/net-tools-3.4.0/mbedtls-2.4.0/library/ |
D | pkcs12.c | 56 mbedtls_asn1_buf *salt, int *iterations ) in pkcs12_parse_pbe_params() argument 73 if( ( ret = mbedtls_asn1_get_tag( p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 ) in pkcs12_parse_pbe_params() 76 salt->p = *p; in pkcs12_parse_pbe_params() 77 *p += salt->len; in pkcs12_parse_pbe_params() 97 mbedtls_asn1_buf salt; in pkcs12_pbe_derive_key_iv() local 104 memset( &salt, 0, sizeof(mbedtls_asn1_buf) ); in pkcs12_pbe_derive_key_iv() 107 if( ( ret = pkcs12_parse_pbe_params( pbe_params, &salt, in pkcs12_pbe_derive_key_iv() 115 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv() 125 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv() 250 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument [all …]
|
D | pkcs5.c | 55 mbedtls_asn1_buf *salt, int *iterations, in pkcs5_parse_pbkdf2_params() argument 75 if( ( ret = mbedtls_asn1_get_tag( &p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 ) in pkcs5_parse_pbkdf2_params() 78 salt->p = p; in pkcs5_parse_pbkdf2_params() 79 p += salt->len; in pkcs5_parse_pbkdf2_params() 119 mbedtls_asn1_buf salt; in mbedtls_pkcs5_pbes2() local 151 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2() 194 if( ( ret = mbedtls_pkcs5_pbkdf2_hmac( &md_ctx, pwd, pwdlen, salt.p, salt.len, in mbedtls_pkcs5_pbes2() 218 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac() argument 244 if( ( ret = mbedtls_md_hmac_update( ctx, salt, slen ) ) != 0 ) in mbedtls_pkcs5_pbkdf2_hmac() 317 static const unsigned char salt[MAX_TESTS][40] = variable [all …]
|
D | rsa.c | 932 unsigned char salt[MBEDTLS_MD_MAX_SIZE]; in mbedtls_rsa_rsassa_pss_sign() local 970 if( ( ret = f_rng( p_rng, salt, slen ) ) != 0 ) in mbedtls_rsa_rsassa_pss_sign() 977 memcpy( p, salt, slen ); in mbedtls_rsa_rsassa_pss_sign() 991 mbedtls_md_update( &md_ctx, salt, slen ); in mbedtls_rsa_rsassa_pss_sign()
|
/net-tools-3.4.0/mbedtls-2.4.0/include/mbedtls/ |
D | pkcs5.h | 79 size_t plen, const unsigned char *salt, size_t slen,
|
D | pkcs12.h | 112 const unsigned char *salt, size_t saltlen,
|
/net-tools-3.4.0/mbedtls-2.4.0/tests/suites/ |
D | test_suite_pkcs1_v15.function | 115 char *message_hex_string, char *salt, 128 info.length = unhexify( rnd_buf, salt ); 178 char *message_hex_string, char *salt, 186 ((void) salt);
|
D | test_suite_pkcs1_v21.function | 115 char *message_hex_string, char *salt, 128 info.length = unhexify( rnd_buf, salt ); 178 char *message_hex_string, char *salt, 186 ((void) salt);
|
D | test_suite_pkcs5.data | 49 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string) 53 PBES2 Decrypt (bad PBKDF2 params salt: overlong)
|
/net-tools-3.4.0/tinydtls-0.8.2/sha2/testvectors/testvectors/ |
D | vector014.info | 4 a very large grain of salt. The input sample 4 KB of misc.
|
D | vector008.info | 4 a very large grain of salt. The input sample exactly the same
|
D | vector010.info | 4 a very large grain of salt. The input sample is exactly 5 times
|
D | vector012.info | 4 a very large grain of salt. The input sample is exactly 5 times
|
D | vector006.info | 4 a very large grain of salt. The input sample exactly the same
|
D | vector007.info | 4 a very large grain of salt. The input sample one byte shorter
|
D | vector011.info | 4 a very large grain of salt. The input sample is one byte less
|
D | vector013.info | 4 a very large grain of salt. The input sample is one byte short
|
D | vector009.info | 4 a very large grain of salt. The input sample is one byte shorter
|
D | vector004.info | 4 a very large grain of salt. The input sample comes from...well
|
D | vector005.info | 4 a very large grain of salt. The input sample is EMPTY (no bits).
|
/net-tools-3.4.0/mbedtls-2.4.0/ |
D | ChangeLog | 1630 * Fixed incorrect behaviour in case of RSASSA-PSS with a salt length 1708 length salt lengths
|