Lines Matching defs:salt
26 u8 salt[64];
152 * salt CHOICE {
175 /* For now, only support the salt CHOICE specified (OCTET STRING) */
179 hdr.length > sizeof(params->salt)) {
181 "PKCS #5: Expected OCTET STRING (salt.specified) - found class %d tag 0x%x size %d",
186 os_memcpy(params->salt, hdr.payload, hdr.length);
188 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt", params->salt, params->salt_len);
314 * salt OCTET STRING SIZE(8),
320 * salt OCTET STRING,
336 /* salt OCTET STRING SIZE(8) (PKCS #5) or OCTET STRING (PKCS #12) */
340 hdr.length > sizeof(params->salt)) {
342 "(salt) - found class %d tag 0x%x size %d",
347 os_memcpy(params->salt, hdr.payload, hdr.length);
349 wpa_hexdump(MSG_DEBUG, "PKCS #5: salt",
350 params->salt, params->salt_len);
394 wpa_hexdump(MSG_DEBUG, "PKCS #5: PBES2 salt for PBKDF2",
395 params->salt, params->salt_len);
398 if (pbkdf2_sha1(passwd, params->salt, params->salt_len,
422 static int pkcs12_key_gen(const u8 *pw, size_t pw_len, const u8 *salt,
440 /* S = copies of salt; P = copies of password, I = S || P */
449 *pos++ = salt[i % salt_len];
532 if (pkcs12_key_gen(pw, pw_len, params->salt, params->salt_len,
535 pkcs12_key_gen(pw, pw_len, params->salt, params->salt_len,
570 addr[1] = params->salt;