| /mbedtls/tests/src/drivers/ |
| A D | test_driver_asymmetric_encryption.c | 31 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_transparent_asymmetric_encrypt() argument 57 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_encrypt() 62 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_encrypt() 72 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_transparent_asymmetric_decrypt() argument 98 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_decrypt() 103 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_decrypt() 116 size_t input_length, const uint8_t *salt, size_t salt_length, in mbedtls_test_opaque_asymmetric_encrypt() argument 135 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_encrypt() 140 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_encrypt() 169 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_decrypt() [all …]
|
| /mbedtls/library/ |
| A D | pkcs12.c | 37 mbedtls_asn1_buf *salt, int *iterations) in pkcs12_parse_pbe_params() argument 59 salt->p = *p; in pkcs12_parse_pbe_params() 60 *p += salt->len; in pkcs12_parse_pbe_params() 82 mbedtls_asn1_buf salt; in pkcs12_pbe_derive_key_iv() local 90 memset(&salt, 0, sizeof(mbedtls_asn1_buf)); in pkcs12_pbe_derive_key_iv() 93 if ((ret = pkcs12_parse_pbe_params(pbe_params, &salt, in pkcs12_pbe_derive_key_iv() 103 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv() 113 salt.p, salt.len, md_type, in pkcs12_pbe_derive_key_iv() 353 if (salt == NULL && saltlen != 0) { in mbedtls_pkcs12_derivation() 358 use_salt = (salt && saltlen != 0); in mbedtls_pkcs12_derivation() [all …]
|
| A D | pkcs5.c | 41 mbedtls_asn1_buf *salt, int *iterations, in pkcs5_parse_pbkdf2_params() argument 62 if ((ret = mbedtls_asn1_get_tag(&p, end, &salt->len, in pkcs5_parse_pbkdf2_params() 67 salt->p = p; in pkcs5_parse_pbkdf2_params() 68 p += salt->len; in pkcs5_parse_pbkdf2_params() 138 mbedtls_asn1_buf salt; in mbedtls_pkcs5_pbes2_ext() local 172 &salt, &iterations, &keylen, in mbedtls_pkcs5_pbes2_ext() 219 if ((ret = mbedtls_pkcs5_pbkdf2_hmac_ext(md_type, pwd, pwdlen, salt.p, in mbedtls_pkcs5_pbes2_ext() 220 salt.len, iterations, keylen, in mbedtls_pkcs5_pbes2_ext() 298 if ((ret = mbedtls_md_hmac_update(ctx, salt, slen)) != 0) { in pkcs5_pbkdf2_hmac() 364 return pkcs5_pbkdf2_hmac(ctx, password, plen, salt, slen, iteration_count, in mbedtls_pkcs5_pbkdf2_hmac() [all …]
|
| A D | hkdf.c | 16 int mbedtls_hkdf(const mbedtls_md_info_t *md, const unsigned char *salt, in mbedtls_hkdf() argument 24 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf() 37 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument 43 if (salt == NULL) { in mbedtls_hkdf_extract() 56 salt = null_salt; in mbedtls_hkdf_extract() 60 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract()
|
| A D | psa_crypto_rsa.c | 522 const uint8_t *salt, in mbedtls_psa_asymmetric_encrypt() argument 533 (void) salt; in mbedtls_psa_asymmetric_encrypt() 582 salt, salt_length, in mbedtls_psa_asymmetric_encrypt() 616 const uint8_t *salt, in mbedtls_psa_asymmetric_decrypt() argument 627 (void) salt; in mbedtls_psa_asymmetric_decrypt() 680 salt, salt_length, in mbedtls_psa_asymmetric_decrypt()
|
| A D | psa_crypto_rsa.h | 263 const uint8_t *salt, 321 const uint8_t *salt,
|
| A D | psa_crypto_driver_wrappers.h | 2540 size_t input_length, const uint8_t *salt, size_t salt_length, in psa_driver_wrapper_asymmetric_encrypt() argument 2556 salt, salt_length, output, output_size, in psa_driver_wrapper_asymmetric_encrypt() 2565 salt, salt_length, output, output_size, output_length ) in psa_driver_wrapper_asymmetric_encrypt() 2573 salt, salt_length, output, output_size, output_length ) in psa_driver_wrapper_asymmetric_encrypt() 2586 (void)salt; in psa_driver_wrapper_asymmetric_encrypt() 2598 size_t input_length, const uint8_t *salt, size_t salt_length, in psa_driver_wrapper_asymmetric_decrypt() argument 2614 salt, salt_length, output, output_size, in psa_driver_wrapper_asymmetric_decrypt() 2623 salt, salt_length, output, output_size, in psa_driver_wrapper_asymmetric_decrypt() 2631 salt, salt_length, output, output_size, in psa_driver_wrapper_asymmetric_decrypt() 2644 (void)salt; in psa_driver_wrapper_asymmetric_decrypt()
|
| A D | rsa.c | 1694 const unsigned char *salt, size_t slen, in hash_mprime() argument 1720 if ((ret = mbedtls_md_update(&md_ctx, salt, slen)) != 0) { in hash_mprime() 2122 unsigned char *salt = NULL; in rsa_rsassa_pss_sign_no_mode_check() local 2189 salt = p; in rsa_rsassa_pss_sign_no_mode_check() 2190 if ((ret = f_rng(p_rng, salt, slen)) != 0) { in rsa_rsassa_pss_sign_no_mode_check() 2197 ret = hash_mprime(hash, hashlen, salt, slen, p, hash_id); in rsa_rsassa_pss_sign_no_mode_check()
|
| A D | psa_crypto.c | 3328 LOCAL_INPUT_DECLARE(salt_external, salt); in psa_asymmetric_encrypt() 3333 (void) salt; in psa_asymmetric_encrypt() 3360 alg, input, input_length, salt, salt_length, in psa_asymmetric_encrypt() 3366 LOCAL_INPUT_FREE(salt_external, salt); in psa_asymmetric_encrypt() 3387 LOCAL_INPUT_DECLARE(salt_external, salt); in psa_asymmetric_decrypt() 3392 (void) salt; in psa_asymmetric_decrypt() 3418 alg, input, input_length, salt, salt_length, in psa_asymmetric_decrypt() 3425 LOCAL_INPUT_FREE(salt_external, salt); in psa_asymmetric_decrypt() 5536 if (operation->ctx.pbkdf2.salt != NULL) { in psa_key_derivation_abort() 7139 mbedtls_free(pbkdf2->salt); in psa_pbkdf2_set_salt() [all …]
|
| /mbedtls/tests/suites/ |
| A D | test_suite_hkdf.function | 12 void test_hkdf(int md_alg, data_t *ikm, data_t *salt, data_t *info, 25 ret = mbedtls_hkdf(md, salt->x, salt->len, ikm->x, ikm->len, 40 data_t *salt, 55 ret = mbedtls_hkdf_extract(md, salt->x, salt->len, 103 unsigned char *salt = NULL; 117 output_ret = mbedtls_hkdf_extract(&fake_md_info, salt, salt_len,
|
| A D | test_suite_pkcs12.data | 21 PKCS#12 derive key: MD5: Zero length salt 25 PKCS#12 derive key: MD5: NULL salt 29 PKCS#12 derive key: MD5: Invalid length NULL salt 33 PKCS#12 derive key: MD5: Valid password and salt
|
| A D | test_suite_pkcs12.function | 29 unsigned char *salt = NULL; 42 salt = salt_arg->x; 53 salt,
|
| A D | test_suite_pkcs1_v21.data | 513 RSASSA-PSS Signature RSA-1016, SHA-512: minimum salt size not met 517 RSASSA-PSS Signature RSA-520, SHA-512: no possible salt size 521 RSASSA-PSS Signature RSA-528, SHA-512: zero salt size 1057 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature 1061 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature 1065 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature 1073 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature 1085 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature 1089 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature 1097 RSASSA-PSS verify ext, all-zero padding, automatic salt length [all …]
|
| A D | test_suite_pkcs1_v21.function | 196 char *salt, data_t *result_str, int result) 200 ((void) salt);
|
| A D | test_suite_pkcs5.data | 193 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string) 197 PBES2 Decrypt (bad PBKDF2 params salt: overlong)
|
| A D | test_suite_psa_crypto.data | 4250 PSA import/exercise RSA keypair, PSS-any-salt-SHA-256 4654 PSA verify hash: RSA-528 PSS-any-salt SHA-512, slen=0 4874 PSA sign/verify message: RSA PSS-any-salt SHA-256 5078 PSA encrypt: RSA PKCS#1 v1.5: salt not allowed 5166 PSA decrypt: RSA PKCS#1 v1.5: salt not allowed 5320 PSA key derivation: HKDF-SHA-256, salt after secret 5332 PSA key derivation: HKDF-SHA-256, duplicate salt step 5525 PSA key derivation: PBKDF2-HMAC-SHA256, salt missing 5861 PSA key derivation: HKDF-Extract SHA-256, no salt 5967 PSA key derivation: HKDF-Expand input salt [all …]
|
| A D | test_suite_psa_crypto_driver_wrappers.data | 121 verify_hash transparent driver: in driver Public Key RSA-1024 PSS-any-salt SHA-256 125 verify_hash transparent driver: fallback Public Key RSA-1024 PSS-any-salt SHA-256 129 verify_hash transparent driver: error Public Key RSA-1024 PSS-any-salt SHA-256 225 verify_message transparent driver: calculate in driver Public Key RSA PSS-any-salt SHA-256 229 verify_message transparent driver: fallback Public Key RSA PSS-any-salt SHA-256 233 verify_message transparent driver: error Public Key RSA PSS-any-salt SHA-256
|
| /mbedtls/tests/include/test/drivers/ |
| A D | asymmetric_encryption.h | 45 size_t input_length, const uint8_t *salt, size_t salt_length, 51 size_t input_length, const uint8_t *salt, size_t salt_length, 57 size_t input_length, const uint8_t *salt, size_t salt_length, 63 size_t input_length, const uint8_t *salt, size_t salt_length,
|
| /mbedtls/docs/architecture/psa-migration/ |
| A D | psa-limitations.md | 100 - a salt length 106 discrepancies in handling the salt length and which of the various hash 115 - salt length: always using the maximum legal value 119 - salt length: specified explicitly 123 - salt length: any valid length accepted 127 - expected salt length: specified explicitly, can specify "ANY" 133 - expected salt length: specified explicitly, can specify "ANY" 137 - salt length can be either "standard" (<= hashlen, see note) or "any" 139 - salt length: always <= hashlen (see note) and random salt 154 hash), the MGF (and its hash if MGF1 is used), and the salt length (plus an [all …]
|
| /mbedtls/include/mbedtls/ |
| A D | hkdf.h | 56 int mbedtls_hkdf(const mbedtls_md_info_t *md, const unsigned char *salt, 86 const unsigned char *salt, size_t salt_len,
|
| A D | pkcs5.h | 151 size_t plen, const unsigned char *salt, size_t slen, 176 const unsigned char *salt,
|
| A D | pkcs12.h | 179 const unsigned char *salt, size_t saltlen,
|
| /mbedtls/include/psa/ |
| A D | crypto_builtin_key_derivation.h | 108 uint8_t *MBEDTLS_PRIVATE(salt);
|
| A D | crypto.h | 3104 const uint8_t *salt, 3165 const uint8_t *salt,
|
| /mbedtls/scripts/data_files/driver_templates/ |
| A D | psa_crypto_driver_wrappers.h.jinja | 2503 size_t input_length, const uint8_t *salt, size_t salt_length, 2519 salt, salt_length, output, output_size, 2528 salt, salt_length, output, output_size, output_length ) 2536 salt, salt_length, output, output_size, output_length ) 2549 (void)salt; 2561 size_t input_length, const uint8_t *salt, size_t salt_length, 2577 salt, salt_length, output, output_size, 2586 salt, salt_length, output, output_size, 2594 salt, salt_length, output, output_size, 2607 (void)salt;
|