Searched refs:pw_len (Results 1 – 2 of 2) sorted by relevance
/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | pkcs5.c | 400 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument 420 P_len = v * ((pw_len + v - 1) / v); in pkcs12_key_gen() 429 if (pw_len) { in pkcs12_key_gen() 431 *pos++ = pw[i % pw_len]; in pkcs12_key_gen() 493 size_t pw_len; in pkcs12_crypto_init_sha1() local 500 pw_len = passwd ? os_strlen(passwd) : 0; in pkcs12_crypto_init_sha1() 501 pw = os_malloc(2 * (pw_len + 1)); in pkcs12_crypto_init_sha1() 504 if (pw_len) { in pkcs12_crypto_init_sha1() 505 for (i = 0; i <= pw_len; i++) in pkcs12_crypto_init_sha1() 507 pw_len = 2 * (pw_len + 1); in pkcs12_crypto_init_sha1() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | sae_pk.c | 154 size_t i, pw_len = os_strlen(pw); in sae_pk_valid_password() local 165 if (pw_len < 14 || pw_len % 5 != 4) { in sae_pk_valid_password() 187 if (pw[pw_len - 1] != d_check_char(pw, pw_len - 1)) { in sae_pk_valid_password() 195 for (i = 5; i < pw_len; i += 5) { in sae_pk_valid_password() 384 size_t len, pw_len; in sae_pk_set_password() local 402 pw = sae_pk_base32_decode(password, len, &pw_len); in sae_pk_set_password() 417 wpa_hexdump_key(MSG_DEBUG, "SAE-PK: PasswordBase", pw, pw_len); in sae_pk_set_password() 420 sae_pk_buf_shift_left_1(pw, pw_len); /* Sec_1b */ in sae_pk_set_password() 422 sae_pk_buf_shift_left_19(pw, pw_len); in sae_pk_set_password() 442 bin_clear_free(pw, pw_len); in sae_pk_set_password()
|