/hostap-latest/src/tls/ |
D | pkcs5.c | 26 u8 salt[64]; member 172 hdr.length > sizeof(params->salt)) { in pkcs5_get_params_pbes2() 178 os_memcpy(params->salt, hdr.payload, hdr.length); in pkcs5_get_params_pbes2() 180 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len); in pkcs5_get_params_pbes2() 320 !asn1_is_octetstring(&hdr) || hdr.length > sizeof(params->salt)) { in pkcs5_get_params() 326 os_memcpy(params->salt, hdr.payload, hdr.length); in pkcs5_get_params() 329 params->salt, params->salt_len); in pkcs5_get_params() 373 params->salt, params->salt_len); in pkcs5_crypto_init_pbes2() 376 if (pbkdf2_sha1(passwd, params->salt, params->salt_len, in pkcs5_crypto_init_pbes2() 400 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt, in pkcs12_key_gen() argument [all …]
|
/hostap-latest/src/common/ |
D | dpp_backup.c | 214 static struct wpabuf * dpp_build_pbkdf2_alg_id(const struct wpabuf *salt, in dpp_build_pbkdf2_alg_id() argument 245 params = wpabuf_alloc(100 + wpabuf_len(salt) + wpabuf_len(prf)); in dpp_build_pbkdf2_alg_id() 248 asn1_put_octet_string(params, salt); /* salt.specified */ in dpp_build_pbkdf2_alg_id() 268 *key_enc_alg = NULL, *salt; in dpp_build_pw_recipient_info() local 274 salt = wpabuf_alloc(64); in dpp_build_pw_recipient_info() 275 if (!salt || os_get_random(wpabuf_put(salt, 64), 64) < 0) in dpp_build_pw_recipient_info() 277 wpa_hexdump_buf(MSG_DEBUG, "DPP: PBKDF2 salt", salt); in dpp_build_pw_recipient_info() 287 if (dpp_pbkdf2(hash_len, key, key_len, wpabuf_head(salt), 64, 1000, in dpp_build_pw_recipient_info() 314 key_der_alg = dpp_build_pbkdf2_alg_id(salt, hash_len); in dpp_build_pw_recipient_info() 341 wpabuf_free(salt); in dpp_build_pw_recipient_info() [all …]
|
D | dpp_crypto.c | 166 const u8 *salt, size_t salt_len, in dpp_pbkdf2_f() argument 176 addr[0] = salt; in dpp_pbkdf2_f() 207 const u8 *salt, size_t salt_len, unsigned int iterations, in dpp_pbkdf2() argument 218 salt, salt_len, iterations, count, digest)) in dpp_pbkdf2() 391 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k1() local 398 os_memset(salt, 0, hash_len); in dpp_derive_k1() 399 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1() 418 u8 salt[DPP_MAX_HASH_LEN], prk[DPP_MAX_HASH_LEN]; in dpp_derive_k2() local 425 os_memset(salt, 0, hash_len); in dpp_derive_k2() 426 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2() [all …]
|
D | sae.c | 542 static int hkdf_extract(size_t hash_len, const u8 *salt, size_t salt_len, in hkdf_extract() argument 547 return hmac_sha256_vector(salt, salt_len, num_elem, addr, len, in hkdf_extract() 551 return hmac_sha384_vector(salt, salt_len, num_elem, addr, len, in hkdf_extract() 556 return hmac_sha512_vector(salt, salt_len, num_elem, addr, len, in hkdf_extract() 1153 u8 salt[64], hash[64]; in sae_derive_pwe_from_pt_ecc() local 1173 os_memset(salt, 0, hash_len); in sae_derive_pwe_from_pt_ecc() 1174 if (hkdf_extract(hash_len, salt, hash_len, 2, addr, len, hash) < 0) in sae_derive_pwe_from_pt_ecc() 1217 u8 salt[64], hash[64]; in sae_derive_pwe_from_pt_ffc() local 1235 os_memset(salt, 0, hash_len); in sae_derive_pwe_from_pt_ffc() 1236 if (hkdf_extract(hash_len, salt, hash_len, 2, addr, len, hash) < 0) in sae_derive_pwe_from_pt_ffc() [all …]
|
D | dpp_i.h | 101 const u8 *salt, size_t salt_len, unsigned int iterations,
|
/hostap-latest/src/radius/ |
D | radius.c | 1216 static void encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, in encrypt_ms_key() argument 1226 WPA_PUT_BE16(saltbuf, salt); in encrypt_ms_key() 1356 u16 salt; in radius_msg_add_mppe_keys() local 1371 if (os_get_random((u8 *) &salt, sizeof(salt)) < 0) { in radius_msg_add_mppe_keys() 1375 salt |= 0x8000; in radius_msg_add_mppe_keys() 1376 WPA_PUT_BE16(pos, salt); in radius_msg_add_mppe_keys() 1378 encrypt_ms_key(send_key, send_key_len, salt, req_authenticator, secret, in radius_msg_add_mppe_keys() 1400 salt ^= 1; in radius_msg_add_mppe_keys() 1401 WPA_PUT_BE16(pos, salt); in radius_msg_add_mppe_keys() 1403 encrypt_ms_key(recv_key, recv_key_len, salt, req_authenticator, secret, in radius_msg_add_mppe_keys() [all …]
|
/hostap-latest/src/eap_server/ |
D | eap_server_pwd.c | 30 u8 *salt; member 123 data->salt = os_memdup(sm->user->salt, sm->user->salt_len); in eap_pwd_init() 124 if (!data->salt) { in eap_pwd_init() 156 bin_clear_free(data->salt, data->salt_len); in eap_pwd_reset() 196 data->salt, data->salt_len); in eap_pwd_build_id_req() 283 (data->salt ? 1 + data->salt_len : 0)); in eap_pwd_build_commit_req() 290 wpabuf_put_data(data->outbuf, data->salt, data->salt_len); in eap_pwd_build_commit_req()
|
D | eap.h | 34 u8 *salt; member
|
D | eap_server.c | 1838 bin_clear_free(user->salt, user->salt_len); in eap_user_free() 1839 user->salt = NULL; in eap_user_free()
|
/hostap-latest/src/ap/ |
D | authsrv.c | 81 if (eap_user->salt && eap_user->salt_len) { in hostapd_radius_get_eap_user() 82 user->salt = os_memdup(eap_user->salt, in hostapd_radius_get_eap_user() 84 if (!user->salt) in hostapd_radius_get_eap_user()
|
D | ieee802_1x.c | 2391 if (eap_user->salt && eap_user->salt_len) { in ieee802_1x_get_eap_user() 2392 user->salt = os_memdup(eap_user->salt, in ieee802_1x_get_eap_user() 2394 if (!user->salt) in ieee802_1x_get_eap_user()
|
D | ap_config.h | 185 u8 *salt; member
|
D | ap_config.c | 676 bin_clear_free(user->salt, user->salt_len); in hostapd_config_free_eap_user()
|
/hostap-latest/port/mbedtls/ |
D | supp_psa_api.h | 57 const unsigned char *salt, size_t slen,
|
D | supp_psa_api.c | 415 const unsigned char *salt, size_t slen, in pbkdf2_sha1_psa() argument 447 status = psa_key_derivation_input_bytes(&operation, PSA_KEY_DERIVATION_INPUT_SALT, salt, in pbkdf2_sha1_psa()
|
/hostap-latest/src/crypto/ |
D | crypto_openssl.c | 4751 const u8 *salt, size_t salt_len, in hpke_labeled_extract() argument 4770 if (!salt || !salt_len) { in hpke_labeled_extract() 4773 salt = zero; in hpke_labeled_extract() 4796 if (EVP_MAC_init(hctx, salt, salt_len, params) != 1) in hpke_labeled_extract() 4817 res = HMAC_Init_ex(hctx, salt, salt_len, kem ? ctx->kem_h : ctx->kdf_h, in hpke_labeled_extract()
|
/hostap-latest/hostapd/ |
D | config_file.c | 231 user->salt = os_malloc(user->salt_len); in hostapd_config_eap_user_salted() 232 if (!user->salt) { in hostapd_config_eap_user_salted() 239 if (hexstr2bin(*pos, user->salt, user->salt_len) < 0) { in hostapd_config_eap_user_salted()
|