Home
last modified time | relevance | path

Searched refs:pw_len (Results 1 – 2 of 2) sorted by relevance

/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dpkcs5.c400 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument
420 P_len = v * ((pw_len + v - 1) / v); in pkcs12_key_gen()
429 if (pw_len) { in pkcs12_key_gen()
431 *pos++ = pw[i % pw_len]; in pkcs12_key_gen()
493 size_t pw_len; in pkcs12_crypto_init_sha1() local
500 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1()
501 pw = os_malloc(2 * (pw_len + 1)); in pkcs12_crypto_init_sha1()
504 if (pw_len) { in pkcs12_crypto_init_sha1()
505 for (i = 0; i <= pw_len; i++) in pkcs12_crypto_init_sha1()
507 pw_len = 2 * (pw_len + 1); in pkcs12_crypto_init_sha1()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/common/
Dsae_pk.c154 size_t i, pw_len = os_strlen(pw); in sae_pk_valid_password() local
165 if (pw_len < 14 || pw_len % 5 != 4) { in sae_pk_valid_password()
187 if (pw[pw_len - 1] != d_check_char(pw, pw_len - 1)) { in sae_pk_valid_password()
195 for (i = 5; i < pw_len; i += 5) { in sae_pk_valid_password()
384 size_t len, pw_len; in sae_pk_set_password() local
402 pw = sae_pk_base32_decode(password, len, &pw_len); in sae_pk_set_password()
417 wpa_hexdump_key(MSG_DEBUG, "SAE-PK: PasswordBase", pw, pw_len); in sae_pk_set_password()
420 sae_pk_buf_shift_left_1(pw, pw_len); /* Sec_1b */ in sae_pk_set_password()
422 sae_pk_buf_shift_left_19(pw, pw_len); in sae_pk_set_password()
442 bin_clear_free(pw, pw_len); in sae_pk_set_password()