/sssd/src/util/crypto/nss/ |
H A D | nss_crypto.h | 49 uint16_t keylen; member in struct:crypto_mech_data 61 uint8_t *key, int keylen,
|
H A D | nss_util.c | 100 NULL, mech_props->keylen, NULL); 150 uint8_t *key, int keylen, 171 if (keylen > 0) { 180 MAKE_SECITEM(key, keylen, cctx->key); 148 nss_ctx_init(TALLOC_CTX *mem_ctx, struct crypto_mech_data *mech_props, uint8_t *key, int keylen, uint8_t *iv, int ivlen, struct sss_nss_crypto_ctx **_cctx) argument
|
H A D | nss_nite.c | 40 uint8_t *key, size_t keylen, 72 hmaclen = keylen; 96 ret = nss_ctx_init(tmp_ctx, enc, key, keylen, out, ivlen, &cctx); 133 ret = nss_ctx_init(tmp_ctx, hmac, key, keylen, NULL, 0, &hctx); 175 uint8_t *key, size_t keylen, 204 hmaclen = keylen; 222 ret = nss_ctx_init(tmp_ctx, hmac, key, keylen, NULL, 0, &hctx); 269 ret = nss_ctx_init(tmp_ctx, enc, key, keylen, ivbuf, ivlen, &cctx); 39 sss_encrypt(TALLOC_CTX *mem_ctx, enum encmethod enctype, uint8_t *key, size_t keylen, const uint8_t *plaintext, size_t plainlen, uint8_t **ciphertext, size_t *cipherlen) argument 174 sss_decrypt(TALLOC_CTX *mem_ctx, enum encmethod enctype, uint8_t *key, size_t keylen, const uint8_t *ciphertext, size_t cipherlen, uint8_t **plaintext, size_t *plainlen) argument
|
/sssd/src/util/crypto/libcrypto/ |
H A D | crypto_nite.c | 46 uint8_t *key, size_t keylen, 70 if (!key || keylen != evpkeylen) return EINVAL; 72 hmackey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL, key, keylen); 78 hmaclen = keylen; 168 uint8_t *key, size_t keylen, 193 if (!key || keylen != evpkeylen) return EINVAL; 195 hmackey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL, key, keylen); 201 hmaclen = keylen; 45 sss_encrypt(TALLOC_CTX *mem_ctx, enum encmethod enctype, uint8_t *key, size_t keylen, const uint8_t *plaintext, size_t plainlen, uint8_t **ciphertext, size_t *cipherlen) argument 167 sss_decrypt(TALLOC_CTX *mem_ctx, enum encmethod enctype, uint8_t *key, size_t keylen, const uint8_t *ciphertext, size_t cipherlen, uint8_t **plaintext, size_t *plainlen) argument
|
H A D | crypto_obfuscate.c | 49 uint16_t keylen; member in struct:crypto_mech_data 105 keybuf = talloc_array(tmp_ctx, unsigned char, mech_props->keylen); 117 RAND_bytes(keybuf, mech_props->keylen); 163 mech_props->keylen + mech_props->bsize + 175 safealign_memcpy(&obfbuf[p], keybuf, mech_props->keylen, &p); 251 obfbuf + p + mech_props->keylen + mech_props->bsize + ctsize, 260 keybuf = talloc_array(tmp_ctx, unsigned char, mech_props->keylen); 265 safealign_memcpy(keybuf, obfbuf+p, mech_props->keylen, &p);
|
/sssd/src/sss_client/autofs/ |
H A D | sss_autofs.c | 142 uint32_t keylen; local 180 SAFEALIGN_COPY_UINT32(&keylen, sss_getautomntent_data.data+dp, &dp); 181 if (keylen + dp > sss_getautomntent_data.len) { 186 key = malloc(keylen); 192 safealign_memcpy(key, sss_getautomntent_data.data+dp, keylen, &dp);
|
/sssd/src/responder/autofs/ |
H A D | autofssrv_cmd.c | 1149 size_t keylen; local 1163 keylen = 1 + strlen(key); 1165 len = sizeof(uint32_t) + sizeof(uint32_t) + keylen + sizeof(uint32_t) + valuelen; 1176 SAFEALIGN_SET_UINT32(&body[*rp], keylen, rp); 1178 if (keylen == 1) { 1181 memcpy(&body[*rp], key, keylen); 1183 *rp += keylen; 1214 uint32_t keylen; local 1262 SAFEALIGN_COPY_UINT32_CHECK(&keylen, body+c, blen, &c); 1264 if (keylen [all...] |