| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_pkcs5.data | 169 PBES2 Decrypt (bad params tag) 173 PBES2 Decrypt (bad KDF AlgId: not a sequence) 177 PBES2 Decrypt (bad KDF AlgId: overlong) 189 PBES2 Decrypt (bad PBKDF2 params: overlong) 197 PBES2 Decrypt (bad PBKDF2 params salt: overlong) 205 PBES2 Decrypt (bad PBKDF2 params iter: overlong) 233 PBES2 Decrypt (bad, PBKDF2 params extra data) 241 PBES2 Decrypt (bad enc_scheme_alg: overlong) 245 PBES2 Decrypt (bad enc_scheme_alg: unknown oid) 261 PBES2 Decrypt (bad password) [all …]
|
| A D | test_suite_gcm.camellia.data | 145 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #1 (128-bad) 149 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #2 (128-bad) 153 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #3 (128-bad) 157 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #4 (128-bad) 161 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #5 (128-bad) 165 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #6 (128-bad) 169 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #7 (192-bad) 173 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #8 (192-bad) 177 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #9 (192-bad) 181 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #10 (192-bad) [all …]
|
| A D | test_suite_pk.data | 361 ECDSA verify test vector #2 (bad) 369 EC(DSA) verify test vector #2 (bad) 601 Check pair #2 (EC, bad) 609 Check pair #4 (RSA, bad) 758 PSA attributes for pk: NONE (bad) 764 PSA attributes for pk: RSA usage=0 (bad) 769 PSA attributes for pk: RSA usage=EXPORT (bad) 953 PSA attributes for pk: ECDSA pair DERIVE (bad) 1202 PSA import into PSA: RSA pair to ECC (bad) 1225 PSA import into PSA: ECKEY pair to RSA (bad) [all …]
|
| A D | test_suite_psa_crypto_entropy.data | 34 PSA validate entropy injection: bad, too big 37 PSA validate entropy injection: bad, too small using MBEDTLS_ENTROPY_MIN_PLATFORM 40 PSA validate entropy injection: bad, too small using MBEDTLS_ENTROPY_BLOCK_SIZE
|
| A D | test_suite_bignum_random.data | 222 MPI random bad arguments: min < 0 225 MPI random bad arguments: min = N = 0 228 MPI random bad arguments: min = N = 1 231 MPI random bad arguments: min > N = 0 234 MPI random bad arguments: min > N = 1 237 MPI random bad arguments: min > N = 1, 0 limb in upper bound
|
| A D | test_suite_pkcs1_v15.data | 79 RSAES-V15 decoding: bad first byte 82 RSAES-V15 decoding: bad second byte (0 instead of 2) 85 RSAES-V15 decoding: bad second byte (1 instead of 2)
|
| A D | test_suite_cmac.data | 24 CMAC init #5 AES-224: bad key size 28 CMAC init #6 AES-0: bad key size
|
| A D | test_suite_random.data | 22 # This bad-usage test case currently crashes in the default configuration
|
| A D | test_suite_aes.ctr.data | 5 AES-CTR NIST 128 bad
|
| A D | test_suite_x509parse.data | 1185 X509 CRT verification callback: bad name 1272 X509 CRT ASN1 (inv Certificate, bad tag) 2300 X509 CRT ASN1 (inv Signature, bad tag) 2963 X509 CSR ASN.1 (bad first tag) 2975 X509 CSR ASN.1 (bad CRI: overlong) 3009 X509 CSR ASN.1 (bad attributes: bad tag) 3017 X509 CSR ASN.1 (bad sigAlg: missing) 3025 X509 CSR ASN.1 (bad sigAlg: overlong) 3029 X509 CSR ASN.1 (bad sigAlg: unknown) 3033 X509 CSR ASN.1 (bad sig: missing) [all …]
|
| A D | test_suite_psa_crypto.data | 52 PSA import: bad usage flag 55 PSA import AES: bad key size 1644 PSA hash: bad order function calls 1647 PSA hash verify: bad arguments 1650 PSA hash finish: bad arguments 1787 PSA MAC: bad order function calls 2219 PSA cipher: bad order function calls 2571 CCM*-no-tag encrypt, iv_length = 14, bad 2579 CCM*-no-tag encrypt, iv_length = 12, bad 5233 PSA key derivation setup: bad algorithm [all …]
|
| A D | test_suite_psa_crypto_persistent_key.data | 24 Parse storage: bad magic
|
| /lib/lwip/lwip/src/netif/ppp/ |
| A D | lcp.c | 1110 goto bad; in lcp_ackci() 1112 bad: in lcp_ackci() 1309 goto bad; in lcp_nakci() 1488 goto bad; in lcp_nakci() 1498 goto bad; in lcp_nakci() 1516 goto bad; in lcp_nakci() 1521 goto bad; in lcp_nakci() 1526 goto bad; in lcp_nakci() 1578 bad: in lcp_nakci() 1800 goto bad; in lcp_rejci() [all …]
|
| A D | ipcp.c | 1058 goto bad; in ipcp_ackci() 1061 bad: in ipcp_ackci() 1256 goto bad; in ipcp_nakci() 1263 goto bad; in ipcp_nakci() 1277 goto bad; in ipcp_nakci() 1290 goto bad; in ipcp_nakci() 1298 goto bad; in ipcp_nakci() 1309 goto bad; in ipcp_nakci() 1331 bad: in ipcp_nakci() 1481 goto bad; in ipcp_rejci() [all …]
|
| A D | ipv6cp.c | 617 goto bad; \ 622 goto bad; \ 654 goto bad; 657 bad: 754 goto bad; 762 goto bad; 768 goto bad; 787 goto bad; 797 bad: 862 goto bad; [all …]
|
| A D | vj.c | 517 goto bad; in vj_uncompress_tcp() 601 goto bad; in vj_uncompress_tcp() 625 goto bad; in vj_uncompress_tcp() 642 goto bad; in vj_uncompress_tcp() 648 goto bad; in vj_uncompress_tcp() 668 goto bad; in vj_uncompress_tcp() 680 bad: in vj_uncompress_tcp()
|
| A D | chap_ms.c | 262 goto bad; in chapms_verify_response() 268 goto bad; in chapms_verify_response() 290 bad: in chapms_verify_response() 309 goto bad; /* not even the right length */ in chapms2_verify_response() 346 bad: in chapms2_verify_response()
|
| /lib/mbedtls/external/mbedtls/library/ |
| A D | cipher.c | 854 mbedtls_ct_condition_t bad = mbedtls_ct_uint_gt(padding_len, input_len); in get_pkcs_padding() local 855 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_eq(padding_len, 0)); in get_pkcs_padding() 863 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_and(in_padding, different)); in get_pkcs_padding() 866 return mbedtls_ct_error_if_else_0(bad, MBEDTLS_ERR_CIPHER_INVALID_PADDING); in get_pkcs_padding() 894 mbedtls_ct_condition_t bad = MBEDTLS_CT_TRUE; in get_one_and_zeros_padding() local 905 bad = mbedtls_ct_bool_if(hit_first_nonzero, mbedtls_ct_uint_ne(input[i], 0x80), bad); in get_one_and_zeros_padding() 910 return mbedtls_ct_error_if_else_0(bad, MBEDTLS_ERR_CIPHER_INVALID_PADDING); in get_one_and_zeros_padding() 935 mbedtls_ct_condition_t bad; in get_zeros_and_len_padding() local 945 bad = mbedtls_ct_uint_gt(padding_len, input_len); in get_zeros_and_len_padding() 946 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_eq(padding_len, 0)); in get_zeros_and_len_padding() [all …]
|
| A D | rsa.c | 462 mbedtls_ct_condition_t bad; in mbedtls_ct_rsaes_pkcs1_v15_unpadding() local 472 bad = mbedtls_ct_bool(input[0]); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 477 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_ne(input[1], MBEDTLS_RSA_CRYPT)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 489 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_not(pad_done)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 492 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_gt(8, pad_count)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 502 bad, (unsigned) plaintext_max_size, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 516 bad, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 1927 mbedtls_ct_condition_t bad, in_padding; in mbedtls_rsa_rsaes_oaep_decrypt() local 1993 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool(mbedtls_ct_memcmp(lhash, p, hlen))); in mbedtls_rsa_rsaes_oaep_decrypt() 2006 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_ne(*p++, 0x01)); in mbedtls_rsa_rsaes_oaep_decrypt() [all …]
|
| /lib/ |
| A D | oid_registry.c | 119 goto bad; in sprint_oid() 137 goto bad; in sprint_oid() 152 bad: in sprint_oid()
|
| /lib/mbedtls/external/mbedtls/tests/data_files/base64/ |
| A D | def_bad_b64.txt | 1 // Context with added extra 'A' before '==' add the end to simulate bad length of base64 code
|
| /lib/mbedtls/external/mbedtls/ |
| A D | .pylintrc | 11 # [bad-builtin] 12 bad-functions=input
|
| /lib/mbedtls/external/mbedtls/docs/ |
| A D | redirects.yaml | 6 # made available in PR jobs - preventing bad actors from crafting PRs to
|
| /lib/mbedtls/external/mbedtls/scripts/ |
| A D | ci.requirements.txt | 22 # For building `tests/data_files/server9-bad-saltlen.crt` and check python
|
| /lib/mbedtls/external/mbedtls/docs/architecture/psa-migration/ |
| A D | psa-limitations.md | 210 Files with "bad" in the name are expected to be invalid and rejected in tests. 214 server9-bad-mgfhash.crt (announcing mgf1(sha224), signed with another mgf) 218 server9-bad-saltlen.crt (announcing saltlen = 0xDE, signed with another len)
|