Searched refs:salt_len (Results 1 – 12 of 12) sorted by relevance
/mbedtls-latest/library/ |
D | hkdf.c | 17 size_t salt_len, const unsigned char *ikm, size_t ikm_len, in mbedtls_hkdf() argument 24 ret = mbedtls_hkdf_extract(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf() 37 const unsigned char *salt, size_t salt_len, in mbedtls_hkdf_extract() argument 46 if (salt_len != 0) { in mbedtls_hkdf_extract() 57 salt_len = hash_len; in mbedtls_hkdf_extract() 60 return mbedtls_md_hmac(md, salt, salt_len, ikm, ikm_len, prk); in mbedtls_hkdf_extract()
|
D | x509_internal.h | 33 int *salt_len);
|
D | x509.c | 247 int *salt_len) in mbedtls_x509_get_rsassa_pss_params() argument 258 *salt_len = 20; in mbedtls_x509_get_rsassa_pss_params() 346 if ((ret = mbedtls_asn1_get_int(&p, end2, salt_len)) != 0) { in mbedtls_x509_get_rsassa_pss_params()
|
/mbedtls-latest/include/mbedtls/ |
D | hkdf.h | 57 size_t salt_len, const unsigned char *ikm, size_t ikm_len, 86 const unsigned char *salt, size_t salt_len,
|
/mbedtls-latest/tests/suites/ |
D | test_suite_hkdf.function | 106 size_t salt_len, ikm_len; 114 salt_len = 0; 117 output_ret = mbedtls_hkdf_extract(&fake_md_info, salt, salt_len,
|
D | test_suite_pkcs12.function | 30 size_t salt_len = 0; 45 salt_len = salt_arg->len; 54 salt_len,
|
D | test_suite_pkcs1_v21.function | 233 int mgf_hash, int salt_len, 264 hash_digest->x, mgf_hash, salt_len,
|
D | test_suite_pk.data | 513 Verify ext RSA #1 (PKCS1 v2.1, salt_len = ANY, OK) 517 Verify ext RSA #2 (PKCS1 v2.1, salt_len = ANY, wrong message) 521 Verify ext RSA #3 (PKCS1 v2.1, salt_len = 0, OK) 525 Verify ext RSA #4 (PKCS1 v2.1, salt_len = max, OK) 529 Verify ext RSA #5a (PKCS1 v2.1, wrong salt_len) !USE_PSA 533 Verify ext RSA #5b (PKCS1 v2.1, wrong salt_len) USE_PSA 565 Verify ext RSA #13 (PKCS1 v2.1, salt_len = max, sig_len too long) 569 Verify ext RSA #14 (PKCS1 v2.1, salt_len = ANY, sig_len too long) 573 Verify ext RSA #15 (PKCS1 v2.1, salt_len = ANY, sig_len too short) 577 Verify ext RSA #16 (PKCS1 v2.1, salt_len = max, sig_len too short) [all …]
|
D | test_suite_pkcs1_v21.data | 1033 RSASSA-PSS Signature verify options #8 (non-default salt_len: max) 1037 RSASSA-PSS Signature verify options #9 (non-default salt_len: 0) 1041 RSASSA-PSS Signature verify options #10 (non-default salt_len: 0, ANY)
|
D | test_suite_pk.function | 1140 int salt_len, int sig_len, 1166 pss_opts.expected_salt_len = salt_len;
|
D | test_suite_x509parse.data | 902 X509 CRT verification #68 (RSASSA-PSS, wrong salt_len, !USE_PSA) 906 X509 CRT verification #68 (RSASSA-PSS, wrong salt_len, USE_PSA)
|
/mbedtls-latest/ |
D | ChangeLog | 3519 when calling with a NULL salt and non-zero salt_len. Contributed by
|