Home
last modified time | relevance | path

Searched refs:salt_len (Results 1 – 5 of 5) sorted by relevance

/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dpkcs5.c27 size_t salt_len; member
179 params->salt_len = hdr.length; in pkcs5_get_params_pbes2()
180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2()
327 params->salt_len = hdr.length; in pkcs5_get_params()
329 params->salt, params->salt_len); in pkcs5_get_params()
373 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2()
376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2()
401 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument
419 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen()
425 if (salt_len) { in pkcs12_key_gen()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/common/
Dsae.c524 static int hkdf_extract(size_t hash_len, const u8 *salt, size_t salt_len, in hkdf_extract() argument
529 return hmac_sha256_vector(salt, salt_len, num_elem, addr, len, in hkdf_extract()
1471 size_t hash_len, salt_len, prime_len = sae->tmp->prime_len; in sae_derive_keys() local
1500 salt_len = 0; in sae_derive_keys()
1502 salt_len += wpabuf_len(own); in sae_derive_keys()
1504 salt_len += wpabuf_len(peer); in sae_derive_keys()
1505 rejected_groups = wpabuf_alloc(salt_len); in sae_derive_keys()
1520 salt_len = wpabuf_len(rejected_groups); in sae_derive_keys()
1524 salt_len = hash_len; in sae_derive_keys()
1527 salt, salt_len); in sae_derive_keys()
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/eap_server/
Deap.h35 size_t salt_len; member
Deap_server.c1849 bin_clear_free(user->salt, user->salt_len); in eap_user_free()
/hal_espressif-latest/components/mbedtls/port/mbedtls_rom/
Dmbedtls_rom_osi.h371 …st mbedtls_x509_buf *params, mbedtls_md_type_t *md_alg, mbedtls_md_type_t *mgf_md, int *salt_len );