Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 11 of 11) sorted by relevance

/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/
Dcrypto.h36 static inline bool bt_mesh_s1(const char *m, uint8_t salt[16]) in bt_mesh_s1()
40 return bt_mesh_aes_cmac_one(zero, m, strlen(m), salt); in bt_mesh_s1()
43 int bt_mesh_k1(const uint8_t *ikm, size_t ikm_len, const uint8_t salt[16],
48 const uint8_t salt[16] = salt_str; \
49 bt_mesh_k1(ikm, ikm_len, salt, info, okm); \
156 int bt_mesh_prov_conf_salt(const uint8_t conf_inputs[145], uint8_t salt[16]);
Dcrypto.c49 int bt_mesh_k1(const uint8_t *ikm, size_t ikm_len, const uint8_t salt[16], in bt_mesh_k1()
54 err = bt_mesh_aes_cmac_one(salt, ikm, ikm_len, okm); in bt_mesh_k1()
66 uint8_t salt[16] = {0}; in bt_mesh_k2() local
75 err = bt_mesh_s1("smk2", salt); in bt_mesh_k2()
80 err = bt_mesh_aes_cmac_one(salt, n, 16, t); in bt_mesh_k2()
184 uint8_t salt[16] = {0}; in bt_mesh_id128() local
187 err = bt_mesh_s1(s, salt); in bt_mesh_id128()
192 return bt_mesh_k1(n, 16, salt, id128, out); in bt_mesh_id128()
794 uint8_t salt[16] = {0}; in bt_mesh_virtual_addr() local
798 err = bt_mesh_s1("vtad", salt); in bt_mesh_virtual_addr()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dpkcs5.c26 u8 salt[64]; member
172 hdr.length > sizeof(params->salt)) { in pkcs5_get_params_pbes2()
178 os_memcpy(params->salt, hdr.payload, hdr.length); in pkcs5_get_params_pbes2()
180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2()
320 !asn1_is_octetstring(&hdr) || hdr.length > sizeof(params->salt)) { in pkcs5_get_params()
326 os_memcpy(params->salt, hdr.payload, hdr.length); in pkcs5_get_params()
329 params->salt, params->salt_len); in pkcs5_get_params()
373 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2()
376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2()
400 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument
[all …]
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/
Dfastpbkdf2.c170 const uint8_t *salt, size_t nsalt, \
185 HMAC_UPDATE(_name)(&ctx, salt, nsalt); \
211 const uint8_t *salt, size_t nsalt, \
228 PBKDF2_F(_name)(&ctx, counter, salt, nsalt, iterations, block); \
383 const uint8_t *salt, size_t nsalt, in fastpbkdf2_hmac_sha1() argument
387 PBKDF2(sha1)(pw, npw, salt, nsalt, iterations, out, nout); in fastpbkdf2_hmac_sha1()
Dfastpbkdf2.h41 const uint8_t *salt, size_t nsalt,
/hal_espressif-latest/components/wpa_supplicant/src/common/
Dsae.c524 static int hkdf_extract(size_t hash_len, const u8 *salt, size_t salt_len, in hkdf_extract() argument
529 return hmac_sha256_vector(salt, salt_len, num_elem, addr, len, in hkdf_extract()
1099 u8 salt[64], hash[64]; in sae_derive_pwe_from_pt_ecc() local
1119 os_memset(salt, 0, hash_len); in sae_derive_pwe_from_pt_ecc()
1120 if (hkdf_extract(hash_len, salt, hash_len, 2, addr, len, hash) < 0) in sae_derive_pwe_from_pt_ecc()
1163 u8 salt[64], hash[64]; in sae_derive_pwe_from_pt_ffc() local
1181 os_memset(salt, 0, hash_len); in sae_derive_pwe_from_pt_ffc()
1182 if (hkdf_extract(hash_len, salt, hash_len, 2, addr, len, hash) < 0) in sae_derive_pwe_from_pt_ffc()
1465 const u8 *salt; in sae_derive_keys() local
1519 salt = wpabuf_head(rejected_groups); in sae_derive_keys()
[all …]
Ddpp.c835 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local
842 os_memset(salt, 0, hash_len); in dpp_derive_k1()
843 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1()
863 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local
870 os_memset(salt, 0, hash_len); in dpp_derive_k2()
871 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2()
5721 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_pmk() local
5728 os_memset(salt, 0, hash_len); in dpp_derive_pmk()
5729 if (dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk) < 0) in dpp_derive_pmk()
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/
Deap.h34 u8 *salt; member
Deap_server.c1849 bin_clear_free(user->salt, user->salt_len); in eap_user_free()
1850 user->salt = NULL; in eap_user_free()
/hal_espressif-latest/components/bt/host/bluedroid/stack/smp/
Dsmp_keys.c1732 BT_OCTET16 salt = { in smp_calculate_f5_key() local
1742 p_prnt = salt; in smp_calculate_f5_key()
1752 ARRAY_TO_STREAM(p, salt, BT_OCTET16_LEN); in smp_calculate_f5_key()
/hal_espressif-latest/components/mbedtls/port/mbedtls_rom/
Dmbedtls_rom_osi.h247 …_t datalen, const unsigned char *pwd, size_t pwdlen, const unsigned char *salt, size_t saltlen, mb…
249 …_t *ctx, const unsigned char *password, size_t plen, const unsigned char *salt, size_t slen, unsig…