Searched refs:keys (Results 1 – 11 of 11) sorted by relevance
/curl/lib/ |
H A D | curl_ntlm_core.c | 312 void Curl_ntlm_core_lm_resp(const unsigned char *keys, in Curl_ntlm_core_lm_resp() argument 319 setup_des_key(keys, DESKEY(ks)); in Curl_ntlm_core_lm_resp() 323 setup_des_key(keys + 7, DESKEY(ks)); in Curl_ntlm_core_lm_resp() 327 setup_des_key(keys + 14, DESKEY(ks)); in Curl_ntlm_core_lm_resp() 332 setup_des_key(keys, &des); in Curl_ntlm_core_lm_resp() 334 setup_des_key(keys + 7, &des); in Curl_ntlm_core_lm_resp() 336 setup_des_key(keys + 14, &des); in Curl_ntlm_core_lm_resp() 340 encrypt_des(plaintext, results, keys); in Curl_ntlm_core_lm_resp() 341 encrypt_des(plaintext, results + 8, keys + 7); in Curl_ntlm_core_lm_resp() 342 encrypt_des(plaintext, results + 16, keys + 14); in Curl_ntlm_core_lm_resp() [all …]
|
H A D | curl_ntlm_core.h | 43 void Curl_ntlm_core_lm_resp(const unsigned char *keys,
|
/curl/tests/ |
H A D | test1222.pl | 283 my %keys = (%syminver, %funcman, %optman, %hdr); 295 foreach my $sym (sort {$a cmp $b} keys %keys) {
|
H A D | negtelnetserver.py | 260 for k in cls.__dict__.keys():
|
H A D | smbserver.py | 245 fakefid = conn_data["OpenedFiles"].keys()[-1] + 1
|
/curl/docs/cmdline-opts/ |
H A D | insecure.md | 34 ".ssh" subdirectory, which contains hostnames and their public keys.
|
H A D | write-out.md | 106 A JSON object with all available keys. (Added in 7.70.0)
|
/curl/lib/vtls/ |
H A D | sectransp.c | 499 CFTypeRef keys[5]; in CopyIdentityWithLabel() local 507 keys[0] = kSecClass; in CopyIdentityWithLabel() 509 keys[1] = kSecReturnRef; in CopyIdentityWithLabel() 512 keys[2] = kSecMatchLimit; in CopyIdentityWithLabel() 515 keys[3] = kSecMatchPolicy; in CopyIdentityWithLabel() 518 keys[4] = kSecAttrLabel; in CopyIdentityWithLabel() 519 query_dict = CFDictionaryCreate(NULL, (const void **)keys, in CopyIdentityWithLabel()
|
/curl/docs/ |
H A D | TODO | 143 17.3 Read keys from ~/.ssh/id_ecdsa, id_ed25519 781 keys (PSKs). These pre-shared keys are symmetric keys shared in advance among 818 keys and certs over DNS using DNSSEC as an alternative to the CA model. 967 17.3 Read keys from ~/.ssh/id_ecdsa, id_ed25519 969 The libssh2 backend in curl is limited to only reading keys from id_rsa and
|
/curl/.github/workflows/ |
H A D | linux.yml | 377 …curl -sSf --compressed https://apt.repos.intel.com/intel-gpg-keys/GPG-PUB-KEY-INTEL-SW-PRODUCTS.PU…
|
/curl/docs/libcurl/ |
H A D | libcurl-tutorial.md | 1414 [ seeding, passwords, keys, certificates, ENGINE, ca certs ]
|
Completed in 54 milliseconds