Searched refs:saltlen (Results 1 – 10 of 10) sorted by relevance
/openthread-3.7.0/third_party/mbedtls/repo/library/ |
D | pkcs12.c | 328 const unsigned char *salt, size_t saltlen, in mbedtls_pkcs12_derivation() argument 345 if (datalen > 128 || pwdlen > 64 || saltlen > 64) { in mbedtls_pkcs12_derivation() 353 if (salt == NULL && saltlen != 0) { in mbedtls_pkcs12_derivation() 358 use_salt = (salt && saltlen != 0); in mbedtls_pkcs12_derivation() 371 pkcs12_fill_buffer(salt_block, v, salt, saltlen); in mbedtls_pkcs12_derivation()
|
D | rsa.c | 2117 int saltlen, in rsa_rsassa_pss_sign_no_mode_check() argument 2159 if (saltlen == MBEDTLS_RSA_SALT_LEN_ANY) { in rsa_rsassa_pss_sign_no_mode_check() 2175 } else if ((saltlen < 0) || (saltlen + hlen + 2 > olen)) { in rsa_rsassa_pss_sign_no_mode_check() 2178 slen = (size_t) saltlen; in rsa_rsassa_pss_sign_no_mode_check() 2228 int saltlen, in rsa_rsassa_pss_sign() argument 2237 return rsa_rsassa_pss_sign_no_mode_check(ctx, f_rng, p_rng, md_alg, hashlen, hash, saltlen, in rsa_rsassa_pss_sign() 2263 int saltlen, in mbedtls_rsa_rsassa_pss_sign_ext() argument 2267 hashlen, hash, saltlen, sig); in mbedtls_rsa_rsassa_pss_sign_ext()
|
/openthread-3.7.0/third_party/mbedtls/repo/docs/architecture/psa-migration/ |
D | psa-limitations.md | 179 OpenSSL picks saltlen = keylen - hashlen - 2 (tested with openssl 1.1.1f). 180 The `certtool` command provided by GnuTLS seems to be picking saltlen = hashlen 181 by default (tested with GnuTLS 3.6.13). FIPS 186-4 requires 0 <= saltlen <= 218 server9-bad-saltlen.crt (announcing saltlen = 0xDE, signed with another len) 256 all using saltlen = keylen - hashlen - 2, except for server9-defaults which is 257 using saltlen = hashlen. 287 all using saltlen = keylen - hashlen - 2. 313 all using saltlen = keylen - hashlen - 2. 323 saltlen happens to match hashlen, and falling back to `ANY_SALT` otherwise. 325 3. Reject all certificates with saltlen != hashlen. This includes all
|
/openthread-3.7.0/third_party/mbedtls/repo/include/mbedtls/ |
D | pkcs12.h | 179 const unsigned char *salt, size_t saltlen,
|
D | rsa.h | 941 int saltlen,
|
/openthread-3.7.0/third_party/mbedtls/repo/scripts/ |
D | ci.requirements.txt | 22 # For building `tests/data_files/server9-bad-saltlen.crt` and check python
|
/openthread-3.7.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_pkcs1_v21.data | 1069 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0 1077 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0
|
D | test_suite_x509parse.data | 904 x509_verify:"data_files/server9-bad-saltlen.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-s… 908 x509_verify:"data_files/server9-bad-saltlen.crt":"data_files/test-ca.crt":"data_files/crl-rsa-pss-s…
|
/openthread-3.7.0/third_party/mbedtls/repo/tests/data_files/ |
D | Makefile | 590 server9-bad-saltlen.crt: server9.csr $(test_ca_crt) $(test_ca_key_file_rsa) \ 598 all_final += server9-bad-saltlen.crt
|
/openthread-3.7.0/third_party/mbedtls/repo/docs/ |
D | psa-transition.md | 1013 …h to `xxx_ext` legacy functions or using a legacy function that does not have a `saltlen` argument. 1015 …h to `xxx_ext` legacy functions or using a legacy function that does not have a `saltlen` argument.
|