Searched refs:salt_len (Results 1 – 5 of 5) sorted by relevance
/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | pkcs5.c | 27 size_t salt_len; member 179 params->salt_len = hdr.length; in pkcs5_get_params_pbes2() 180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 327 params->salt_len = hdr.length; in pkcs5_get_params() 329 params->salt, params->salt_len); in pkcs5_get_params() 373 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 401 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument 419 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen() 425 if (salt_len) { in pkcs12_key_gen() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | sae.c | 524 static int hkdf_extract(size_t hash_len, const u8 *salt, size_t salt_len, in hkdf_extract() argument 529 return hmac_sha256_vector(salt, salt_len, num_elem, addr, len, in hkdf_extract() 1471 size_t hash_len, salt_len, prime_len = sae->tmp->prime_len; in sae_derive_keys() local 1500 salt_len = 0; in sae_derive_keys() 1502 salt_len += wpabuf_len(own); in sae_derive_keys() 1504 salt_len += wpabuf_len(peer); in sae_derive_keys() 1505 rejected_groups = wpabuf_alloc(salt_len); in sae_derive_keys() 1520 salt_len = wpabuf_len(rejected_groups); in sae_derive_keys() 1524 salt_len = hash_len; in sae_derive_keys() 1527 salt, salt_len); in sae_derive_keys() [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/ |
D | eap.h | 35 size_t salt_len; member
|
D | eap_server.c | 1849 bin_clear_free(user->salt, user->salt_len); in eap_user_free()
|
/hal_espressif-latest/components/mbedtls/port/mbedtls_rom/ |
D | mbedtls_rom_osi.h | 371 …st mbedtls_x509_buf *params, mbedtls_md_type_t *md_alg, mbedtls_md_type_t *mgf_md, int *salt_len );
|