Home
last modified time | relevance | path

Searched refs:salt_len (Results 1 – 8 of 8) sorted by relevance

/net-tools-latest/mbedtls-2.4.0/tests/suites/
Dtest_suite_pkcs5.function22 int pw_len, salt_len;
32 salt_len = unhexify( salt_str, hex_salt_string );
38 TEST_ASSERT( mbedtls_pkcs5_pbkdf2_hmac( &ctx, pw_str, pw_len, salt_str, salt_len,
Dtest_suite_pk.data85 Verify ext RSA #1 (PKCS1 v2.1, salt_len = ANY, OK)
89 Verify ext RSA #2 (PKCS1 v2.1, salt_len = ANY, wrong message)
93 Verify ext RSA #3 (PKCS1 v2.1, salt_len = 0, OK)
97 Verify ext RSA #4 (PKCS1 v2.1, salt_len = max, OK)
101 Verify ext RSA #5 (PKCS1 v2.1, wrong salt_len)
Dtest_suite_pkcs1_v21.function217 int mgf_hash, int salt_len,
261 mgf_hash, salt_len,
Dtest_suite_pk.function159 int pk_type, int mgf1_hash_id, int salt_len,
209 pss_opts.expected_salt_len = salt_len;
Dtest_suite_pkcs1_v21.data766 RSASSA-PSS Signature verify options #8 (non-default salt_len: max)
770 RSASSA-PSS Signature verify options #9 (non-default salt_len: 0)
774 RSASSA-PSS Signature verify options #10 (non-default salt_len: 0, ANY)
Dtest_suite_x509parse.data646 X509 Certificate verification #68 (RSASSA-PSS, wrong salt_len)
/net-tools-latest/mbedtls-2.4.0/include/mbedtls/
Dx509.h290 int *salt_len );
/net-tools-latest/mbedtls-2.4.0/library/
Dx509.c215 int *salt_len ) in mbedtls_x509_get_rsassa_pss_params() argument
226 *salt_len = 20; in mbedtls_x509_get_rsassa_pss_params()
303 if( ( ret = mbedtls_asn1_get_int( &p, end2, salt_len ) ) != 0 ) in mbedtls_x509_get_rsassa_pss_params()