Searched defs:key_len (Results 1 - 9 of 9) sorted by relevance
/sssd/src/python/ |
H A D | pysss_murmur.c | 27 "murmurhash3(key, key_len, seed) -> 32bit integer hash\n\ 29 Calculate the murmur hash version 3 of the first key_len bytes from key\n\ 36 long key_len; local 41 &key, &key_len, &seed)) { 46 if (seed > UINT32_MAX || key_len > INT_MAX || key_len < 0 || 47 (size_t)key_len > strlen(key)) { 52 hash = murmurhash3(key, key_len, seed);
|
/sssd/src/util/crypto/nss/ |
H A D | nss_hmac_sha1.c | 35 size_t key_len, 57 if (key_len > HMAC_SHA1_BLOCKSIZE) { 60 HASH_Update(sha1, key, key_len); 65 memcpy(ikey, key, key_len); 66 if (key_len != HMAC_SHA1_BLOCKSIZE) { 67 memset(ikey + key_len, 0, HMAC_SHA1_BLOCKSIZE - key_len); 34 sss_hmac_sha1(const unsigned char *key, size_t key_len, const unsigned char *in, size_t in_len, unsigned char *out) argument
|
H A D | nss_sha512crypt.c | 82 size_t key_len; local 117 key_len = strlen(key); 120 tmp = (char *)alloca(key_len + ALIGN64); 121 key = copied_key = memcpy(tmp + ALIGN64 - PTR_2_INT(tmp) % ALIGN64, key, key_len); 151 HASH_Update(ctx, (const unsigned char *)key, key_len); 164 HASH_Update(alt_ctx, (const unsigned char *)key, key_len); 170 HASH_Update(alt_ctx, (const unsigned char *)key, key_len); 176 for (cnt = key_len; cnt > 64; cnt -= 64) { 183 for (cnt = key_len; cnt > 0; cnt >>= 1) { 187 HASH_Update(ctx, (const unsigned char *)key, key_len); [all...] |
/sssd/src/util/crypto/libcrypto/ |
H A D | crypto_hmac_sha1.c | 32 size_t key_len, 49 if (key_len > HMAC_SHA1_BLOCKSIZE) { 56 EVP_DigestUpdate(ctx, (const unsigned char *)key, key_len); 61 memcpy(ikey, key, key_len); 62 memset(ikey + key_len, 0, HMAC_SHA1_BLOCKSIZE - key_len); 31 sss_hmac_sha1(const unsigned char *key, size_t key_len, const unsigned char *in, size_t in_len, unsigned char *out) argument
|
H A D | crypto_sha512crypt.c | 84 size_t key_len; local 119 key_len = strlen(key); 122 tmp = (char *)alloca(key_len + ALIGN64); 123 key = copied_key = memcpy(tmp + ALIGN64 - PTR_2_INT(tmp) % ALIGN64, key, key_len); 150 EVP_DigestUpdate(ctx, (const unsigned char *)key, key_len); 165 EVP_DigestUpdate(alt_ctx, (const unsigned char *)key, key_len); 171 EVP_DigestUpdate(alt_ctx, (const unsigned char *)key, key_len); 177 for (cnt = key_len; cnt > 64; cnt -= 64) { 184 for (cnt = key_len; cnt > 0; cnt >>= 1) { 188 EVP_DigestUpdate(ctx, (const unsigned char *)key, key_len); [all...] |
/sssd/src/tests/ |
H A D | crypto-tests.c | 169 size_t key_len = sizeof(key); /* need to be 32 */ local 181 ret = sss_encrypt(test_ctx, AES256CBC_HMAC_SHA256, key, key_len, 191 ret = sss_decrypt(test_ctx, AES256CBC_HMAC_SHA256, key, key_len,
|
/sssd/src/sss_client/autofs/ |
H A D | sss_autofs.c | 349 size_t key_len; local 378 ret = sss_strnlen(key, MAX_AUTOMNTKEYNAME_LEN, &key_len); 388 key_len + 1; /* keyname\0 */ 400 SAFEALIGN_SET_UINT32(data+ctr, key_len, &ctr); 402 safealign_memcpy(data+ctr, key, key_len + 1, &ctr);
|
/sssd/src/responder/ssh/ |
H A D | sshsrv_cmd.c | 816 size_t key_len; local 872 cert_verify_opts, &key, &key_len); 880 el_res->values[el_res->num_values].length = key_len; 909 size_t key_len; local 932 key_len = el->values[d].length; 935 &key_len); 944 3*sizeof(uint32_t) + key_len + fqname_len); 954 SAFEALIGN_SET_UINT32(body+(*c), key_len, c); 955 safealign_memcpy(body+(*c), key, key_len, c);
|
/sssd/src/tests/cmocka/ |
H A D | test_sdap.c | 284 size_t key_len; local 335 &key_len); 337 assert_memory_equal(decoded_key, "1234", key_len);
|
Completed in 98 milliseconds