/hostap-3.6.0/src/tls/ |
D | pkcs5.c | 27 size_t salt_len; member 179 params->salt_len = hdr.length; in pkcs5_get_params_pbes2() 180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 327 params->salt_len = hdr.length; in pkcs5_get_params() 329 params->salt, params->salt_len); in pkcs5_get_params() 373 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 401 size_t salt_len, u8 id, unsigned int iter, in pkcs12_key_gen() argument 419 S_len = v * ((salt_len + v - 1) / v); in pkcs12_key_gen() 425 if (salt_len) { in pkcs12_key_gen() [all …]
|
/hostap-3.6.0/src/eap_peer/ |
D | eap_pwd.c | 368 u8 salt_len, salthashpwd[64]; /* 64 = SHA512_DIGEST_LENGTH */ in eap_pwd_perform_commit_exchange() local 431 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 432 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 444 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() 448 salt_pwd_len[1] = salt_len; in eap_pwd_perform_commit_exchange() 454 (int) salt_len); in eap_pwd_perform_commit_exchange() 455 ptr += salt_len; in eap_pwd_perform_commit_exchange() 468 salt_len = *ptr++; in eap_pwd_perform_commit_exchange() 469 exp_len = 1 + salt_len + 2 * prime_len + order_len; in eap_pwd_perform_commit_exchange() 481 wpa_hexdump(MSG_DEBUG, "EAP-pwd: Salt", ptr, salt_len); in eap_pwd_perform_commit_exchange() [all …]
|
/hostap-3.6.0/src/eap_server/ |
D | eap_server_pwd.c | 31 size_t salt_len; member 121 data->salt_len = sm->user->salt_len; in eap_pwd_init() 122 if (data->salt_len) { in eap_pwd_init() 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init() 156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset() 194 if (data->salt_len) in eap_pwd_build_id_req() 196 data->salt, data->salt_len); in eap_pwd_build_id_req() 202 if (data->salt_len) { in eap_pwd_build_id_req() 283 (data->salt ? 1 + data->salt_len : 0)); in eap_pwd_build_commit_req() 288 if (data->salt_len) { in eap_pwd_build_commit_req() [all …]
|
D | eap.h | 35 size_t salt_len; member
|
D | eap_server.c | 1838 bin_clear_free(user->salt, user->salt_len); in eap_user_free()
|
/hostap-3.6.0/src/ap/ |
D | authsrv.c | 80 if (eap_user->salt && eap_user->salt_len) { in hostapd_radius_get_eap_user() 82 eap_user->salt_len); in hostapd_radius_get_eap_user() 85 user->salt_len = eap_user->salt_len; in hostapd_radius_get_eap_user()
|
D | ieee802_1x.c | 2292 if (eap_user->salt && eap_user->salt_len) { in ieee802_1x_get_eap_user() 2294 eap_user->salt_len); in ieee802_1x_get_eap_user() 2297 user->salt_len = eap_user->salt_len; in ieee802_1x_get_eap_user()
|
D | ap_config.h | 180 size_t salt_len; /* non-zero when password is salted */ member
|
D | ap_config.c | 647 bin_clear_free(user->salt, user->salt_len); in hostapd_config_free_eap_user()
|
/hostap-3.6.0/src/common/ |
D | sae.c | 533 static int hkdf_extract(size_t hash_len, const u8 *salt, size_t salt_len, in hkdf_extract() argument 538 return hmac_sha256_vector(salt, salt_len, num_elem, addr, len, in hkdf_extract() 542 return hmac_sha384_vector(salt, salt_len, num_elem, addr, len, in hkdf_extract() 547 return hmac_sha512_vector(salt, salt_len, num_elem, addr, len, in hkdf_extract() 1526 size_t hash_len, salt_len, prime_len = sae->tmp->prime_len; in sae_derive_keys() local 1554 salt_len = 0; in sae_derive_keys() 1556 salt_len += wpabuf_len(own); in sae_derive_keys() 1558 salt_len += wpabuf_len(peer); in sae_derive_keys() 1559 rejected_groups = wpabuf_alloc(salt_len); in sae_derive_keys() 1574 salt_len = wpabuf_len(rejected_groups); in sae_derive_keys() [all …]
|
D | dpp_i.h | 93 const u8 *salt, size_t salt_len, unsigned int iterations,
|
D | dpp_crypto.c | 166 const u8 *salt, size_t salt_len, in dpp_pbkdf2_f() argument 177 len[0] = salt_len; in dpp_pbkdf2_f() 207 const u8 *salt, size_t salt_len, unsigned int iterations, in dpp_pbkdf2() argument 218 salt, salt_len, iterations, count, digest)) in dpp_pbkdf2()
|
/hostap-3.6.0/hostapd/ |
D | config_file.c | 276 user->salt_len = (pos2 - *pos) / 2; in hostapd_config_eap_user_salted() 277 user->salt = os_malloc(user->salt_len); in hostapd_config_eap_user_salted() 285 if (hexstr2bin(*pos, user->salt, user->salt_len) < 0) { in hostapd_config_eap_user_salted()
|