Searched refs:expected_key (Results 1 – 3 of 3) sorted by relevance
| /freebsd/crypto/krb5/src/lib/crypto/crypto_tests/ |
| H A D | t_derive.c | 39 krb5_data expected_key; member 337 if (test->expected_key.length == enc->keylength) { in main() 343 ret = alloc_data(&rnd, test->expected_key.length); in main() 360 assert(outcmp.length == test->expected_key.length); in main() 361 if (memcmp(outcmp.data, test->expected_key.data, outcmp.length) != 0) { in main()
|
| H A D | t_str2key.c | 34 krb5_data expected_key; member 503 assert(keyblock->length == test->expected_key.length); in main() 504 if (memcmp(keyblock->contents, test->expected_key.data, in main()
|
| /freebsd/crypto/openssh/ |
| H A D | ssh-agent.c | 706 parse_userauth_request(struct sshbuf *msg, const struct sshkey *expected_key, in parse_userauth_request() 742 !sshkey_equal(expected_key, mkey) || in parse_userauth_request() 743 sshkey_type_from_name(pkalg) != expected_key->type) { in parse_userauth_request() 700 parse_userauth_request(struct sshbuf * msg,const struct sshkey * expected_key,char ** userp,struct sshbuf ** sess_idp,struct sshkey ** hostkeyp) parse_userauth_request() argument
|