| /hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/ |
| D | crypto.h | 36 static inline bool bt_mesh_s1(const char *m, uint8_t salt[16]) in bt_mesh_s1() 40 return bt_mesh_aes_cmac_one(zero, m, strlen(m), salt); in bt_mesh_s1() 43 int bt_mesh_k1(const uint8_t *ikm, size_t ikm_len, const uint8_t salt[16], 48 const uint8_t salt[16] = salt_str; \ 49 bt_mesh_k1(ikm, ikm_len, salt, info, okm); \ 156 int bt_mesh_prov_conf_salt(const uint8_t conf_inputs[145], uint8_t salt[16]);
|
| D | crypto.c | 49 int bt_mesh_k1(const uint8_t *ikm, size_t ikm_len, const uint8_t salt[16], in bt_mesh_k1() 54 err = bt_mesh_aes_cmac_one(salt, ikm, ikm_len, okm); in bt_mesh_k1() 66 uint8_t salt[16] = {0}; in bt_mesh_k2() local 75 err = bt_mesh_s1("smk2", salt); in bt_mesh_k2() 80 err = bt_mesh_aes_cmac_one(salt, n, 16, t); in bt_mesh_k2() 184 uint8_t salt[16] = {0}; in bt_mesh_id128() local 187 err = bt_mesh_s1(s, salt); in bt_mesh_id128() 192 return bt_mesh_k1(n, 16, salt, id128, out); in bt_mesh_id128() 794 uint8_t salt[16] = {0}; in bt_mesh_virtual_addr() local 798 err = bt_mesh_s1("vtad", salt); in bt_mesh_virtual_addr() [all …]
|
| /hal_espressif-latest/components/wpa_supplicant/src/tls/ |
| D | pkcs5.c | 26 u8 salt[64]; member 172 hdr.length > sizeof(params->salt)) { in pkcs5_get_params_pbes2() 178 os_memcpy(params->salt, hdr.payload, hdr.length); in pkcs5_get_params_pbes2() 180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 320 !asn1_is_octetstring(&hdr) || hdr.length > sizeof(params->salt)) { in pkcs5_get_params() 326 os_memcpy(params->salt, hdr.payload, hdr.length); in pkcs5_get_params() 329 params->salt, params->salt_len); in pkcs5_get_params() 373 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 400 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument [all …]
|
| /hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/ |
| D | fastpbkdf2.c | 170 const uint8_t *salt, size_t nsalt, \ 185 HMAC_UPDATE(_name)(&ctx, salt, nsalt); \ 211 const uint8_t *salt, size_t nsalt, \ 228 PBKDF2_F(_name)(&ctx, counter, salt, nsalt, iterations, block); \ 383 const uint8_t *salt, size_t nsalt, in fastpbkdf2_hmac_sha1() argument 387 PBKDF2(sha1)(pw, npw, salt, nsalt, iterations, out, nout); in fastpbkdf2_hmac_sha1()
|
| D | fastpbkdf2.h | 41 const uint8_t *salt, size_t nsalt,
|
| /hal_espressif-latest/components/wpa_supplicant/src/common/ |
| D | sae.c | 524 static int hkdf_extract(size_t hash_len, const u8 *salt, size_t salt_len, in hkdf_extract() argument 529 return hmac_sha256_vector(salt, salt_len, num_elem, addr, len, in hkdf_extract() 1099 u8 salt[64], hash[64]; in sae_derive_pwe_from_pt_ecc() local 1119 os_memset(salt, 0, hash_len); in sae_derive_pwe_from_pt_ecc() 1120 if (hkdf_extract(hash_len, salt, hash_len, 2, addr, len, hash) < 0) in sae_derive_pwe_from_pt_ecc() 1163 u8 salt[64], hash[64]; in sae_derive_pwe_from_pt_ffc() local 1181 os_memset(salt, 0, hash_len); in sae_derive_pwe_from_pt_ffc() 1182 if (hkdf_extract(hash_len, salt, hash_len, 2, addr, len, hash) < 0) in sae_derive_pwe_from_pt_ffc() 1465 const u8 *salt; in sae_derive_keys() local 1519 salt = wpabuf_head(rejected_groups); in sae_derive_keys() [all …]
|
| D | dpp.c | 835 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local 842 os_memset(salt, 0, hash_len); in dpp_derive_k1() 843 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1() 863 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local 870 os_memset(salt, 0, hash_len); in dpp_derive_k2() 871 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2() 5721 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_pmk() local 5728 os_memset(salt, 0, hash_len); in dpp_derive_pmk() 5729 if (dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk) < 0) in dpp_derive_pmk()
|
| /hal_espressif-latest/components/wpa_supplicant/src/eap_server/ |
| D | eap.h | 34 u8 *salt; member
|
| D | eap_server.c | 1849 bin_clear_free(user->salt, user->salt_len); in eap_user_free() 1850 user->salt = NULL; in eap_user_free()
|
| /hal_espressif-latest/components/bt/host/bluedroid/stack/smp/ |
| D | smp_keys.c | 1732 BT_OCTET16 salt = { in smp_calculate_f5_key() local 1742 p_prnt = salt; in smp_calculate_f5_key() 1752 ARRAY_TO_STREAM(p, salt, BT_OCTET16_LEN); in smp_calculate_f5_key()
|
| /hal_espressif-latest/components/mbedtls/port/mbedtls_rom/ |
| D | mbedtls_rom_osi.h | 247 …_t datalen, const unsigned char *pwd, size_t pwdlen, const unsigned char *salt, size_t saltlen, mb… 249 …_t *ctx, const unsigned char *password, size_t plen, const unsigned char *salt, size_t slen, unsig…
|