diff options
author | Simo Sorce <simo@redhat.com> | 2014-07-07 11:42:57 -0400 |
---|---|---|
committer | Simo Sorce <simo@redhat.com> | 2014-07-10 06:52:55 -0400 |
commit | 6e86569afd4812f5674810ab66ee67fd5251d538 (patch) | |
tree | 323f97ff9402d5cef5f33503e3136d95982d591c /src/crypto.h | |
parent | 63dbb99337d0423253cb1ead0dcc3da54af5d13e (diff) | |
download | mod_auth_gssapi-6e86569afd4812f5674810ab66ee67fd5251d538.tar.gz mod_auth_gssapi-6e86569afd4812f5674810ab66ee67fd5251d538.tar.xz mod_auth_gssapi-6e86569afd4812f5674810ab66ee67fd5251d538.zip |
Add permanent session keys support
Keys (encryption+MAC) can now be stored in apache configuration.
The key must be a base64 encoded blob of original length of 32 bytes
(16 bytes for encryption and 16 for the MAC key)
The format is:
key:<base64 blob>
Diffstat (limited to 'src/crypto.h')
-rw-r--r-- | src/crypto.h | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/src/crypto.h b/src/crypto.h index a8b5ca0..cfc83fa 100644 --- a/src/crypto.h +++ b/src/crypto.h @@ -10,7 +10,8 @@ struct databuf { int length; }; -apr_status_t SEAL_KEY_CREATE(struct seal_key **skey); +apr_status_t SEAL_KEY_CREATE(apr_pool_t *p, struct seal_key **skey, + struct databuf *keys); apr_status_t SEAL_BUFFER(apr_pool_t *p, struct seal_key *skey, struct databuf *plain, struct databuf *cipher); apr_status_t UNSEAL_BUFFER(apr_pool_t *p, struct seal_key *skey, |