/mbedtls-latest/tests/src/drivers/ |
D | test_driver_asymmetric_encryption.c | 31 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_transparent_asymmetric_encrypt() argument 57 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_encrypt() 62 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_encrypt() 72 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_transparent_asymmetric_decrypt() argument 98 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_decrypt() 103 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_decrypt() 116 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_opaque_asymmetric_encrypt() argument 135 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_encrypt() 140 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_encrypt() 150 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_opaque_asymmetric_decrypt() argument [all …]
|
/mbedtls-latest/library/ |
D | pkcs12.c | 37 mbedtls_asn1_buf *salt, int *iterations) in pkcs12_parse_pbe_params() argument 55 if ((ret = mbedtls_asn1_get_tag(p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING)) != 0) { in pkcs12_parse_pbe_params() 59 salt->p = *p; in pkcs12_parse_pbe_params() 60 *p += salt->len; in pkcs12_parse_pbe_params() 82 mbedtls_asn1_buf salt; in pkcs12_pbe_derive_key_iv() local 90 memset(&salt, 0, sizeof(mbedtls_asn1_buf)); in pkcs12_pbe_derive_key_iv() 93 if ((ret = pkcs12_parse_pbe_params(pbe_params, &salt, in pkcs12_pbe_derive_key_iv() 103 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv() 113 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv() 328 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument [all …]
|
D | pkcs5.c | 41 mbedtls_asn1_buf *salt, int *iterations, in pkcs5_parse_pbkdf2_params() argument 62 if ((ret = mbedtls_asn1_get_tag(&p, end, &salt->len, in pkcs5_parse_pbkdf2_params() 67 salt->p = p; in pkcs5_parse_pbkdf2_params() 68 p += salt->len; in pkcs5_parse_pbkdf2_params() 138 mbedtls_asn1_buf salt; in mbedtls_pkcs5_pbes2_ext() local 172 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2_ext() 219 if ((ret = mbedtls_pkcs5_pbkdf2_hmac_ext(md_type, pwd, pwdlen, salt.p, in mbedtls_pkcs5_pbes2_ext() 220 salt.len, iterations, keylen, in mbedtls_pkcs5_pbes2_ext() 270 size_t plen, const unsigned char *salt, size_t slen, in pkcs5_pbkdf2_hmac() argument 298 if ((ret = mbedtls_md_hmac_update(ctx, salt, slen)) != 0) { in pkcs5_pbkdf2_hmac() [all …]
|
D | hkdf.c | 16 int mbedtls_hkdf(const mbedtls_md_info_t *md, const unsigned char *salt, in mbedtls_hkdf() argument 24 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf() 37 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument 43 if (salt == NULL) { in mbedtls_hkdf_extract() 56 salt = null_salt; in mbedtls_hkdf_extract() 60 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract()
|
D | psa_crypto_rsa.c | 521 const uint8_t *salt, in mbedtls_psa_asymmetric_encrypt() argument 532 (void) salt; in mbedtls_psa_asymmetric_encrypt() 581 salt, salt_length, in mbedtls_psa_asymmetric_encrypt() 615 const uint8_t *salt, in mbedtls_psa_asymmetric_decrypt() argument 626 (void) salt; in mbedtls_psa_asymmetric_decrypt() 679 salt, salt_length, in mbedtls_psa_asymmetric_decrypt()
|
D | psa_crypto_rsa.h | 257 const uint8_t *salt, 315 const uint8_t *salt,
|
D | psa_crypto_driver_wrappers.h | 2946 size_t input_length, const uint8_t *salt, size_t salt_length, in psa_driver_wrapper_asymmetric_encrypt() argument 2965 salt, salt_length, output, output_size, in psa_driver_wrapper_asymmetric_encrypt() 2978 salt, in psa_driver_wrapper_asymmetric_encrypt() 2988 salt, salt_length, output, output_size, output_length ) in psa_driver_wrapper_asymmetric_encrypt() 2996 salt, salt_length, output, output_size, output_length ) in psa_driver_wrapper_asymmetric_encrypt() 3009 (void)salt; in psa_driver_wrapper_asymmetric_encrypt() 3021 size_t input_length, const uint8_t *salt, size_t salt_length, in psa_driver_wrapper_asymmetric_decrypt() argument 3040 salt, salt_length, output, output_size, in psa_driver_wrapper_asymmetric_decrypt() 3053 salt, in psa_driver_wrapper_asymmetric_decrypt() 3063 salt, salt_length, output, output_size, in psa_driver_wrapper_asymmetric_decrypt() [all …]
|
D | psa_crypto.c | 3384 LOCAL_INPUT_DECLARE(salt_external, salt); 3389 (void) salt; 3411 LOCAL_INPUT_ALLOC(salt_external, salt_length, salt); 3416 alg, input, input_length, salt, salt_length, 3422 LOCAL_INPUT_FREE(salt_external, salt); 3443 LOCAL_INPUT_DECLARE(salt_external, salt); 3448 (void) salt; 3469 LOCAL_INPUT_ALLOC(salt_external, salt_length, salt); 3474 alg, input, input_length, salt, salt_length, 3481 LOCAL_INPUT_FREE(salt_external, salt); [all …]
|
D | rsa.c | 1695 const unsigned char *salt, size_t slen, in hash_mprime() argument 1721 if ((ret = mbedtls_md_update(&md_ctx, salt, slen)) != 0) { in hash_mprime() 2123 unsigned char *salt = NULL; in rsa_rsassa_pss_sign_no_mode_check() local 2190 salt = p; in rsa_rsassa_pss_sign_no_mode_check() 2191 if ((ret = f_rng(p_rng, salt, slen)) != 0) { in rsa_rsassa_pss_sign_no_mode_check() 2198 ret = hash_mprime(hash, hashlen, salt, slen, p, hash_id); in rsa_rsassa_pss_sign_no_mode_check()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_hkdf.function | 12 void test_hkdf(int md_alg, data_t *ikm, data_t *salt, data_t *info, 25 ret = mbedtls_hkdf(md, salt->x, salt->len, ikm->x, ikm->len, 40 data_t *salt, 55 ret = mbedtls_hkdf_extract(md, salt->x, salt->len, 103 unsigned char *salt = NULL; 117 output_ret = mbedtls_hkdf_extract(&fake_md_info, salt, salt_len,
|
D | test_suite_pkcs12.data | 21 PKCS#12 derive key: MD5: Zero length salt 25 PKCS#12 derive key: MD5: NULL salt 29 PKCS#12 derive key: MD5: Invalid length NULL salt 33 PKCS#12 derive key: MD5: Valid password and salt
|
D | test_suite_pkcs12.function | 29 unsigned char *salt = NULL; 42 salt = salt_arg->x; 53 salt,
|
D | test_suite_pkcs1_v21.data | 513 RSASSA-PSS Signature RSA-1016, SHA-512: minimum salt size not met 517 RSASSA-PSS Signature RSA-520, SHA-512: no possible salt size 521 RSASSA-PSS Signature RSA-528, SHA-512: zero salt size 1057 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature 1061 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature 1065 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature 1073 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature 1085 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature 1089 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature 1093 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature [all …]
|
D | test_suite_pkcs1_v21.function | 196 char *salt, data_t *result_str, int result) 200 ((void) salt);
|
D | test_suite_psa_crypto.data | 1076 PSA key policy: asymmetric signature, wrong alg family (PSS std/any salt) 1080 PSA key policy: asymmetric signature, wrong alg family (PSS any/std salt) 1128 PSA key policy: msg asymmetric signature, wrong alg family (PSS std/any salt) 1132 PSA key policy: msg asymmetric signature, wrong alg family (PSS any/std salt) 4246 PSA signature size: RSA keypair, 1024 bits, PSS-any-salt 4266 PSA import/exercise RSA keypair, PSS-any-salt-SHA-256 4278 PSA import/exercise RSA public key, PSS-any-salt-SHA-256 4310 PSA concurrently import/exercise same key: RSA keypair, PSS-any-salt-SHA-256 4322 PSA concurrently import/exercise same key: RSA public key, PSS-any-salt-SHA-256 4410 PSA sign hash: RSA PSS-any-salt SHA-256, wrong hash length (0 bytes) [all …]
|
D | test_suite_pkcs5.data | 193 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string) 197 PBES2 Decrypt (bad PBKDF2 params salt: overlong)
|
D | test_suite_psa_crypto_driver_wrappers.data | 124 verify_hash transparent driver: in driver Public Key RSA-1024 PSS-any-salt SHA-256 128 verify_hash transparent driver: fallback Public Key RSA-1024 PSS-any-salt SHA-256 132 verify_hash transparent driver: error Public Key RSA-1024 PSS-any-salt SHA-256 228 verify_message transparent driver: calculate in driver Public Key RSA PSS-any-salt SHA-256 232 verify_message transparent driver: fallback Public Key RSA PSS-any-salt SHA-256 236 verify_message transparent driver: error Public Key RSA PSS-any-salt SHA-256
|
/mbedtls-latest/tests/include/test/drivers/ |
D | asymmetric_encryption.h | 45 size_t input_length, const uint8_t *salt, size_t salt_length, 51 size_t input_length, const uint8_t *salt, size_t salt_length, 57 size_t input_length, const uint8_t *salt, size_t salt_length, 63 size_t input_length, const uint8_t *salt, size_t salt_length,
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | psa-limitations.md | 100 - a salt length 106 discrepancies in handling the salt length and which of the various hash 115 - salt length: always using the maximum legal value 119 - salt length: specified explicitly 123 - salt length: any valid length accepted 127 - expected salt length: specified explicitly, can specify "ANY" 133 - expected salt length: specified explicitly, can specify "ANY" 137 - salt length can be either "standard" (<= hashlen, see note) or "any" 139 - salt length: always <= hashlen (see note) and random salt 141 - salt length: either <= hashlen (see note), or any depending on algorithm [all …]
|
/mbedtls-latest/include/mbedtls/ |
D | hkdf.h | 56 int mbedtls_hkdf(const mbedtls_md_info_t *md, const unsigned char *salt, 86 const unsigned char *salt, size_t salt_len,
|
D | pkcs5.h | 151 size_t plen, const unsigned char *salt, size_t slen, 176 const unsigned char *salt,
|
D | pkcs12.h | 179 const unsigned char *salt, size_t saltlen,
|
/mbedtls-latest/include/psa/ |
D | crypto_builtin_key_derivation.h | 108 uint8_t *MBEDTLS_PRIVATE(salt);
|
D | crypto.h | 3107 const uint8_t *salt, 3168 const uint8_t *salt,
|
/mbedtls-latest/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.h.jinja | 2504 size_t input_length, const uint8_t *salt, size_t salt_length, 2520 salt, salt_length, output, output_size, 2529 salt, salt_length, output, output_size, output_length ) 2537 salt, salt_length, output, output_size, output_length ) 2550 (void)salt; 2562 size_t input_length, const uint8_t *salt, size_t salt_length, 2578 salt, salt_length, output, output_size, 2587 salt, salt_length, output, output_size, 2595 salt, salt_length, output, output_size, 2608 (void)salt;
|