Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 25 of 29) sorted by relevance

12

/mbedtls-latest/tests/src/drivers/
Dtest_driver_asymmetric_encryption.c31 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_transparent_asymmetric_encrypt() argument
57 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_encrypt()
62 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_encrypt()
72 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_transparent_asymmetric_decrypt() argument
98 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_decrypt()
103 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_decrypt()
116 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_opaque_asymmetric_encrypt() argument
135 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_encrypt()
140 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_encrypt()
150 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_opaque_asymmetric_decrypt() argument
[all …]
/mbedtls-latest/library/
Dpkcs12.c37 mbedtls_asn1_buf *salt, int *iterations) in pkcs12_parse_pbe_params() argument
55 if ((ret = mbedtls_asn1_get_tag(p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING)) != 0) { in pkcs12_parse_pbe_params()
59 salt->p = *p; in pkcs12_parse_pbe_params()
60 *p += salt->len; in pkcs12_parse_pbe_params()
82 mbedtls_asn1_buf salt; in pkcs12_pbe_derive_key_iv() local
90 memset(&salt, 0, sizeof(mbedtls_asn1_buf)); in pkcs12_pbe_derive_key_iv()
93 if ((ret = pkcs12_parse_pbe_params(pbe_params, &salt, in pkcs12_pbe_derive_key_iv()
103 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv()
113 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv()
328 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument
[all …]
Dpkcs5.c41 mbedtls_asn1_buf *salt, int *iterations, in pkcs5_parse_pbkdf2_params() argument
62 if ((ret = mbedtls_asn1_get_tag(&p, end, &salt->len, in pkcs5_parse_pbkdf2_params()
67 salt->p = p; in pkcs5_parse_pbkdf2_params()
68 p += salt->len; in pkcs5_parse_pbkdf2_params()
138 mbedtls_asn1_buf salt; in mbedtls_pkcs5_pbes2_ext() local
172 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2_ext()
219 if ((ret = mbedtls_pkcs5_pbkdf2_hmac_ext(md_type, pwd, pwdlen, salt.p, in mbedtls_pkcs5_pbes2_ext()
220 salt.len, iterations, keylen, in mbedtls_pkcs5_pbes2_ext()
270 size_t plen, const unsigned char *salt, size_t slen, in pkcs5_pbkdf2_hmac() argument
298 if ((ret = mbedtls_md_hmac_update(ctx, salt, slen)) != 0) { in pkcs5_pbkdf2_hmac()
[all …]
Dhkdf.c16 int mbedtls_hkdf(const mbedtls_md_info_t *md, const unsigned char *salt, in mbedtls_hkdf() argument
24 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf()
37 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument
43 if (salt == NULL) { in mbedtls_hkdf_extract()
56 salt = null_salt; in mbedtls_hkdf_extract()
60 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract()
Dpsa_crypto_rsa.c521 const uint8_t *salt, in mbedtls_psa_asymmetric_encrypt() argument
532 (void) salt; in mbedtls_psa_asymmetric_encrypt()
581 salt, salt_length, in mbedtls_psa_asymmetric_encrypt()
615 const uint8_t *salt, in mbedtls_psa_asymmetric_decrypt() argument
626 (void) salt; in mbedtls_psa_asymmetric_decrypt()
679 salt, salt_length, in mbedtls_psa_asymmetric_decrypt()
Dpsa_crypto_rsa.h257 const uint8_t *salt,
315 const uint8_t *salt,
Dpsa_crypto_driver_wrappers.h2946 size_t input_length, const uint8_t *salt, size_t salt_length, in psa_driver_wrapper_asymmetric_encrypt() argument
2965 salt, salt_length, output, output_size, in psa_driver_wrapper_asymmetric_encrypt()
2978 salt, in psa_driver_wrapper_asymmetric_encrypt()
2988 salt, salt_length, output, output_size, output_length ) in psa_driver_wrapper_asymmetric_encrypt()
2996 salt, salt_length, output, output_size, output_length ) in psa_driver_wrapper_asymmetric_encrypt()
3009 (void)salt; in psa_driver_wrapper_asymmetric_encrypt()
3021 size_t input_length, const uint8_t *salt, size_t salt_length, in psa_driver_wrapper_asymmetric_decrypt() argument
3040 salt, salt_length, output, output_size, in psa_driver_wrapper_asymmetric_decrypt()
3053 salt, in psa_driver_wrapper_asymmetric_decrypt()
3063 salt, salt_length, output, output_size, in psa_driver_wrapper_asymmetric_decrypt()
[all …]
Dpsa_crypto.c3384 LOCAL_INPUT_DECLARE(salt_external, salt);
3389 (void) salt;
3411 LOCAL_INPUT_ALLOC(salt_external, salt_length, salt);
3416 alg, input, input_length, salt, salt_length,
3422 LOCAL_INPUT_FREE(salt_external, salt);
3443 LOCAL_INPUT_DECLARE(salt_external, salt);
3448 (void) salt;
3469 LOCAL_INPUT_ALLOC(salt_external, salt_length, salt);
3474 alg, input, input_length, salt, salt_length,
3481 LOCAL_INPUT_FREE(salt_external, salt);
[all …]
Drsa.c1695 const unsigned char *salt, size_t slen, in hash_mprime() argument
1721 if ((ret = mbedtls_md_update(&md_ctx, salt, slen)) != 0) { in hash_mprime()
2123 unsigned char *salt = NULL; in rsa_rsassa_pss_sign_no_mode_check() local
2190 salt = p; in rsa_rsassa_pss_sign_no_mode_check()
2191 if ((ret = f_rng(p_rng, salt, slen)) != 0) { in rsa_rsassa_pss_sign_no_mode_check()
2198 ret = hash_mprime(hash, hashlen, salt, slen, p, hash_id); in rsa_rsassa_pss_sign_no_mode_check()
/mbedtls-latest/tests/suites/
Dtest_suite_hkdf.function12 void test_hkdf(int md_alg, data_t *ikm, data_t *salt, data_t *info,
25 ret = mbedtls_hkdf(md, salt->x, salt->len, ikm->x, ikm->len,
40 data_t *salt,
55 ret = mbedtls_hkdf_extract(md, salt->x, salt->len,
103 unsigned char *salt = NULL;
117 output_ret = mbedtls_hkdf_extract(&fake_md_info, salt, salt_len,
Dtest_suite_pkcs12.data21 PKCS#12 derive key: MD5: Zero length salt
25 PKCS#12 derive key: MD5: NULL salt
29 PKCS#12 derive key: MD5: Invalid length NULL salt
33 PKCS#12 derive key: MD5: Valid password and salt
Dtest_suite_pkcs12.function29 unsigned char *salt = NULL;
42 salt = salt_arg->x;
53 salt,
Dtest_suite_pkcs1_v21.data513 RSASSA-PSS Signature RSA-1016, SHA-512: minimum salt size not met
517 RSASSA-PSS Signature RSA-520, SHA-512: no possible salt size
521 RSASSA-PSS Signature RSA-528, SHA-512: zero salt size
1057 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature
1061 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature
1065 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature
1073 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature
1085 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature
1089 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature
1093 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature
[all …]
Dtest_suite_pkcs1_v21.function196 char *salt, data_t *result_str, int result)
200 ((void) salt);
Dtest_suite_psa_crypto.data1076 PSA key policy: asymmetric signature, wrong alg family (PSS std/any salt)
1080 PSA key policy: asymmetric signature, wrong alg family (PSS any/std salt)
1128 PSA key policy: msg asymmetric signature, wrong alg family (PSS std/any salt)
1132 PSA key policy: msg asymmetric signature, wrong alg family (PSS any/std salt)
4246 PSA signature size: RSA keypair, 1024 bits, PSS-any-salt
4266 PSA import/exercise RSA keypair, PSS-any-salt-SHA-256
4278 PSA import/exercise RSA public key, PSS-any-salt-SHA-256
4310 PSA concurrently import/exercise same key: RSA keypair, PSS-any-salt-SHA-256
4322 PSA concurrently import/exercise same key: RSA public key, PSS-any-salt-SHA-256
4410 PSA sign hash: RSA PSS-any-salt SHA-256, wrong hash length (0 bytes)
[all …]
Dtest_suite_pkcs5.data193 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string)
197 PBES2 Decrypt (bad PBKDF2 params salt: overlong)
Dtest_suite_psa_crypto_driver_wrappers.data124 verify_hash transparent driver: in driver Public Key RSA-1024 PSS-any-salt SHA-256
128 verify_hash transparent driver: fallback Public Key RSA-1024 PSS-any-salt SHA-256
132 verify_hash transparent driver: error Public Key RSA-1024 PSS-any-salt SHA-256
228 verify_message transparent driver: calculate in driver Public Key RSA PSS-any-salt SHA-256
232 verify_message transparent driver: fallback Public Key RSA PSS-any-salt SHA-256
236 verify_message transparent driver: error Public Key RSA PSS-any-salt SHA-256
/mbedtls-latest/tests/include/test/drivers/
Dasymmetric_encryption.h45 size_t input_length, const uint8_t *salt, size_t salt_length,
51 size_t input_length, const uint8_t *salt, size_t salt_length,
57 size_t input_length, const uint8_t *salt, size_t salt_length,
63 size_t input_length, const uint8_t *salt, size_t salt_length,
/mbedtls-latest/docs/architecture/psa-migration/
Dpsa-limitations.md100 - a salt length
106 discrepancies in handling the salt length and which of the various hash
115 - salt length: always using the maximum legal value
119 - salt length: specified explicitly
123 - salt length: any valid length accepted
127 - expected salt length: specified explicitly, can specify "ANY"
133 - expected salt length: specified explicitly, can specify "ANY"
137 - salt length can be either "standard" (<= hashlen, see note) or "any"
139 - salt length: always <= hashlen (see note) and random salt
141 - salt length: either <= hashlen (see note), or any depending on algorithm
[all …]
/mbedtls-latest/include/mbedtls/
Dhkdf.h56 int mbedtls_hkdf(const mbedtls_md_info_t *md, const unsigned char *salt,
86 const unsigned char *salt, size_t salt_len,
Dpkcs5.h151 size_t plen, const unsigned char *salt, size_t slen,
176 const unsigned char *salt,
Dpkcs12.h179 const unsigned char *salt, size_t saltlen,
/mbedtls-latest/include/psa/
Dcrypto_builtin_key_derivation.h108 uint8_t *MBEDTLS_PRIVATE(salt);
Dcrypto.h3107 const uint8_t *salt,
3168 const uint8_t *salt,
/mbedtls-latest/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.h.jinja2504 size_t input_length, const uint8_t *salt, size_t salt_length,
2520 salt, salt_length, output, output_size,
2529 salt, salt_length, output, output_size, output_length )
2537 salt, salt_length, output, output_size, output_length )
2550 (void)salt;
2562 size_t input_length, const uint8_t *salt, size_t salt_length,
2578 salt, salt_length, output, output_size,
2587 salt, salt_length, output, output_size,
2595 salt, salt_length, output, output_size,
2608 (void)salt;

12