Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 20 of 20) sorted by relevance

/net-tools-3.4.0/mbedtls-2.4.0/library/
Dpkcs12.c56 mbedtls_asn1_buf *salt, int *iterations ) in pkcs12_parse_pbe_params() argument
73 if( ( ret = mbedtls_asn1_get_tag( p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 ) in pkcs12_parse_pbe_params()
76 salt->p = *p; in pkcs12_parse_pbe_params()
77 *p += salt->len; in pkcs12_parse_pbe_params()
97 mbedtls_asn1_buf salt; in pkcs12_pbe_derive_key_iv() local
104 memset( &salt, 0, sizeof(mbedtls_asn1_buf) ); in pkcs12_pbe_derive_key_iv()
107 if( ( ret = pkcs12_parse_pbe_params( pbe_params, &salt, in pkcs12_pbe_derive_key_iv()
115 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv()
125 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv()
250 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument
[all …]
Dpkcs5.c55 mbedtls_asn1_buf *salt, int *iterations, in pkcs5_parse_pbkdf2_params() argument
75 if( ( ret = mbedtls_asn1_get_tag( &p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 ) in pkcs5_parse_pbkdf2_params()
78 salt->p = p; in pkcs5_parse_pbkdf2_params()
79 p += salt->len; in pkcs5_parse_pbkdf2_params()
119 mbedtls_asn1_buf salt; in mbedtls_pkcs5_pbes2() local
151 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2()
194 if( ( ret = mbedtls_pkcs5_pbkdf2_hmac( &md_ctx, pwd, pwdlen, salt.p, salt.len, in mbedtls_pkcs5_pbes2()
218 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac() argument
244 if( ( ret = mbedtls_md_hmac_update( ctx, salt, slen ) ) != 0 ) in mbedtls_pkcs5_pbkdf2_hmac()
317 static const unsigned char salt[MAX_TESTS][40] = variable
[all …]
Drsa.c932 unsigned char salt[MBEDTLS_MD_MAX_SIZE]; in mbedtls_rsa_rsassa_pss_sign() local
970 if( ( ret = f_rng( p_rng, salt, slen ) ) != 0 ) in mbedtls_rsa_rsassa_pss_sign()
977 memcpy( p, salt, slen ); in mbedtls_rsa_rsassa_pss_sign()
991 mbedtls_md_update( &md_ctx, salt, slen ); in mbedtls_rsa_rsassa_pss_sign()
/net-tools-3.4.0/mbedtls-2.4.0/include/mbedtls/
Dpkcs5.h79 size_t plen, const unsigned char *salt, size_t slen,
Dpkcs12.h112 const unsigned char *salt, size_t saltlen,
/net-tools-3.4.0/mbedtls-2.4.0/tests/suites/
Dtest_suite_pkcs1_v15.function115 char *message_hex_string, char *salt,
128 info.length = unhexify( rnd_buf, salt );
178 char *message_hex_string, char *salt,
186 ((void) salt);
Dtest_suite_pkcs1_v21.function115 char *message_hex_string, char *salt,
128 info.length = unhexify( rnd_buf, salt );
178 char *message_hex_string, char *salt,
186 ((void) salt);
Dtest_suite_pkcs5.data49 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string)
53 PBES2 Decrypt (bad PBKDF2 params salt: overlong)
/net-tools-3.4.0/tinydtls-0.8.2/sha2/testvectors/testvectors/
Dvector014.info4 a very large grain of salt. The input sample 4 KB of misc.
Dvector008.info4 a very large grain of salt. The input sample exactly the same
Dvector010.info4 a very large grain of salt. The input sample is exactly 5 times
Dvector012.info4 a very large grain of salt. The input sample is exactly 5 times
Dvector006.info4 a very large grain of salt. The input sample exactly the same
Dvector007.info4 a very large grain of salt. The input sample one byte shorter
Dvector011.info4 a very large grain of salt. The input sample is one byte less
Dvector013.info4 a very large grain of salt. The input sample is one byte short
Dvector009.info4 a very large grain of salt. The input sample is one byte shorter
Dvector004.info4 a very large grain of salt. The input sample comes from...well
Dvector005.info4 a very large grain of salt. The input sample is EMPTY (no bits).
/net-tools-3.4.0/mbedtls-2.4.0/
DChangeLog1630 * Fixed incorrect behaviour in case of RSASSA-PSS with a salt length
1708 length salt lengths