Home
last modified time | relevance | path

Searched refs:salt (Results 1 – 23 of 23) sorted by relevance

/openthread-3.5.0/third_party/mbedtls/repo/library/
Dpkcs12.c49 mbedtls_asn1_buf *salt, int *iterations ) in pkcs12_parse_pbe_params() argument
66 if( ( ret = mbedtls_asn1_get_tag( p, end, &salt->len, MBEDTLS_ASN1_OCTET_STRING ) ) != 0 ) in pkcs12_parse_pbe_params()
69 salt->p = *p; in pkcs12_parse_pbe_params()
70 *p += salt->len; in pkcs12_parse_pbe_params()
90 mbedtls_asn1_buf salt; in pkcs12_pbe_derive_key_iv() local
97 memset( &salt, 0, sizeof(mbedtls_asn1_buf) ); in pkcs12_pbe_derive_key_iv()
100 if( ( ret = pkcs12_parse_pbe_params( pbe_params, &salt, in pkcs12_pbe_derive_key_iv()
108 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv()
118 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv()
259 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument
[all …]
Dhkdf.c28 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt, in mbedtls_hkdf() argument
36 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, prk ); in mbedtls_hkdf()
50 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument
56 if( salt == NULL ) in mbedtls_hkdf_extract()
72 salt = null_salt; in mbedtls_hkdf_extract()
76 return( mbedtls_md_hmac( md, salt, salt_len, ikm, ikm_len, prk ) ); in mbedtls_hkdf_extract()
Dpkcs5.c54 mbedtls_asn1_buf *salt, int *iterations, in pkcs5_parse_pbkdf2_params() argument
74 if( ( ret = mbedtls_asn1_get_tag( &p, end, &salt->len, in pkcs5_parse_pbkdf2_params()
78 salt->p = p; in pkcs5_parse_pbkdf2_params()
79 p += salt->len; in pkcs5_parse_pbkdf2_params()
117 mbedtls_asn1_buf salt; in mbedtls_pkcs5_pbes2() local
150 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2()
193 if( ( ret = mbedtls_pkcs5_pbkdf2_hmac( &md_ctx, pwd, pwdlen, salt.p, salt.len, in mbedtls_pkcs5_pbes2()
220 size_t plen, const unsigned char *salt, size_t slen, in mbedtls_pkcs5_pbkdf2_hmac() argument
248 if( ( ret = mbedtls_md_hmac_update( ctx, salt, slen ) ) != 0 ) in mbedtls_pkcs5_pbkdf2_hmac()
Drsa.c1582 unsigned char *salt = NULL; in rsa_rsassa_pss_sign() local
1654 salt = p; in rsa_rsassa_pss_sign()
1655 if( ( ret = f_rng( p_rng, salt, slen ) ) != 0 ) in rsa_rsassa_pss_sign()
1671 if( ( ret = mbedtls_md_update( &md_ctx, salt, slen ) ) != 0 ) in rsa_rsassa_pss_sign()
Dpsa_crypto.c3082 const uint8_t *salt, in psa_asymmetric_encrypt() argument
3094 (void) salt; in psa_asymmetric_encrypt()
3158 salt, salt_length, in psa_asymmetric_encrypt()
3196 const uint8_t *salt, in psa_asymmetric_decrypt() argument
3208 (void) salt; in psa_asymmetric_decrypt()
3273 salt, salt_length, in psa_asymmetric_decrypt()
Dssl_tls.c1610 unsigned char const *salt = handshake->randbytes; in ssl_compute_master() local
1631 salt = session_hash; in ssl_compute_master()
1663 salt, salt_len, in ssl_compute_master()
1690 lbl, salt, salt_len, in ssl_compute_master()
/openthread-3.5.0/third_party/mbedtls/repo/tests/suites/
Dtest_suite_hkdf.function12 void test_hkdf( int md_alg, data_t *ikm, data_t *salt, data_t *info,
23 ret = mbedtls_hkdf( md, salt->x, salt->len, ikm->x, ikm->len,
38 unsigned char *salt = NULL;
50 salt = mbedtls_test_unhexify_alloc( hex_salt_string, &salt_len );
53 ret = mbedtls_hkdf_extract( md, salt, salt_len, ikm, ikm_len, output_prk );
60 mbedtls_free(salt);
106 unsigned char *salt = NULL;
120 output_ret = mbedtls_hkdf_extract( &fake_md_info, salt, salt_len,
Dtest_suite_pkcs12.data21 PKCS#12 derive key: MD5: Zero length salt
25 PKCS#12 derive key: MD5: NULL salt
29 PKCS#12 derive key: MD5: Invalid length NULL salt
33 PKCS#12 derive key: MD5: Valid password and salt
Dtest_suite_pkcs12.function31 unsigned char *salt = NULL;
41 salt = salt_arg->x;
51 salt,
Dtest_suite_pkcs1_v21.data387 RSASSA-PSS Signature RSA-1016, SHA-512: minimum salt size not met
391 RSASSA-PSS Signature RSA-520, SHA-512: no possible salt size
395 RSASSA-PSS Signature RSA-528, SHA-512: zero salt size
807 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature
811 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature
815 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature
823 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature
835 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature
839 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature
843 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature
[all …]
Dtest_suite_pkcs1_v21.function186 char * salt, data_t * result_str, int result )
191 ((void) salt);
Dtest_suite_pkcs5.data137 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string)
141 PBES2 Decrypt (bad PBKDF2 params salt: overlong)
Dtest_suite_psa_crypto.data667 PSA key policy: asymmetric signature, wrong alg family (PSS std/any salt)
671 PSA key policy: asymmetric signature, wrong alg family (PSS any/std salt)
719 PSA key policy: msg asymmetric signature, wrong alg family (PSS std/any salt)
723 PSA key policy: msg asymmetric signature, wrong alg family (PSS any/std salt)
2446 PSA signature size: RSA keypair, 1024 bits, PSS-any-salt
2466 PSA import/exercise RSA keypair, PSS-any-salt-SHA-256
2478 PSA import/exercise RSA public key, PSS-any-salt-SHA-256
2542 PSA sign hash: RSA PSS-any-salt SHA-256, wrong hash length (0 bytes)
2550 PSA sign hash: RSA PSS-any-salt SHA-256, wrong hash length (129 bytes)
2598 PSA sign/verify hash: RSA PSS-any-salt SHA-256, 32 bytes (hash size)
[all …]
Dtest_suite_psa_crypto_metadata.data225 Asymmetric signature: RSA PSS-any-salt SHA-256
261 Asymmetric signature: RSA PSS-any-salt with wildcard hash
Dtest_suite_pkcs1_v15.function326 int hash, data_t * message_str, char * salt,
332 ((void) salt);
/openthread-3.5.0/src/core/meshcop/
Dmeshcop.cpp326 uint8_t salt[OT_CRYPTO_PBDKF2_MAX_SALT_SIZE]; in GeneratePskc() local
341 memset(salt, 0, sizeof(salt)); in GeneratePskc()
342 memcpy(salt, saltPrefix, sizeof(saltPrefix) - 1); in GeneratePskc()
345 memcpy(salt + saltLen, aExtPanId.m8, sizeof(aExtPanId)); in GeneratePskc()
348 memcpy(salt + saltLen, aNetworkName.GetAsCString(), networkNameLen); in GeneratePskc()
351 …df2GenerateKey(reinterpret_cast<const uint8_t *>(aPassPhrase), passphraseLen, salt, saltLen, 16384, in GeneratePskc()
/openthread-3.5.0/third_party/mbedtls/repo/include/mbedtls/
Dhkdf.h72 int mbedtls_hkdf( const mbedtls_md_info_t *md, const unsigned char *salt,
102 const unsigned char *salt, size_t salt_len,
Dpkcs5.h92 size_t plen, const unsigned char *salt, size_t slen,
Dpkcs12.h133 const unsigned char *salt, size_t saltlen,
/openthread-3.5.0/src/core/thread/
Dkey_manager.cpp312 uint8_t salt[sizeof(uint32_t) + sizeof(kHkdfExtractSaltString)]; in ComputeTrelKey() local
321 Encoding::BigEndian::WriteUint32(aKeySequence, salt); in ComputeTrelKey()
322 memcpy(salt + sizeof(uint32_t), kHkdfExtractSaltString, sizeof(kHkdfExtractSaltString)); in ComputeTrelKey()
324 hkdf.Extract(salt, sizeof(salt), cryptoKey); in ComputeTrelKey()
/openthread-3.5.0/third_party/mbedtls/repo/include/psa/
Dcrypto.h3168 const uint8_t *salt,
3229 const uint8_t *salt,
/openthread-3.5.0/third_party/mbedtls/repo/docs/
Dgetting_started.md560 with a given key, salt and info:**
564 1. Provide an optional salt with `psa_key_derivation_input_bytes()`.
575 derived from the key, salt and info provided:
584 static const unsigned char salt[] = {
633 salt, sizeof(salt));
635 printf("Failed to input salt (extract)\n");
/openthread-3.5.0/third_party/mbedtls/repo/
DChangeLog82 * Fix PSA_ALG_RSA_PSS verification accepting an arbitrary salt length.
83 This algorithm now accepts only the same salt length for verification
85 PSA_ALG_RSA_PSS_ANY_SALT to accept any salt length. Fixes #4946.
150 signature with a specific salt length. This function allows to validate
1476 * Extend RSASSA-PSS signature to allow a smaller salt size. Previously, PSS
1477 signature always used a salt with the same length as the hash, and returned
1478 an error if this was not possible. Now the salt size may be up to two bytes
1729 when calling with a NULL salt and non-zero salt_len. Contributed by
4067 * Fixed incorrect behaviour in case of RSASSA-PSS with a salt length
4145 length salt lengths