/third_party/node/test/fixtures/crypto/ |
H A D | rsa_pss.js | 85 algorithm: { name: 'RSA-PSS', saltLength: 0 }, 93 algorithm: { name: 'RSA-PSS', saltLength: 0 }, 101 algorithm: { name: 'RSA-PSS', saltLength: 0 }, 109 algorithm: { name: 'RSA-PSS', saltLength: 0 }, 117 algorithm: { name: 'RSA-PSS', saltLength: 20 }, 125 algorithm: { name: 'RSA-PSS', saltLength: 32 }, 133 algorithm: { name: 'RSA-PSS', saltLength: 48 }, 141 algorithm: { name: 'RSA-PSS', saltLength: 64 },
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/sign_verify/ |
H A D | rsa_pss_vectors.js | 48 algorithm: {name: "RSA-PSS", saltLength: 0}, 61 algorithm: {name: "RSA-PSS", saltLength: 0}, 74 algorithm: {name: "RSA-PSS", saltLength: 0}, 87 algorithm: {name: "RSA-PSS", saltLength: 0}, 100 algorithm: {name: "RSA-PSS", saltLength: 20}, 113 algorithm: {name: "RSA-PSS", saltLength: 32}, 126 algorithm: {name: "RSA-PSS", saltLength: 48}, 139 algorithm: {name: "RSA-PSS", saltLength: 64},
|
H A D | rsa.js | 159 const isDeterministic = !("saltLength" in vector.algorithm) || vector.algorithm.saltLength == 0; 309 // [RSA-PSS] Verification should fail with wrong saltLength 315 const saltLength = vector.algorithm.saltLength === 32 ? 48 : 32; 316 var operation = subtle.verify({ ...vector.algorithm, saltLength }, vector.publicKey, vector.signature, vector.plaintext) 324 }, vector.name + " verification failure with wrong saltLength"); 331 }, "importVectorKeys step: " + vector.name + " verification failure with wrong saltLength");
|
/third_party/node/test/parallel/ |
H A D | test-crypto-sign-verify.js | 87 saltLength: null, 92 message: "The property 'options.saltLength' is invalid. Received null", 159 function getEffectiveSaltLength(saltLength) { 160 switch (saltLength) { 166 return saltLength; 197 saltLength: signSaltLength 204 saltLength: signSaltLength 214 saltLength: signSaltLength 219 saltLength: signSaltLength 232 saltLength [all...] |
H A D | test-crypto-key-objects.js | 603 for (const saltLength of [undefined, 8, 10, 12, 16, 18, 20]) { 606 .sign({ key, saltLength }); 611 .verify({ key: pkey, saltLength }, signature); 648 saltLength: 20 684 for (const saltLength of [8, 10, 12]) { 686 createSign('sha1').sign({ key, saltLength }); 691 for (const saltLength of [undefined, 16, 18, 20]) { 694 .sign({ key, saltLength }); 699 .verify({ key: pkey, saltLength }, signature); 723 saltLength [all...] |
H A D | test-crypto-keygen.js | 638 saltLength: 2147483648, 645 message: 'The value of "options.saltLength" is out of range. ' + 653 saltLength: -1, 660 message: 'The value of "options.saltLength" is out of range. ' + 752 saltLength: 16, 768 saltLength: 16, 809 saltLength: 16, 816 saltLength: 16,
|
H A D | test-crypto-async-sign-verify.js | 72 // RSA w/ PSS_PADDING and default saltLength 78 saltLength: crypto.constants.RSA_PSS_SALTLEN_MAX_SIGN 85 saltLength: crypto.constants.RSA_PSS_SALTLEN_DIGEST
|
H A D | test-webcrypto-webidl.js | 334 const good = { name: 'RSA-PSS', saltLength: 20 }; property 337 assert.throws(() => converters.RsaPssParams({ ...good, saltLength: undefined }, opts), { 340 message: `${prefix}: ${context} can not be converted to 'RsaPssParams' because 'saltLength' is required in 'RsaPssParams'.`,
|
/third_party/node/lib/internal/crypto/ |
H A D | keygen.js | 204 hash, mgf1Hash, hashAlgorithm, mgf1HashAlgorithm, saltLength, 209 if (saltLength !== undefined) 210 validateInt32(saltLength, 'options.saltLength', 0); 245 saltLength,
|
H A D | rsa.js | 309 function rsaSignVerify(key, data, { saltLength }, signature) { 313 // TODO(@jasnell): Validate maximum size of saltLength 316 validateInt32(saltLength, 'algorithm.saltLength', -2); 334 saltLength,
|
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 272 if (pss->saltLength) { in rsa_pss_param_print() 273 if (i2a_ASN1_INTEGER(bp, pss->saltLength) <= 0) in rsa_pss_param_print() 484 pss->saltLength = ASN1_INTEGER_new(); in ossl_rsa_pss_params_create() 485 if (pss->saltLength == NULL) in ossl_rsa_pss_params_create() 487 if (!ASN1_INTEGER_set(pss->saltLength, saltlen)) in ossl_rsa_pss_params_create()
|
H A D | rsa_asn1.c | 90 ASN1_EXP_OPT(RSA_PSS_PARAMS, saltLength, ASN1_INTEGER,2),
|
H A D | rsa_backend.c | 510 if (pss->saltLength) in ossl_rsa_pss_get_param_unverified() 511 *psaltlen = ASN1_INTEGER_get(pss->saltLength); in ossl_rsa_pss_get_param_unverified()
|
/third_party/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 269 if (pss->saltLength) { in rsa_pss_param_print() 270 if (i2a_ASN1_INTEGER(bp, pss->saltLength) <= 0) in rsa_pss_param_print() 481 pss->saltLength = ASN1_INTEGER_new(); in ossl_rsa_pss_params_create() 482 if (pss->saltLength == NULL) in ossl_rsa_pss_params_create() 484 if (!ASN1_INTEGER_set(pss->saltLength, saltlen)) in ossl_rsa_pss_params_create()
|
H A D | rsa_asn1.c | 90 ASN1_EXP_OPT(RSA_PSS_PARAMS, saltLength, ASN1_INTEGER,2),
|
H A D | rsa_backend.c | 522 if (pss->saltLength) in ossl_rsa_pss_get_param_unverified() 523 *psaltlen = ASN1_INTEGER_get(pss->saltLength); in ossl_rsa_pss_get_param_unverified()
|
/third_party/node/src/crypto/ |
H A D | crypto_rsa.cc | 612 if (params->saltLength != nullptr) { in GetRsaKeyDetail() 613 if (ASN1_INTEGER_get_int64(&salt_length, params->saltLength) != 1) { in GetRsaKeyDetail()
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/wrapKey_unwrapKey/ |
H A D | wrapKey_unwrapKey.https.any.js | 391 signParams = {name: "RSA-PSS", saltLength: 32 };
|
/third_party/node/deps/openssl/openssl/include/openssl/ |
H A D | rsa.h | 318 ASN1_INTEGER *saltLength; member
|
/third_party/openssl/include/openssl/ |
H A D | rsa.h | 318 ASN1_INTEGER *saltLength; member
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | rsa.h | 286 ASN1_INTEGER *saltLength; member
|