Home
last modified time | relevance | path

Searched refs:saltLength (Results 1 - 21 of 21) sorted by relevance

/third_party/node/test/fixtures/crypto/
H A Drsa_pss.js85 algorithm: { name: 'RSA-PSS', saltLength: 0 },
93 algorithm: { name: 'RSA-PSS', saltLength: 0 },
101 algorithm: { name: 'RSA-PSS', saltLength: 0 },
109 algorithm: { name: 'RSA-PSS', saltLength: 0 },
117 algorithm: { name: 'RSA-PSS', saltLength: 20 },
125 algorithm: { name: 'RSA-PSS', saltLength: 32 },
133 algorithm: { name: 'RSA-PSS', saltLength: 48 },
141 algorithm: { name: 'RSA-PSS', saltLength: 64 },
/third_party/node/test/fixtures/wpt/WebCryptoAPI/sign_verify/
H A Drsa_pss_vectors.js48 algorithm: {name: "RSA-PSS", saltLength: 0},
61 algorithm: {name: "RSA-PSS", saltLength: 0},
74 algorithm: {name: "RSA-PSS", saltLength: 0},
87 algorithm: {name: "RSA-PSS", saltLength: 0},
100 algorithm: {name: "RSA-PSS", saltLength: 20},
113 algorithm: {name: "RSA-PSS", saltLength: 32},
126 algorithm: {name: "RSA-PSS", saltLength: 48},
139 algorithm: {name: "RSA-PSS", saltLength: 64},
H A Drsa.js159 const isDeterministic = !("saltLength" in vector.algorithm) || vector.algorithm.saltLength == 0;
309 // [RSA-PSS] Verification should fail with wrong saltLength
315 const saltLength = vector.algorithm.saltLength === 32 ? 48 : 32;
316 var operation = subtle.verify({ ...vector.algorithm, saltLength }, vector.publicKey, vector.signature, vector.plaintext)
324 }, vector.name + " verification failure with wrong saltLength");
331 }, "importVectorKeys step: " + vector.name + " verification failure with wrong saltLength");
/third_party/node/test/parallel/
H A Dtest-crypto-sign-verify.js87 saltLength: null,
92 message: "The property 'options.saltLength' is invalid. Received null",
159 function getEffectiveSaltLength(saltLength) {
160 switch (saltLength) {
166 return saltLength;
197 saltLength: signSaltLength
204 saltLength: signSaltLength
214 saltLength: signSaltLength
219 saltLength: signSaltLength
232 saltLength
[all...]
H A Dtest-crypto-key-objects.js603 for (const saltLength of [undefined, 8, 10, 12, 16, 18, 20]) {
606 .sign({ key, saltLength });
611 .verify({ key: pkey, saltLength }, signature);
648 saltLength: 20
684 for (const saltLength of [8, 10, 12]) {
686 createSign('sha1').sign({ key, saltLength });
691 for (const saltLength of [undefined, 16, 18, 20]) {
694 .sign({ key, saltLength });
699 .verify({ key: pkey, saltLength }, signature);
723 saltLength
[all...]
H A Dtest-crypto-keygen.js638 saltLength: 2147483648,
645 message: 'The value of "options.saltLength" is out of range. ' +
653 saltLength: -1,
660 message: 'The value of "options.saltLength" is out of range. ' +
752 saltLength: 16,
768 saltLength: 16,
809 saltLength: 16,
816 saltLength: 16,
H A Dtest-crypto-async-sign-verify.js72 // RSA w/ PSS_PADDING and default saltLength
78 saltLength: crypto.constants.RSA_PSS_SALTLEN_MAX_SIGN
85 saltLength: crypto.constants.RSA_PSS_SALTLEN_DIGEST
H A Dtest-webcrypto-webidl.js334 const good = { name: 'RSA-PSS', saltLength: 20 }; property
337 assert.throws(() => converters.RsaPssParams({ ...good, saltLength: undefined }, opts), {
340 message: `${prefix}: ${context} can not be converted to 'RsaPssParams' because 'saltLength' is required in 'RsaPssParams'.`,
/third_party/node/lib/internal/crypto/
H A Dkeygen.js204 hash, mgf1Hash, hashAlgorithm, mgf1HashAlgorithm, saltLength,
209 if (saltLength !== undefined)
210 validateInt32(saltLength, 'options.saltLength', 0);
245 saltLength,
H A Drsa.js309 function rsaSignVerify(key, data, { saltLength }, signature) {
313 // TODO(@jasnell): Validate maximum size of saltLength
316 validateInt32(saltLength, 'algorithm.saltLength', -2);
334 saltLength,
/third_party/node/deps/openssl/openssl/crypto/rsa/
H A Drsa_ameth.c272 if (pss->saltLength) { in rsa_pss_param_print()
273 if (i2a_ASN1_INTEGER(bp, pss->saltLength) <= 0) in rsa_pss_param_print()
484 pss->saltLength = ASN1_INTEGER_new(); in ossl_rsa_pss_params_create()
485 if (pss->saltLength == NULL) in ossl_rsa_pss_params_create()
487 if (!ASN1_INTEGER_set(pss->saltLength, saltlen)) in ossl_rsa_pss_params_create()
H A Drsa_asn1.c90 ASN1_EXP_OPT(RSA_PSS_PARAMS, saltLength, ASN1_INTEGER,2),
H A Drsa_backend.c510 if (pss->saltLength) in ossl_rsa_pss_get_param_unverified()
511 *psaltlen = ASN1_INTEGER_get(pss->saltLength); in ossl_rsa_pss_get_param_unverified()
/third_party/openssl/crypto/rsa/
H A Drsa_ameth.c269 if (pss->saltLength) { in rsa_pss_param_print()
270 if (i2a_ASN1_INTEGER(bp, pss->saltLength) <= 0) in rsa_pss_param_print()
481 pss->saltLength = ASN1_INTEGER_new(); in ossl_rsa_pss_params_create()
482 if (pss->saltLength == NULL) in ossl_rsa_pss_params_create()
484 if (!ASN1_INTEGER_set(pss->saltLength, saltlen)) in ossl_rsa_pss_params_create()
H A Drsa_asn1.c90 ASN1_EXP_OPT(RSA_PSS_PARAMS, saltLength, ASN1_INTEGER,2),
H A Drsa_backend.c522 if (pss->saltLength) in ossl_rsa_pss_get_param_unverified()
523 *psaltlen = ASN1_INTEGER_get(pss->saltLength); in ossl_rsa_pss_get_param_unverified()
/third_party/node/src/crypto/
H A Dcrypto_rsa.cc612 if (params->saltLength != nullptr) { in GetRsaKeyDetail()
613 if (ASN1_INTEGER_get_int64(&salt_length, params->saltLength) != 1) { in GetRsaKeyDetail()
/third_party/node/test/fixtures/wpt/WebCryptoAPI/wrapKey_unwrapKey/
H A DwrapKey_unwrapKey.https.any.js391 signParams = {name: "RSA-PSS", saltLength: 32 };
/third_party/node/deps/openssl/openssl/include/openssl/
H A Drsa.h318 ASN1_INTEGER *saltLength; member
/third_party/openssl/include/openssl/
H A Drsa.h318 ASN1_INTEGER *saltLength; member
/third_party/openssl/ohos_lite/include/openssl/
H A Drsa.h286 ASN1_INTEGER *saltLength; member

Completed in 14 milliseconds