Home
last modified time | relevance | path

Searched refs:padding (Results 1 – 25 of 32) sorted by relevance

12

/mbedtls/tests/suites/
A Dtest_suite_cipher.padding.data64 Check PKCS padding #5 (null padding)
68 Check PKCS padding #6 (too few padding bytes)
72 Check PKCS padding #7 (non-uniform padding bytes #1)
76 Check PKCS padding #7 (non-uniform padding bytes #2)
80 Check PKCS padding #7 (non-uniform padding bytes #3)
84 Check PKCS padding #7 (non-uniform padding bytes #4)
88 Check PKCS padding #7 (non-uniform padding bytes #5)
92 Check PKCS padding #7 (non-uniform padding bytes #6)
96 Check PKCS padding #7 (non-uniform padding bytes #7)
100 Check PKCS padding #7 (non-uniform padding bytes #8)
[all …]
A Dtest_suite_cipher.des.data273 DES Try encrypting 1 bytes with no padding
277 DES Try encrypting 2 bytes with no padding
281 DES Try encrypting 7 bytes with no padding
285 DES Try encrypting 9 bytes with no padding
289 DES Try encrypting 15 bytes with no padding
293 DES Try encrypting 17 bytes with no padding
297 DES Try encrypting 31 bytes with no padding
301 DES Try encrypting 33 bytes with no padding
305 DES Try encrypting 47 bytes with no padding
617 Check set padding - DES
[all …]
A Dtest_suite_cipher.aes.data9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding
13 AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding
17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding
265 AES-128 CBC - Try encrypting 1 bytes with no padding
269 AES-128 CBC - Try encrypting 2 bytes with no padding
273 AES-128 CBC - Try encrypting 7 bytes with no padding
277 AES-128 CBC - Try encrypting 8 bytes with no padding
281 AES-128 CBC - Try encrypting 9 bytes with no padding
2261 Check set padding - 128 bit key
2265 Check set padding - 192 bit key
[all …]
A Dtest_suite_cipher.camellia.data265 CAMELLIA Try encrypting 1 bytes with no padding
269 CAMELLIA Try encrypting 2 bytes with no padding
273 CAMELLIA Try encrypting 7 bytes with no padding
277 CAMELLIA Try encrypting 8 bytes with no padding
281 CAMELLIA Try encrypting 9 bytes with no padding
285 CAMELLIA Try encrypting 15 bytes with no padding
289 CAMELLIA Try encrypting 17 bytes with no padding
293 CAMELLIA Try encrypting 31 bytes with no padding
1105 Check set padding - 128 bit key
1109 Check set padding - 192 bit key
[all …]
A Dtest_suite_ssl_decrypt.function129 * of padding and MAC.
136 * - if it's -1, the plaintext length is 0 and minimal padding is applied
137 * - if it's -2, the plaintext length is 0 and maximal padding is applied
139 * it's the length of the rest of the padding, that is, excluding the
167 /* Determine padding/plaintext length */
173 /* Minimal padding
177 /* Maximal padding? */
184 /* Minimal non-zero plaintext_length giving desired padding.
218 * Prepare a pre-encryption record (with MAC and padding), and save it.
278 * (Start the loop with correct padding, just to double-check that record
[all …]
A Dtest_suite_pkcs12.data49 PBE Encrypt, pad = 8 (PKCS7 padding disabled)
65 PBE Decrypt, (Invalid padding & PKCS7 padding disabled)
69 PBE Decrypt, (Invalid padding & PKCS7 padding enabled)
A Dtest_suite_pem.data58 # length read from the decoded ASN.1 data (i.e. extra padding, if any, is ignored).
63 # The text "hello world" together with some invalid padding data is encoded
64 # with AES-128-CBC in order to test padding validation.
70 PEM read (AES-128-CBC, invalid padding data)
77 PEM read (AES-128-CBC, padding data is larger than AES block length)
84 PEM read (DES-CBC, padding data is larger than DES block length)
A Dtest_suite_pkcs5.data121 PBES2 Encrypt, pad=6 (PKCS7 padding disabled)
125 PBES2 Encrypt, pad=8 (PKCS7 padding disabled)
149 PBES2 Decrypt (Invalid padding & PKCS7 padding disabled)
153 PBES2 Decrypt (Invalid padding & PKCS7 padding enabled)
A Dtest_suite_pkcs1_v15.data88 RSAES-V15 decoding: padding too short (0)
91 RSAES-V15 decoding: padding too short (7)
94 RSAES-V15 decoding: unfinished padding
A Dtest_suite_pk.function1085 void pk_rsa_verify_test_vec(data_t *message_str, int padding, int digest,
1108 if (padding >= 0) {
1193 /* Mbed TLS distinguishes "invalid padding" from "valid padding but
1437 void pk_rsa_encrypt_decrypt_test(data_t *message, int mod, int padding,
1462 mbedtls_rsa_set_padding(rsa, padding, MBEDTLS_MD_SHA1);
1482 mbedtls_rsa_set_padding(rsa, padding, MBEDTLS_MD_SHA1);
1554 /* set padding mode */
1555 if (padding >= 0) {
1556 TEST_EQUAL(mbedtls_rsa_set_padding(rsa, padding, md_alg), 0);
1617 /* Set padding mode */
[all …]
A Dtest_suite_cipher.aria.data341 Check set padding - 128 bit key
345 Check set padding - 192 bit key
349 Check set padding - 256 bit key
A Dtest_suite_platform_printf.function55 /* We assume that long has no padding bits! */
A Dtest_suite_bignum_random.function182 /* This may theoretically fail on rare platforms with padding in
249 /* This may theoretically fail on rare platforms with padding in
A Dtest_suite_rsa.data12 # Good padding but wrong hash
37 # Bad padding after performing the public key operation
148 RSA PKCS1 Verify v1.5 padding too short
/mbedtls/library/
A Drsa.c956 ctx->padding = MBEDTLS_RSA_PKCS_V15; in mbedtls_rsa_init()
973 switch (padding) { in mbedtls_rsa_set_padding()
988 if ((padding == MBEDTLS_RSA_PKCS_V21) && in mbedtls_rsa_set_padding()
997 ctx->padding = padding; in mbedtls_rsa_set_padding()
1008 return ctx->padding; in mbedtls_rsa_get_padding_mode()
1893 switch (ctx->padding) { in mbedtls_rsa_pkcs1_encrypt()
1935 if (ctx->padding != MBEDTLS_RSA_PKCS_V21) { in mbedtls_rsa_rsaes_oaep_decrypt()
2091 switch (ctx->padding) { in mbedtls_rsa_pkcs1_decrypt()
2507 switch (ctx->padding) { in mbedtls_rsa_pkcs1_sign()
2751 switch (ctx->padding) { in mbedtls_rsa_pkcs1_verify()
[all …]
A Dpkcs12.c211 mbedtls_cipher_padding_t padding = MBEDTLS_PADDING_PKCS7; in mbedtls_pkcs12_pbe_ext() local
219 padding = MBEDTLS_PADDING_NONE; in mbedtls_pkcs12_pbe_ext()
222 if ((ret = mbedtls_cipher_set_padding_mode(&cipher_ctx, padding)) != 0) { in mbedtls_pkcs12_pbe_ext()
A Dpkcs5.c240 mbedtls_cipher_padding_t padding = MBEDTLS_PADDING_PKCS7; in mbedtls_pkcs5_pbes2_ext() local
248 padding = MBEDTLS_PADDING_NONE; in mbedtls_pkcs5_pbes2_ext()
251 if ((ret = mbedtls_cipher_set_padding_mode(&cipher_ctx, padding)) != 0) { in mbedtls_pkcs5_pbes2_ext()
A Dssl_msg.c982 size_t padding = in mbedtls_ssl_encrypt_buf() local
989 padding) != 0) { in mbedtls_ssl_encrypt_buf()
1006 size_t padding = in mbedtls_ssl_encrypt_buf() local
1020 padding) != 0) { in mbedtls_ssl_encrypt_buf()
/mbedtls/include/mbedtls/
A Drsa.h111 int MBEDTLS_PRIVATE(padding); /*!< Selects padding mode:
175 int mbedtls_rsa_set_padding(mbedtls_rsa_context *ctx, int padding,
/mbedtls/docs/
A D3.0-migration-guide.md363 ### Remove the padding parameters from `mbedtls_rsa_init()`
373 To choose the padding type when initializing a context, instead of
376 mbedtls_rsa_init(ctx, padding, hash_id);
383 mbedtls_rsa_set_padding(ctx, padding, hash_id);
386 To use PKCS#1 v1.5 padding, instead of
735 This change affects users who modified the default `mbedtls_config.h` padding granularity
740 they used exactly the same padding mechanism and hence their respective padding
/mbedtls/docs/architecture/psa-migration/
A Dpsa-legacy-bridges.md284 …* For an RSA key with the `MBEDTLS_RSA_PKCS_V15` padding mode, the algorithm policy is `PSA_ALG_RS…
285 …* For an RSA key with the `MBEDTLS_RSA_PKCS_V21` padding mode, the algorithm policy is `PSA_ALG_RS…
313 …s of the original key's policy. The original key's policy determines the output key's padding mode.
314 …mary algorithm policy is how one conveys the same information as RSA key padding information in th…
A Dmd-cipher-dispatch.md132 * AES, DES or 3DES in CBC mode without padding, decrypt only (!).
137 * In practice: 2DES or 3DES in CBC mode with PKCS7 padding, decrypt only
139 * In principle: any cipher-mode (default padding), passed an
142 no documented restriction but in practice TODO (inc. padding and
148 * 3DES or DES in CBC mode with PKCS7 padding, both encrypt and decrypt.
/mbedtls/
A DChangeLog210 * mbedtls_pem_read_buffer() now performs a check on the padding data of
452 time code, which could allow a padding oracle attack if the attacker
664 to read non-public fields for padding mode and hash id from
4849 * Fix false reject in padding check in ssl_decrypt_buf() for CBC
5095 * Support for zeros-and-length (ANSI X.923) padding, one-and-zeros
5096 (ISO/IEC 7816-4) padding and zero padding in the cipher layer
5392 * Removed timing differences due to bad padding from
5407 ssl_decrypt_buf() due to badly formatted padding
5556 * Removed timing differences due to bad padding from
5995 Daniel Bleichenbacher attack on PKCS#1 v1.5 padding, as well
[all …]
/mbedtls/docs/architecture/
A Dpsa-crypto-implementation-structure.md172 * Tests with invalid data (e.g. wrong size or format, output buffer too small, invalid padding).
A Dtls13-support.md49 | padding | no |

Completed in 59 milliseconds

12