Home
last modified time | relevance | path

Searched refs:key (Results 1 – 25 of 174) sorted by relevance

1234567

/curl/docs/cmdline-opts/
H A Dkey-type.md4 Long: key-type
6 Help: Private key file type (DER/PEM/ENG)
12 - key
14 - --key-type DER --key here $URL
17 # `--key-type`
19 Private key file type. Specify which type your --key provided private key
H A Dproxy-key-type.md4 Long: proxy-key-type
6 Help: Private key file type for proxy
11 - proxy-key
14 - --proxy-key-type DER --proxy-key here -x https://proxy $URL
17 # `--proxy-key-type`
19 Specify the private key file type your --proxy-key provided private key uses.
22 Equivalent to --key-type but used in HTTPS proxy context.
H A Dproxy-key.md4 Long: proxy-key
5 Help: Private key for HTTPS proxy
6 Arg: <key>
11 - proxy-key-type
14 - --proxy-key here -x https://proxy $URL
17 # `--proxy-key`
19 Specify the filename for your private key when using client certificates with
20 your HTTPS proxy. This option is the equivalent to --key but used in HTTPS
H A Dkey.md4 Long: key
5 Arg: <key>
7 Help: Private key filename
12 - key-type
15 - --cert certificate --key here $URL
18 # `--key`
20 Private key filename. Allows you to provide your private key in this separate
25 then a PKCS#11 URI (RFC 7512) can be used to specify a private key located in
28 `pkcs11` if none was provided and the --key-type option is set as `ENG` if
32 ignored for TLS protocols (HTTPS, etc). Those backends expect the private key
H A Dpubkey.md5 Arg: <key>
7 Help: SSH Public key filename
19 Public key filename. Allows you to provide your public key in this separate
22 curl attempts to automatically extract the public key from the private key
24 key extraction requires libcurl to be linked against a copy of libssh2 1.2.8
H A Dpass.md6 Help: Passphrase for the private key
12 - key
15 - --pass secret --key file $URL
20 Passphrase for the private key.
H A Dproxy-pass.md6 Help: Passphrase for private key for HTTPS proxy
12 - proxy-key
14 - --proxy-pass secret --proxy-key here -x https://proxy $URL
19 Passphrase for the private key for HTTPS proxy client certificate.
H A Dpinnedpubkey.md6 Help: Public key to verify peer against
20 Use the specified public key file (or hashes) to verify the peer. This can be
21 a path to a file which contains a single public key in PEM or DER format, or
26 indicating its identity. A public key is extracted from this certificate and
27 if it does not exactly match the public key provided to this option, curl
31 together then the peer is still verified by public key.
H A Dproxy-pinnedpubkey.md6 Help: FILE/HASHES public key to verify proxy with
21 Use the specified public key file (or hashes) to verify the proxy. This can be
22 a path to a file which contains a single public key in PEM or DER format, or
27 indicating its identity. A public key is extracted from this certificate and
28 if it does not exactly match the public key provided to this option, curl
/curl/tests/unit/
H A Dunit1309.c54 printf("%ld.%ld[%d]", (long)t->key.tv_sec, in splayprint()
55 (long)t->key.tv_usec, i); in splayprint()
86 struct curltime key; variable
88 key.tv_sec = 0;
89 key.tv_usec = (541*i)%1023;
90 storage[i] = key.tv_usec;
92 root = Curl_splayinsert(key, root, &nodes[i]);
116 struct curltime key; variable
118 key.tv_sec = 0;
119 key.tv_usec = (541*i)%1023;
[all …]
H A Dunit1616.c56 curl_off_t key = 20; variable
63 nodep = Curl_hash_offt_set(&hash_static, key, value);
67 v = Curl_hash_offt_get(&hash_static, key);
83 v = Curl_hash_offt_get(&hash_static, key);
/curl/lib/
H A Dcurl_ntlm_core.c144 key[0] = (char)key_56[0]; in extend_key_56_to_64()
163 DES_cblock key; in setup_des_key() local
169 DES_set_odd_parity(&key); in setup_des_key()
180 char key[8]; in setup_des_key() local
186 Curl_des_set_odd_parity((unsigned char *) key, sizeof(key)); in setup_des_key()
198 char key[8]; in encrypt_des() local
217 char key[8]; in encrypt_des() local
225 Curl_des_set_odd_parity((unsigned char *) key, sizeof(key)); in encrypt_des()
240 char key[8]; in encrypt_des() local
269 char key[8]; in encrypt_des() member
[all …]
H A Dsplay.c54 timediff_t comp = compare(i, t->key); in Curl_splay()
58 if(compare(i, t->smaller->key) < 0) { in Curl_splay()
73 if(compare(i, t->larger->key) > 0) { in Curl_splay()
115 if(compare(i, t->key) == 0) { in Curl_splayinsert()
134 else if(compare(i, t->key) < 0) { in Curl_splayinsert()
145 node->key = i; in Curl_splayinsert()
171 if(compare(i, t->key) < 0) { in Curl_splaygetbest()
184 x->key = t->key; in Curl_splaygetbest()
227 if(compare(KEY_NOTUSED, removenode->key) == 0) { in Curl_splayremove()
244 t = Curl_splay(removenode->key, t); in Curl_splayremove()
[all …]
H A Dhash.h34 typedef size_t (*hash_function) (void *key,
64 typedef void (*Curl_hash_elem_dtor)(void *key, size_t key_len, void *p);
74 char key[1]; /* allocated memory following the struct */ member
92 void *Curl_hash_add(struct Curl_hash *h, void *key, size_t key_len, void *p);
93 void *Curl_hash_add2(struct Curl_hash *h, void *key, size_t key_len, void *p,
95 int Curl_hash_delete(struct Curl_hash *h, void *key, size_t key_len);
96 void *Curl_hash_pick(struct Curl_hash *, void *key, size_t key_len);
103 size_t Curl_hash_str(void *key, size_t key_length, size_t slots_num);
H A Dhash.c48 e->dtor(e->key, e->key_len, e->ptr); in hash_element_dtor()
98 memcpy(he->key, key, key_len); in mk_hash_element()
127 l = FETCH_LIST(h, key, key_len); in Curl_hash_add2()
131 if(h->comp_func(he->key, he->key_len, key, key_len)) { in Curl_hash_add2()
138 he = mk_hash_element(key, key_len, p, dtor); in Curl_hash_add2()
159 return Curl_hash_add2(h, key, key_len, p, NULL); in Curl_hash_add()
174 struct Curl_llist *l = FETCH_LIST(h, key, key_len); in Curl_hash_delete()
178 if(h->comp_func(he->key, he->key_len, key, key_len)) { in Curl_hash_delete()
201 l = FETCH_LIST(h, key, key_len); in Curl_hash_pick()
204 if(h->comp_func(he->key, he->key_len, key, key_len)) { in Curl_hash_pick()
[all …]
H A Dhmac.c56 const unsigned char *key, in Curl_HMAC_init() argument
80 (*hashparams->hmac_hupdate)(ctxt->hmac_hashctxt1, key, keylen); in Curl_HMAC_init()
83 key = hkey; in Curl_HMAC_init()
92 b = (unsigned char)(*key ^ hmac_ipad); in Curl_HMAC_init()
94 b = (unsigned char)(*key++ ^ hmac_opad); in Curl_HMAC_init()
154 const unsigned char *key, const size_t keylen, in Curl_hmacit() argument
159 Curl_HMAC_init(hashparams, key, curlx_uztoui(keylen)); in Curl_hmacit()
H A Dsplay.h35 struct curltime key; /* this node's "sort" key */ member
42 struct Curl_tree *Curl_splayinsert(struct curltime key,
46 struct Curl_tree *Curl_splaygetbest(struct curltime key,
/curl/docs/libcurl/opts/
H A DCURLOPT_SSH_HOSTKEYFUNCTION.md18 CURLOPT_SSH_HOSTKEYFUNCTION - callback to check host key
27 const char *key,
39 This callback gets called when the verification of the SSH host key is needed.
41 **key** is **keylen** bytes long and is the key to check. **keytype**
52 The host key is accepted, the connection should continue.
56 the host key is rejected, the connection is canceled.
73 const char *key, /* host key to check */
74 size_t keylen) /* length of the key */
H A DCURLOPT_SSH_KEYFUNCTION.md37 CURLKHMATCH_MISMATCH, /* host found, key mismatch! */
38 CURLKHMATCH_MISSING, /* no matching host/key found */
42 const char *key; /* points to a null-terminated string encoded with
68 This callback function gets passed the CURL handle, the key from the
69 known_hosts file *knownkey*, the key from the remote site *foundkey*,
76 The new host+key is accepted and libcurl replaces the old host+key into the
78 host+key combo to the known_host pool kept in memory if it was not already
86 continuing with the connection. This also adds the host+key combo to the
99 The host+key is rejected. libcurl denies the connection to continue and it is
104 The host+key is rejected, but the SSH connection is asked to be kept alive.
[all …]
/curl/tests/http/
H A Dtest_16_info.py133 def check_stat_positive(self, s, idx, key): argument
134 assert key in s, f'stat #{idx} "{key}" missing: {s}'
135 assert s[key] > 0, f'stat #{idx} "{key}" not positive: {s}'
137 def check_stat_zero(self, s, key): argument
138 assert key in s, f'stat "{key}" missing: {s}'
139 assert s[key] == 0, f'stat "{key}" not zero: {s}'
159 for key in zero_keys:
160 self.check_stat_zero(s, key)
161 for key in pos_keys:
162 self.check_stat_positive(s, idx, key)
[all …]
/curl/tests/libtest/
H A Dlib1541.c46 static void report_time(const char *key, const char *where, curl_off_t time, in report_time() argument
50 printf("%s on %s is OK\n", key, where); in report_time()
53 key, where, time); in report_time()
56 static void check_time(CURL *easy, int key, const char *name, in check_time() argument
60 CURLcode res = curl_easy_getinfo(easy, (CURLINFO)key, &tval); in check_time()
68 static void check_time0(CURL *easy, int key, const char *name, in check_time0() argument
72 CURLcode res = curl_easy_getinfo(easy, (CURLINFO)key, &tval); in check_time0()
/curl/tests/data/
H A Dtest6316 server key check
17 SCP incorrect host key
20 --hostpubmd5 00000000000000000000000000000000 --key %LOGDIR/server/curl_client_key --pubkey %LOGDIR…
H A Dtest6306 server key check
17 SFTP incorrect host key
20 --hostpubmd5 00000000000000000000000000000000 --key %LOGDIR/server/curl_client_key --pubkey %LOGDIR…
H A Dtest6326 server key check
20 SFTP syntactically invalid host key
23 --hostpubmd5 00 --key %LOGDIR/server/curl_client_key --pubkey %LOGDIR/server/curl_client_key.pub -u…
H A Dtest6645 server key check
24 SFTP correct host key
27 --hostpubmd5 %SSHSRVMD5 --key %LOGDIR/server/curl_client_key --pubkey %LOGDIR/server/curl_client_ke…

Completed in 28 milliseconds

1234567