Home
last modified time | relevance | path

Searched refs:expected_salt_len (Results 1 – 9 of 9) sorted by relevance

/mbedtls-3.4.0/library/
Dpk.c486 ( (size_t) pss_opts->expected_salt_len == hash_len || in mbedtls_pk_verify_ext()
487 pss_opts->expected_salt_len == MBEDTLS_RSA_SALT_LEN_ANY ) ) in mbedtls_pk_verify_ext()
501 ( pss_opts->expected_salt_len == MBEDTLS_RSA_SALT_LEN_ANY ? in mbedtls_pk_verify_ext()
551 pss_opts->expected_salt_len, in mbedtls_pk_verify_ext()
Dx509.c737 &pss_opts->expected_salt_len ); in mbedtls_x509_get_sig_alg()
931 (unsigned int) pss_opts->expected_salt_len ); in mbedtls_x509_sig_alg_gets()
Drsa.c1981 int expected_salt_len, in mbedtls_rsa_rsassa_pss_verify_ext() argument
2059 if( expected_salt_len != MBEDTLS_RSA_SALT_LEN_ANY && in mbedtls_rsa_rsassa_pss_verify_ext()
2060 observed_salt_len != (size_t) expected_salt_len ) in mbedtls_rsa_rsassa_pss_verify_ext()
Dssl_tls13_generic.c263 rsassa_pss_options.expected_salt_len = PSA_HASH_LENGTH( hash_alg ); in ssl_tls13_parse_certificate_verify()
Dssl_tls12_client.c2523 rsassa_pss_options.expected_salt_len = in ssl_parse_server_key_exchange()
2525 if( rsassa_pss_options.expected_salt_len == 0 ) in ssl_parse_server_key_exchange()
/mbedtls-3.4.0/include/mbedtls/
Drsa.h1089 int expected_salt_len,
Dpk.h103 int MBEDTLS_PRIVATE(expected_salt_len);
/mbedtls-3.4.0/tests/suites/
Dtest_suite_pk.function604 pss_opts.expected_salt_len = salt_len;
1348 rsassa_pss_options.expected_salt_len = hash_len;
1425 rsassa_pss_options.expected_salt_len = hash_len;
Dtest_suite_pkcs1_v21.data1025 RSASSA-PSS Signature verify options #6 (wrong expected_salt_len)
1029 RSASSA-PSS Signature verify options #7 (wrong expected_salt_len)