/sssd/src/sss_client/ |
H A D | nss_mc_initgr.c | 93 uint32_t hash; local 108 hash = sss_nss_mc_hash(&initgr_mc_ctx, name, name_len + 1); 109 slot = initgr_mc_ctx.hash_table[hash]; 125 if (hash != rec->hash1) { 126 /* if name hash does not match we can skip this immediately */ 127 slot = sss_nss_mc_next_slot_with_hash(rec, hash); 151 slot = sss_nss_mc_next_slot_with_hash(rec, hash);
|
H A D | nss_mc_group.c | 112 uint32_t hash; local 127 hash = sss_nss_mc_hash(&gr_mc_ctx, name, name_len + 1); 128 slot = gr_mc_ctx.hash_table[hash]; 144 if (hash != rec->hash1) { 145 /* if name hash does not match we can skip this immediately */ 146 slot = sss_nss_mc_next_slot_with_hash(rec, hash); 169 slot = sss_nss_mc_next_slot_with_hash(rec, hash); 192 uint32_t hash; local 209 hash = sss_nss_mc_hash(&gr_mc_ctx, gidstr, len+1); 210 slot = gr_mc_ctx.hash_table[hash]; [all...] |
H A D | nss_mc_passwd.c | 105 uint32_t hash; local 120 hash = sss_nss_mc_hash(&pw_mc_ctx, name, name_len + 1); 121 slot = pw_mc_ctx.hash_table[hash]; 137 if (hash != rec->hash1) { 138 /* if name hash does not match we can skip this immediately */ 139 slot = sss_nss_mc_next_slot_with_hash(rec, hash); 162 slot = sss_nss_mc_next_slot_with_hash(rec, hash); 185 uint32_t hash; local 202 hash = sss_nss_mc_hash(&pw_mc_ctx, uidstr, len+1); 203 slot = pw_mc_ctx.hash_table[hash]; [all...] |
H A D | nss_mc.h | 55 uint32_t *hash_table; /* hash table address (in mmap) */ 56 uint32_t ht_size; /* size of hash table */ 70 uint32_t hash);
|
H A D | nss_mc_common.c | 372 uint32_t hash) 374 if (rec->hash1 == hash) { 376 } else if (rec->hash2 == hash) { 371 sss_nss_mc_next_slot_with_hash(struct sss_mc_rec *rec, uint32_t hash) argument
|
/sssd/src/python/ |
H A D | pysss_murmur.c | 27 "murmurhash3(key, key_len, seed) -> 32bit integer hash\n\ 29 Calculate the murmur hash version 3 of the first key_len bytes from key\n\ 38 uint32_t hash; local 52 hash = murmurhash3(key, key_len, seed); 54 return PyLong_FromUnsignedLong((unsigned long) hash); 88 methods, sss_py_const_p(char, "murmur hash functions"));
|
/sssd/src/util/crypto/nss/ |
H A D | nss_hmac_sha1.c | 44 unsigned char hash[SSS_SHA1_LENGTH]; local 80 HASH_End(sha1, hash, &res_len, SSS_SHA1_LENGTH); 84 HASH_Update(sha1, hash, SSS_SHA1_LENGTH);
|
H A D | nss_sha512crypt.c | 230 /* Repeatedly run the collected hash value through SHA512 to burn CPU cycles. */ 336 char *hash; local 342 hash = talloc_size(memctx, hlen); 343 if (!hash) return ENOMEM; 345 ret = sha512_crypt_r(key, salt, hash, hlen); 348 *_hash = hash;
|
/sssd/src/util/crypto/libcrypto/ |
H A D | crypto_hmac_sha1.c | 41 unsigned char hash[SSS_SHA1_LENGTH]; local 78 EVP_DigestFinal_ex(ctx, hash, &res_len); 86 EVP_DigestUpdate(ctx, (const unsigned char *)hash, SSS_SHA1_LENGTH);
|
H A D | crypto_sha512crypt.c | 237 /* Repeatedly run the collected hash value through SHA512 to burn CPU cycles. */ 346 char *hash; local 352 hash = talloc_size(memctx, hlen); 353 if (!hash) return ENOMEM; 355 ret = sha512_crypt_r(key, salt, hash, hlen); 358 *_hash = hash;
|
/sssd/src/responder/nss/ |
H A D | nsssrv_mmap_cache.c | 66 uint32_t *hash_table; /* hash table address (in mmap) */ 67 uint32_t ht_size; /* size of hash table */ 100 uint32_t hash) 102 if (rec->hash1 == hash) { 104 } else if (rec->hash2 == hash) { 114 uint32_t hash, 119 if (rec->hash1 == hash) { 121 } else if (rec->hash2 == hash) { 205 uint32_t hash) 210 if (hash > MC_HT_ELEM 99 sss_mc_next_slot_with_hash(struct sss_mc_rec *rec, uint32_t hash) argument 113 sss_mc_chain_slot_to_record_with_hash(struct sss_mc_rec *rec, uint32_t hash, uint32_t slot) argument 203 sss_mc_add_rec_to_chain(struct sss_mc_ctx *mcc, struct sss_mc_rec *rec, uint32_t hash) argument 237 sss_mc_rm_rec_from_chain(struct sss_mc_ctx *mcc, struct sss_mc_rec *rec, uint32_t hash) argument 511 uint32_t hash; local 771 uint32_t hash; local 910 uint32_t hash; local [all...] |
/sssd/src/tests/intg/ |
H A D | ds_openldap.py | 37 hash = hashlib.sha1(password) 38 hash.update(salt) 39 return "{SSHA}" + base64.standard_b64encode(hash.digest() + salt)
|
/sssd/src/tests/ |
H A D | pysss_murmur-test.py | 70 hash = pysss_murmur.murmurhash3("S-1-5-21-2153326666-2176343378-3404031434", 41, 0xdeadbeef) 71 self.assertEqual(hash, 93103853)
|
/sssd/src/responder/ssh/ |
H A D | sshsrv_cmd.c | 487 unsigned char salt[SSS_SHA1_LENGTH], hash[SSS_SHA1_LENGTH]; local 516 hash); 531 hashstr = sss_base64_encode(tmp_ctx, hash, SSS_SHA1_LENGTH);
|
/sssd/src/sss_client/libwbclient/ |
H A D | wbclient_sssd.h | 253 } hash; member in union:wbcAuthUserParams::__anon28
|
/sssd/src/db/ |
H A D | sysdb_ops.c | 2986 char *hash = NULL; local 3001 ret = s3crypt_sha512(tmp_ctx, password, salt, &hash); 3003 DEBUG(SSSDBG_CONF_SETTINGS, "Failed to create password hash.\n"); 3012 ret = sysdb_attrs_add_string(attrs, SYSDB_CACHEDPWD, hash); 4055 DEBUG(SSSDBG_CONF_SETTINGS, "Failed to create password hash.\n"); 4188 DEBUG(SSSDBG_CONF_SETTINGS, "Failed to create password hash.\n");
|