/openthread-3.5.0/third_party/mbedtls/repo/library/ |
D | pkcs12.c | 49 mbedtls_asn1_buf *salt, int *iterations ) in pkcs12_parse_pbe_params() argument 66 if( ( ret = mbedtls_asn1_get_tag( p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 ) in pkcs12_parse_pbe_params() 69 salt->p = *p; in pkcs12_parse_pbe_params() 70 *p += salt->len; in pkcs12_parse_pbe_params() 90 mbedtls_asn1_buf salt; in pkcs12_pbe_derive_key_iv() local 97 memset( &salt, 0, sizeof(mbedtls_asn1_buf) ); in pkcs12_pbe_derive_key_iv() 100 if( ( ret = pkcs12_parse_pbe_params( pbe_params, &salt, in pkcs12_pbe_derive_key_iv() 108 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv() 118 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv() 259 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument [all …]
|
D | hkdf.c | 28 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, in mbedtls_hkdf() argument 36 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, prk ); in mbedtls_hkdf() 50 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument 56 if( salt == NULL ) in mbedtls_hkdf_extract() 72 salt = null_salt; in mbedtls_hkdf_extract() 76 return( mbedtls_md_hmac( md, salt, salt_len, ikm, ikm_len, prk ) ); in mbedtls_hkdf_extract()
|
D | pkcs5.c | 54 mbedtls_asn1_buf *salt, int *iterations, in pkcs5_parse_pbkdf2_params() argument 74 if( ( ret = mbedtls_asn1_get_tag( &p, end, &salt->len, in pkcs5_parse_pbkdf2_params() 78 salt->p = p; in pkcs5_parse_pbkdf2_params() 79 p += salt->len; in pkcs5_parse_pbkdf2_params() 117 mbedtls_asn1_buf salt; in mbedtls_pkcs5_pbes2() local 150 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2() 193 if( ( ret = mbedtls_pkcs5_pbkdf2_hmac( &md_ctx, pwd, pwdlen, salt.p, salt.len, in mbedtls_pkcs5_pbes2() 220 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac() argument 248 if( ( ret = mbedtls_md_hmac_update( ctx, salt, slen ) ) != 0 ) in mbedtls_pkcs5_pbkdf2_hmac()
|
D | rsa.c | 1582 unsigned char *salt = NULL; in rsa_rsassa_pss_sign() local 1654 salt = p; in rsa_rsassa_pss_sign() 1655 if( ( ret = f_rng( p_rng, salt, slen ) ) != 0 ) in rsa_rsassa_pss_sign() 1671 if( ( ret = mbedtls_md_update( &md_ctx, salt, slen ) ) != 0 ) in rsa_rsassa_pss_sign()
|
D | psa_crypto.c | 3082 const uint8_t *salt, in psa_asymmetric_encrypt() argument 3094 (void) salt; in psa_asymmetric_encrypt() 3158 salt, salt_length, in psa_asymmetric_encrypt() 3196 const uint8_t *salt, in psa_asymmetric_decrypt() argument 3208 (void) salt; in psa_asymmetric_decrypt() 3273 salt, salt_length, in psa_asymmetric_decrypt()
|
D | ssl_tls.c | 1610 unsigned char const *salt = handshake->randbytes; in ssl_compute_master() local 1631 salt = session_hash; in ssl_compute_master() 1663 salt, salt_len, in ssl_compute_master() 1690 lbl, salt, salt_len, in ssl_compute_master()
|
/openthread-3.5.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_hkdf.function | 12 void test_hkdf( int md_alg, data_t *ikm, data_t *salt, data_t *info, 23 ret = mbedtls_hkdf( md, salt->x, salt->len, ikm->x, ikm->len, 38 unsigned char *salt = NULL; 50 salt = mbedtls_test_unhexify_alloc( hex_salt_string, &salt_len ); 53 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, output_prk ); 60 mbedtls_free(salt); 106 unsigned char *salt = NULL; 120 output_ret = mbedtls_hkdf_extract( &fake_md_info, salt, salt_len,
|
D | test_suite_pkcs12.data | 21 PKCS#12 derive key: MD5: Zero length salt 25 PKCS#12 derive key: MD5: NULL salt 29 PKCS#12 derive key: MD5: Invalid length NULL salt 33 PKCS#12 derive key: MD5: Valid password and salt
|
D | test_suite_pkcs12.function | 31 unsigned char *salt = NULL; 41 salt = salt_arg->x; 51 salt,
|
D | test_suite_pkcs1_v21.data | 387 RSASSA-PSS Signature RSA-1016, SHA-512: minimum salt size not met 391 RSASSA-PSS Signature RSA-520, SHA-512: no possible salt size 395 RSASSA-PSS Signature RSA-528, SHA-512: zero salt size 807 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature 811 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature 815 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature 823 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature 835 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature 839 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature 843 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature [all …]
|
D | test_suite_pkcs1_v21.function | 186 char * salt, data_t * result_str, int result ) 191 ((void) salt);
|
D | test_suite_pkcs5.data | 137 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string) 141 PBES2 Decrypt (bad PBKDF2 params salt: overlong)
|
D | test_suite_psa_crypto.data | 667 PSA key policy: asymmetric signature, wrong alg family (PSS std/any salt) 671 PSA key policy: asymmetric signature, wrong alg family (PSS any/std salt) 719 PSA key policy: msg asymmetric signature, wrong alg family (PSS std/any salt) 723 PSA key policy: msg asymmetric signature, wrong alg family (PSS any/std salt) 2446 PSA signature size: RSA keypair, 1024 bits, PSS-any-salt 2466 PSA import/exercise RSA keypair, PSS-any-salt-SHA-256 2478 PSA import/exercise RSA public key, PSS-any-salt-SHA-256 2542 PSA sign hash: RSA PSS-any-salt SHA-256, wrong hash length (0 bytes) 2550 PSA sign hash: RSA PSS-any-salt SHA-256, wrong hash length (129 bytes) 2598 PSA sign/verify hash: RSA PSS-any-salt SHA-256, 32 bytes (hash size) [all …]
|
D | test_suite_psa_crypto_metadata.data | 225 Asymmetric signature: RSA PSS-any-salt SHA-256 261 Asymmetric signature: RSA PSS-any-salt with wildcard hash
|
D | test_suite_pkcs1_v15.function | 326 int hash, data_t * message_str, char * salt, 332 ((void) salt);
|
/openthread-3.5.0/src/core/meshcop/ |
D | meshcop.cpp | 326 uint8_t salt[OT_CRYPTO_PBDKF2_MAX_SALT_SIZE]; in GeneratePskc() local 341 memset(salt, 0, sizeof(salt)); in GeneratePskc() 342 memcpy(salt, saltPrefix, sizeof(saltPrefix) - 1); in GeneratePskc() 345 memcpy(salt + saltLen, aExtPanId.m8, sizeof(aExtPanId)); in GeneratePskc() 348 memcpy(salt + saltLen, aNetworkName.GetAsCString(), networkNameLen); in GeneratePskc() 351 …df2GenerateKey(reinterpret_cast<const uint8_t *>(aPassPhrase), passphraseLen, salt, saltLen, 16384, in GeneratePskc()
|
/openthread-3.5.0/third_party/mbedtls/repo/include/mbedtls/ |
D | hkdf.h | 72 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, 102 const unsigned char *salt, size_t salt_len,
|
D | pkcs5.h | 92 size_t plen, const unsigned char *salt, size_t slen,
|
D | pkcs12.h | 133 const unsigned char *salt, size_t saltlen,
|
/openthread-3.5.0/src/core/thread/ |
D | key_manager.cpp | 312 uint8_t salt[sizeof(uint32_t) + sizeof(kHkdfExtractSaltString)]; in ComputeTrelKey() local 321 Encoding::BigEndian::WriteUint32(aKeySequence, salt); in ComputeTrelKey() 322 memcpy(salt + sizeof(uint32_t), kHkdfExtractSaltString, sizeof(kHkdfExtractSaltString)); in ComputeTrelKey() 324 hkdf.Extract(salt, sizeof(salt), cryptoKey); in ComputeTrelKey()
|
/openthread-3.5.0/third_party/mbedtls/repo/include/psa/ |
D | crypto.h | 3168 const uint8_t *salt, 3229 const uint8_t *salt,
|
/openthread-3.5.0/third_party/mbedtls/repo/docs/ |
D | getting_started.md | 560 with a given key, salt and info:** 564 1. Provide an optional salt with `psa_key_derivation_input_bytes()`. 575 derived from the key, salt and info provided: 584 static const unsigned char salt[] = { 633 salt, sizeof(salt)); 635 printf("Failed to input salt (extract)\n");
|
/openthread-3.5.0/third_party/mbedtls/repo/ |
D | ChangeLog | 82 * Fix PSA_ALG_RSA_PSS verification accepting an arbitrary salt length. 83 This algorithm now accepts only the same salt length for verification 85 PSA_ALG_RSA_PSS_ANY_SALT to accept any salt length. Fixes #4946. 150 signature with a specific salt length. This function allows to validate 1476 * Extend RSASSA-PSS signature to allow a smaller salt size. Previously, PSS 1477 signature always used a salt with the same length as the hash, and returned 1478 an error if this was not possible. Now the salt size may be up to two bytes 1729 when calling with a NULL salt and non-zero salt_len. Contributed by 4067 * Fixed incorrect behaviour in case of RSASSA-PSS with a salt length 4145 length salt lengths
|