Searched defs:keylen (Results 1 - 7 of 7) sorted by relevance

/sssd/src/util/crypto/nss/
H A Dnss_crypto.h49 uint16_t keylen; member in struct:crypto_mech_data
61 uint8_t *key, int keylen,
H A Dnss_util.c100 NULL, mech_props->keylen, NULL);
150 uint8_t *key, int keylen,
171 if (keylen > 0) {
180 MAKE_SECITEM(key, keylen, cctx->key);
148 nss_ctx_init(TALLOC_CTX *mem_ctx, struct crypto_mech_data *mech_props, uint8_t *key, int keylen, uint8_t *iv, int ivlen, struct sss_nss_crypto_ctx **_cctx) argument
H A Dnss_nite.c40 uint8_t *key, size_t keylen,
72 hmaclen = keylen;
96 ret = nss_ctx_init(tmp_ctx, enc, key, keylen, out, ivlen, &cctx);
133 ret = nss_ctx_init(tmp_ctx, hmac, key, keylen, NULL, 0, &hctx);
175 uint8_t *key, size_t keylen,
204 hmaclen = keylen;
222 ret = nss_ctx_init(tmp_ctx, hmac, key, keylen, NULL, 0, &hctx);
269 ret = nss_ctx_init(tmp_ctx, enc, key, keylen, ivbuf, ivlen, &cctx);
39 sss_encrypt(TALLOC_CTX *mem_ctx, enum encmethod enctype, uint8_t *key, size_t keylen, const uint8_t *plaintext, size_t plainlen, uint8_t **ciphertext, size_t *cipherlen) argument
174 sss_decrypt(TALLOC_CTX *mem_ctx, enum encmethod enctype, uint8_t *key, size_t keylen, const uint8_t *ciphertext, size_t cipherlen, uint8_t **plaintext, size_t *plainlen) argument
/sssd/src/util/crypto/libcrypto/
H A Dcrypto_nite.c46 uint8_t *key, size_t keylen,
70 if (!key || keylen != evpkeylen) return EINVAL;
72 hmackey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL, key, keylen);
78 hmaclen = keylen;
168 uint8_t *key, size_t keylen,
193 if (!key || keylen != evpkeylen) return EINVAL;
195 hmackey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, NULL, key, keylen);
201 hmaclen = keylen;
45 sss_encrypt(TALLOC_CTX *mem_ctx, enum encmethod enctype, uint8_t *key, size_t keylen, const uint8_t *plaintext, size_t plainlen, uint8_t **ciphertext, size_t *cipherlen) argument
167 sss_decrypt(TALLOC_CTX *mem_ctx, enum encmethod enctype, uint8_t *key, size_t keylen, const uint8_t *ciphertext, size_t cipherlen, uint8_t **plaintext, size_t *plainlen) argument
H A Dcrypto_obfuscate.c49 uint16_t keylen; member in struct:crypto_mech_data
105 keybuf = talloc_array(tmp_ctx, unsigned char, mech_props->keylen);
117 RAND_bytes(keybuf, mech_props->keylen);
163 mech_props->keylen + mech_props->bsize +
175 safealign_memcpy(&obfbuf[p], keybuf, mech_props->keylen, &p);
251 obfbuf + p + mech_props->keylen + mech_props->bsize + ctsize,
260 keybuf = talloc_array(tmp_ctx, unsigned char, mech_props->keylen);
265 safealign_memcpy(keybuf, obfbuf+p, mech_props->keylen, &p);
/sssd/src/sss_client/autofs/
H A Dsss_autofs.c142 uint32_t keylen; local
180 SAFEALIGN_COPY_UINT32(&keylen, sss_getautomntent_data.data+dp, &dp);
181 if (keylen + dp > sss_getautomntent_data.len) {
186 key = malloc(keylen);
192 safealign_memcpy(key, sss_getautomntent_data.data+dp, keylen, &dp);
/sssd/src/responder/autofs/
H A Dautofssrv_cmd.c1149 size_t keylen; local
1163 keylen = 1 + strlen(key);
1165 len = sizeof(uint32_t) + sizeof(uint32_t) + keylen + sizeof(uint32_t) + valuelen;
1176 SAFEALIGN_SET_UINT32(&body[*rp], keylen, rp);
1178 if (keylen == 1) {
1181 memcpy(&body[*rp], key, keylen);
1183 *rp += keylen;
1214 uint32_t keylen; local
1262 SAFEALIGN_COPY_UINT32_CHECK(&keylen, body+c, blen, &c);
1264 if (keylen
[all...]

Completed in 1397 milliseconds