public key provided to this option, curl
|
/curl/tests/unit/ |
H A D | unit1309.c | 54 printf("%ld.%ld[%d]", (long)t->key.tv_sec, in splayprint() 55 (long)t->key.tv_usec, i); in splayprint() 86 struct curltime key; variable 88 key.tv_sec = 0; 89 key.tv_usec = (541*i)%1023; 90 storage[i] = key.tv_usec; 92 root = Curl_splayinsert(key, root, &nodes[i]); 116 struct curltime key; variable 118 key.tv_sec = 0; 119 key.tv_usec = (541*i)%1023; [all …]
|
H A D | unit1616.c | 56 curl_off_t key = 20; variable 63 nodep = Curl_hash_offt_set(&hash_static, key, value); 67 v = Curl_hash_offt_get(&hash_static, key); 83 v = Curl_hash_offt_get(&hash_static, key);
|
/curl/lib/ |
H A D | curl_ntlm_core.c | 144 key[0] = (char)key_56[0]; in extend_key_56_to_64() 163 DES_cblock key; in setup_des_key() local 169 DES_set_odd_parity(&key); in setup_des_key() 180 char key[8]; in setup_des_key() local 186 Curl_des_set_odd_parity((unsigned char *) key, sizeof(key)); in setup_des_key() 198 char key[8]; in encrypt_des() local 217 char key[8]; in encrypt_des() local 225 Curl_des_set_odd_parity((unsigned char *) key, sizeof(key)); in encrypt_des() 240 char key[8]; in encrypt_des() local 269 char key[8]; in encrypt_des() member [all …]
|
H A D | splay.c | 54 timediff_t comp = compare(i, t->key); in Curl_splay() 58 if(compare(i, t->smaller->key) < 0) { in Curl_splay() 73 if(compare(i, t->larger->key) > 0) { in Curl_splay() 115 if(compare(i, t->key) == 0) { in Curl_splayinsert() 134 else if(compare(i, t->key) < 0) { in Curl_splayinsert() 145 node->key = i; in Curl_splayinsert() 171 if(compare(i, t->key) < 0) { in Curl_splaygetbest() 184 x->key = t->key; in Curl_splaygetbest() 227 if(compare(KEY_NOTUSED, removenode->key) == 0) { in Curl_splayremove() 244 t = Curl_splay(removenode->key, t); in Curl_splayremove() [all …]
|
H A D | hash.h | 34 typedef size_t (*hash_function) (void *key, 64 typedef void (*Curl_hash_elem_dtor)(void *key, size_t key_len, void *p); 74 char key[1]; /* allocated memory following the struct */ member 92 void *Curl_hash_add(struct Curl_hash *h, void *key, size_t key_len, void *p); 93 void *Curl_hash_add2(struct Curl_hash *h, void *key, size_t key_len, void *p, 95 int Curl_hash_delete(struct Curl_hash *h, void *key, size_t key_len); 96 void *Curl_hash_pick(struct Curl_hash *, void *key, size_t key_len); 103 size_t Curl_hash_str(void *key, size_t key_length, size_t slots_num);
|
H A D | hash.c | 48 e->dtor(e->key, e->key_len, e->ptr); in hash_element_dtor() 98 memcpy(he->key, key, key_len); in mk_hash_element() 127 l = FETCH_LIST(h, key, key_len); in Curl_hash_add2() 131 if(h->comp_func(he->key, he->key_len, key, key_len)) { in Curl_hash_add2() 138 he = mk_hash_element(key, key_len, p, dtor); in Curl_hash_add2() 159 return Curl_hash_add2(h, key, key_len, p, NULL); in Curl_hash_add() 174 struct Curl_llist *l = FETCH_LIST(h, key, key_len); in Curl_hash_delete() 178 if(h->comp_func(he->key, he->key_len, key, key_len)) { in Curl_hash_delete() 201 l = FETCH_LIST(h, key, key_len); in Curl_hash_pick() 204 if(h->comp_func(he->key, he->key_len, key, key_len)) { in Curl_hash_pick() [all …]
|
H A D | hmac.c | 54 const unsigned char *key, in Curl_HMAC_init() argument 76 hashparams->hupdate(ctxt->hashctxt1, key, keylen); in Curl_HMAC_init() 79 key = hkey; in Curl_HMAC_init() 88 b = (unsigned char)(*key ^ hmac_ipad); in Curl_HMAC_init() 90 b = (unsigned char)(*key++ ^ hmac_opad); in Curl_HMAC_init() 148 const unsigned char *key, const size_t keylen, in Curl_hmacit() argument 153 Curl_HMAC_init(hashparams, key, curlx_uztoui(keylen)); in Curl_hmacit()
|
H A D | splay.h | 35 struct curltime key; /* this node's "sort" key */ member 42 struct Curl_tree *Curl_splayinsert(struct curltime key, 46 struct Curl_tree *Curl_splaygetbest(struct curltime key,
|
/curl/docs/libcurl/opts/ |
H A D | CURLOPT_SSH_HOSTKEYFUNCTION.md | 18 CURLOPT_SSH_HOSTKEYFUNCTION - callback to check host key 27 const char *key, 39 This callback gets called when the verification of the SSH host key is needed. 41 **key** is **keylen** bytes long and is the key to check. **keytype** 52 The host key is accepted, the connection should continue. 56 the host key is rejected, the connection is canceled. 73 const char *key, /* host key to check */ 74 size_t keylen) /* length of the key */
|
H A D | CURLOPT_SSH_KEYFUNCTION.md | 37 CURLKHMATCH_MISMATCH, /* host found, key mismatch */ 38 CURLKHMATCH_MISSING, /* no matching host/key found */ 42 const char *key; /* points to a null-terminated string encoded with 68 This callback function gets passed the CURL handle, the key from the 69 known_hosts file *knownkey*, the key from the remote site *foundkey*, 76 The new host+key is accepted and libcurl replaces the old host+key into the 78 host+key combo to the known_host pool kept in memory if it was not already 86 continuing with the connection. This also adds the host+key combo to the 99 The host+key is rejected. libcurl denies the connection to continue and it is 104 The host+key is rejected, but the SSH connection is asked to be kept alive. [all …]
|
/curl/tests/http/ |
H A D | test_16_info.py | 130 def check_stat_positive(self, s, idx, key): argument 131 assert key in s, f'stat #{idx} "{key}" missing: {s}' 132 assert s[key] > 0, f'stat #{idx} "{key}" not positive: {s}' 134 def check_stat_zero(self, s, key): argument 135 assert key in s, f'stat "{key}" missing: {s}' 136 assert s[key] == 0, f'stat "{key}" not zero: {s}' 156 for key in zero_keys: 157 self.check_stat_zero(s, key) 158 for key in pos_keys: 159 self.check_stat_positive(s, idx, key) [all …]
|
/curl/tests/libtest/ |
H A D | lib1541.c | 46 static void report_time(const char *key, const char *where, curl_off_t time, in report_time() argument 50 printf("%s on %s is OK\n", key, where); in report_time() 53 key, where, time); in report_time() 56 static void check_time(CURL *easy, int key, const char *name, in check_time() argument 60 CURLcode res = curl_easy_getinfo(easy, (CURLINFO)key, &tval); in check_time() 68 static void check_time0(CURL *easy, int key, const char *name, in check_time0() argument 72 CURLcode res = curl_easy_getinfo(easy, (CURLINFO)key, &tval); in check_time0()
|
/curl/tests/data/ |
H A D | test630 | 6 server key check 17 SFTP incorrect host key 20 --hostpubmd5 00000000000000000000000000000000 --key %LOGDIR/server/curl_client_key --pubkey %LOGDIR…
|
H A D | test631 | 6 server key check 17 SCP incorrect host key 20 --hostpubmd5 00000000000000000000000000000000 --key %LOGDIR/server/curl_client_key --pubkey %LOGDIR…
|
H A D | test632 | 6 server key check 20 SFTP syntactically invalid host key 23 --hostpubmd5 00 --key %LOGDIR/server/curl_client_key --pubkey %LOGDIR/server/curl_client_key.pub -u…
|
H A D | test664 | 5 server key check 24 SFTP correct host key 27 --hostpubmd5 %SSHSRVMD5 --key %LOGDIR/server/curl_client_key --pubkey %LOGDIR/server/curl_client_ke…
|