Home
last modified time | relevance | path

Searched refs:saltlen (Results 1 – 10 of 10) sorted by relevance

/openthread-3.7.0/third_party/mbedtls/repo/library/
Dpkcs12.c328 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument
345 if (datalen > 128 || pwdlen > 64 || saltlen > 64) { in mbedtls_pkcs12_derivation()
353 if (salt == NULL && saltlen != 0) { in mbedtls_pkcs12_derivation()
358 use_salt = (salt && saltlen != 0); in mbedtls_pkcs12_derivation()
371 pkcs12_fill_buffer(salt_block, v, salt, saltlen); in mbedtls_pkcs12_derivation()
Drsa.c2117 int saltlen, in rsa_rsassa_pss_sign_no_mode_check() argument
2159 if (saltlen == MBEDTLS_RSA_SALT_LEN_ANY) { in rsa_rsassa_pss_sign_no_mode_check()
2175 } else if ((saltlen < 0) || (saltlen + hlen + 2 > olen)) { in rsa_rsassa_pss_sign_no_mode_check()
2178 slen = (size_t) saltlen; in rsa_rsassa_pss_sign_no_mode_check()
2228 int saltlen, in rsa_rsassa_pss_sign() argument
2237 return rsa_rsassa_pss_sign_no_mode_check(ctx, f_rng, p_rng, md_alg, hashlen, hash, saltlen, in rsa_rsassa_pss_sign()
2263 int saltlen, in mbedtls_rsa_rsassa_pss_sign_ext() argument
2267 hashlen, hash, saltlen, sig); in mbedtls_rsa_rsassa_pss_sign_ext()
/openthread-3.7.0/third_party/mbedtls/repo/docs/architecture/psa-migration/
Dpsa-limitations.md179 OpenSSL picks saltlen = keylen - hashlen - 2 (tested with openssl 1.1.1f).
180 The `certtool` command provided by GnuTLS seems to be picking saltlen = hashlen
181 by default (tested with GnuTLS 3.6.13). FIPS 186-4 requires 0 <= saltlen <=
218 server9-bad-saltlen.crt (announcing saltlen = 0xDE, signed with another len)
256 all using saltlen = keylen - hashlen - 2, except for server9-defaults which is
257 using saltlen = hashlen.
287 all using saltlen = keylen - hashlen - 2.
313 all using saltlen = keylen - hashlen - 2.
323 saltlen happens to match hashlen, and falling back to `ANY_SALT` otherwise.
325 3. Reject all certificates with saltlen != hashlen. This includes all
/openthread-3.7.0/third_party/mbedtls/repo/include/mbedtls/
Dpkcs12.h179 const unsigned char *salt, size_t saltlen,
Drsa.h941 int saltlen,
/openthread-3.7.0/third_party/mbedtls/repo/scripts/
Dci.requirements.txt22 # For building `tests/data_files/server9-bad-saltlen.crt` and check python
/openthread-3.7.0/third_party/mbedtls/repo/tests/suites/
Dtest_suite_pkcs1_v21.data1069 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0
1077 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0
Dtest_suite_x509parse.data904 x509_verify:"data_files/server9-bad-saltlen.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-s…
908 x509_verify:"data_files/server9-bad-saltlen.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-s…
/openthread-3.7.0/third_party/mbedtls/repo/tests/data_files/
DMakefile590 server9-bad-saltlen.crt: server9.csr $(test_ca_crt) $(test_ca_key_file_rsa) \
598 all_final += server9-bad-saltlen.crt
/openthread-3.7.0/third_party/mbedtls/repo/docs/
Dpsa-transition.md1013 …h to `xxx_ext` legacy functions or using a legacy function that does not have a `saltlen` argument.
1015 …h to `xxx_ext` legacy functions or using a legacy function that does not have a `saltlen` argument.