Searched refs:salt_len (Results 1 – 8 of 8) sorted by relevance
/net-tools-latest/mbedtls-2.4.0/tests/suites/ |
D | test_suite_pkcs5.function | 22 int pw_len, salt_len; 32 salt_len = unhexify( salt_str, hex_salt_string ); 38 TEST_ASSERT( mbedtls_pkcs5_pbkdf2_hmac( &ctx, pw_str, pw_len, salt_str, salt_len,
|
D | test_suite_pk.data | 85 Verify ext RSA #1 (PKCS1 v2.1, salt_len = ANY, OK) 89 Verify ext RSA #2 (PKCS1 v2.1, salt_len = ANY, wrong message) 93 Verify ext RSA #3 (PKCS1 v2.1, salt_len = 0, OK) 97 Verify ext RSA #4 (PKCS1 v2.1, salt_len = max, OK) 101 Verify ext RSA #5 (PKCS1 v2.1, wrong salt_len)
|
D | test_suite_pkcs1_v21.function | 217 int mgf_hash, int salt_len, 261 mgf_hash, salt_len,
|
D | test_suite_pk.function | 159 int pk_type, int mgf1_hash_id, int salt_len, 209 pss_opts.expected_salt_len = salt_len;
|
D | test_suite_pkcs1_v21.data | 766 RSASSA-PSS Signature verify options #8 (non-default salt_len: max) 770 RSASSA-PSS Signature verify options #9 (non-default salt_len: 0) 774 RSASSA-PSS Signature verify options #10 (non-default salt_len: 0, ANY)
|
D | test_suite_x509parse.data | 646 X509 Certificate verification #68 (RSASSA-PSS, wrong salt_len)
|
/net-tools-latest/mbedtls-2.4.0/include/mbedtls/ |
D | x509.h | 290 int *salt_len );
|
/net-tools-latest/mbedtls-2.4.0/library/ |
D | x509.c | 215 int *salt_len ) in mbedtls_x509_get_rsassa_pss_params() argument 226 *salt_len = 20; in mbedtls_x509_get_rsassa_pss_params() 303 if( ( ret = mbedtls_asn1_get_int( &p, end2, salt_len ) ) != 0 ) in mbedtls_x509_get_rsassa_pss_params()
|