Home
last modified time | relevance | path

Searched refs:salt_len (Results 1 – 12 of 12) sorted by relevance

/mbedtls-latest/library/
Dhkdf.c17 size_t salt_len, const unsigned char *ikm, size_t ikm_len, in mbedtls_hkdf() argument
24 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf()
37 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument
46 if (salt_len != 0) { in mbedtls_hkdf_extract()
57 salt_len = hash_len; in mbedtls_hkdf_extract()
60 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract()
Dx509_internal.h33 int *salt_len);
Dx509.c247 int *salt_len) in mbedtls_x509_get_rsassa_pss_params() argument
258 *salt_len = 20; in mbedtls_x509_get_rsassa_pss_params()
346 if ((ret = mbedtls_asn1_get_int(&p, end2, salt_len)) != 0) { in mbedtls_x509_get_rsassa_pss_params()
/mbedtls-latest/include/mbedtls/
Dhkdf.h57 size_t salt_len, const unsigned char *ikm, size_t ikm_len,
86 const unsigned char *salt, size_t salt_len,
/mbedtls-latest/tests/suites/
Dtest_suite_hkdf.function106 size_t salt_len, ikm_len;
114 salt_len = 0;
117 output_ret = mbedtls_hkdf_extract(&fake_md_info, salt, salt_len,
Dtest_suite_pkcs12.function30 size_t salt_len = 0;
45 salt_len = salt_arg->len;
54 salt_len,
Dtest_suite_pkcs1_v21.function233 int mgf_hash, int salt_len,
264 hash_digest->x, mgf_hash, salt_len,
Dtest_suite_pk.data513 Verify ext RSA #1 (PKCS1 v2.1, salt_len = ANY, OK)
517 Verify ext RSA #2 (PKCS1 v2.1, salt_len = ANY, wrong message)
521 Verify ext RSA #3 (PKCS1 v2.1, salt_len = 0, OK)
525 Verify ext RSA #4 (PKCS1 v2.1, salt_len = max, OK)
529 Verify ext RSA #5a (PKCS1 v2.1, wrong salt_len) !USE_PSA
533 Verify ext RSA #5b (PKCS1 v2.1, wrong salt_len) USE_PSA
565 Verify ext RSA #13 (PKCS1 v2.1, salt_len = max, sig_len too long)
569 Verify ext RSA #14 (PKCS1 v2.1, salt_len = ANY, sig_len too long)
573 Verify ext RSA #15 (PKCS1 v2.1, salt_len = ANY, sig_len too short)
577 Verify ext RSA #16 (PKCS1 v2.1, salt_len = max, sig_len too short)
[all …]
Dtest_suite_pkcs1_v21.data1033 RSASSA-PSS Signature verify options #8 (non-default salt_len: max)
1037 RSASSA-PSS Signature verify options #9 (non-default salt_len: 0)
1041 RSASSA-PSS Signature verify options #10 (non-default salt_len: 0, ANY)
Dtest_suite_pk.function1140 int salt_len, int sig_len,
1166 pss_opts.expected_salt_len = salt_len;
Dtest_suite_x509parse.data902 X509 CRT verification #68 (RSASSA-PSS, wrong salt_len, !USE_PSA)
906 X509 CRT verification #68 (RSASSA-PSS, wrong salt_len, USE_PSA)
/mbedtls-latest/
DChangeLog3519 when calling with a NULL salt and non-zero salt_len. Contributed by