Home
last modified time | relevance | path

Searched refs:bad (Results 1 – 25 of 44) sorted by relevance

12

/lib/mbedtls/external/mbedtls/tests/suites/
A Dtest_suite_pkcs5.data169 PBES2 Decrypt (bad params tag)
173 PBES2 Decrypt (bad KDF AlgId: not a sequence)
177 PBES2 Decrypt (bad KDF AlgId: overlong)
189 PBES2 Decrypt (bad PBKDF2 params: overlong)
197 PBES2 Decrypt (bad PBKDF2 params salt: overlong)
205 PBES2 Decrypt (bad PBKDF2 params iter: overlong)
233 PBES2 Decrypt (bad, PBKDF2 params extra data)
241 PBES2 Decrypt (bad enc_scheme_alg: overlong)
245 PBES2 Decrypt (bad enc_scheme_alg: unknown oid)
261 PBES2 Decrypt (bad password)
[all …]
A Dtest_suite_gcm.camellia.data145 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #1 (128-bad)
149 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #2 (128-bad)
153 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #3 (128-bad)
157 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #4 (128-bad)
161 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #5 (128-bad)
165 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #6 (128-bad)
169 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #7 (192-bad)
173 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #8 (192-bad)
177 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #9 (192-bad)
181 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #10 (192-bad)
[all …]
A Dtest_suite_pk.data361 ECDSA verify test vector #2 (bad)
369 EC(DSA) verify test vector #2 (bad)
601 Check pair #2 (EC, bad)
609 Check pair #4 (RSA, bad)
758 PSA attributes for pk: NONE (bad)
764 PSA attributes for pk: RSA usage=0 (bad)
769 PSA attributes for pk: RSA usage=EXPORT (bad)
953 PSA attributes for pk: ECDSA pair DERIVE (bad)
1202 PSA import into PSA: RSA pair to ECC (bad)
1225 PSA import into PSA: ECKEY pair to RSA (bad)
[all …]
A Dtest_suite_psa_crypto_entropy.data34 PSA validate entropy injection: bad, too big
37 PSA validate entropy injection: bad, too small using MBEDTLS_ENTROPY_MIN_PLATFORM
40 PSA validate entropy injection: bad, too small using MBEDTLS_ENTROPY_BLOCK_SIZE
A Dtest_suite_bignum_random.data222 MPI random bad arguments: min < 0
225 MPI random bad arguments: min = N = 0
228 MPI random bad arguments: min = N = 1
231 MPI random bad arguments: min > N = 0
234 MPI random bad arguments: min > N = 1
237 MPI random bad arguments: min > N = 1, 0 limb in upper bound
A Dtest_suite_pkcs1_v15.data79 RSAES-V15 decoding: bad first byte
82 RSAES-V15 decoding: bad second byte (0 instead of 2)
85 RSAES-V15 decoding: bad second byte (1 instead of 2)
A Dtest_suite_cmac.data24 CMAC init #5 AES-224: bad key size
28 CMAC init #6 AES-0: bad key size
A Dtest_suite_random.data22 # This bad-usage test case currently crashes in the default configuration
A Dtest_suite_aes.ctr.data5 AES-CTR NIST 128 bad
A Dtest_suite_x509parse.data1185 X509 CRT verification callback: bad name
1272 X509 CRT ASN1 (inv Certificate, bad tag)
2300 X509 CRT ASN1 (inv Signature, bad tag)
2963 X509 CSR ASN.1 (bad first tag)
2975 X509 CSR ASN.1 (bad CRI: overlong)
3009 X509 CSR ASN.1 (bad attributes: bad tag)
3017 X509 CSR ASN.1 (bad sigAlg: missing)
3025 X509 CSR ASN.1 (bad sigAlg: overlong)
3029 X509 CSR ASN.1 (bad sigAlg: unknown)
3033 X509 CSR ASN.1 (bad sig: missing)
[all …]
A Dtest_suite_psa_crypto.data52 PSA import: bad usage flag
55 PSA import AES: bad key size
1644 PSA hash: bad order function calls
1647 PSA hash verify: bad arguments
1650 PSA hash finish: bad arguments
1787 PSA MAC: bad order function calls
2219 PSA cipher: bad order function calls
2571 CCM*-no-tag encrypt, iv_length = 14, bad
2579 CCM*-no-tag encrypt, iv_length = 12, bad
5233 PSA key derivation setup: bad algorithm
[all …]
A Dtest_suite_psa_crypto_persistent_key.data24 Parse storage: bad magic
/lib/lwip/lwip/src/netif/ppp/
A Dlcp.c1110 goto bad; in lcp_ackci()
1112 bad: in lcp_ackci()
1309 goto bad; in lcp_nakci()
1488 goto bad; in lcp_nakci()
1498 goto bad; in lcp_nakci()
1516 goto bad; in lcp_nakci()
1521 goto bad; in lcp_nakci()
1526 goto bad; in lcp_nakci()
1578 bad: in lcp_nakci()
1800 goto bad; in lcp_rejci()
[all …]
A Dipcp.c1058 goto bad; in ipcp_ackci()
1061 bad: in ipcp_ackci()
1256 goto bad; in ipcp_nakci()
1263 goto bad; in ipcp_nakci()
1277 goto bad; in ipcp_nakci()
1290 goto bad; in ipcp_nakci()
1298 goto bad; in ipcp_nakci()
1309 goto bad; in ipcp_nakci()
1331 bad: in ipcp_nakci()
1481 goto bad; in ipcp_rejci()
[all …]
A Dipv6cp.c617 goto bad; \
622 goto bad; \
654 goto bad;
657 bad:
754 goto bad;
762 goto bad;
768 goto bad;
787 goto bad;
797 bad:
862 goto bad;
[all …]
A Dvj.c517 goto bad; in vj_uncompress_tcp()
601 goto bad; in vj_uncompress_tcp()
625 goto bad; in vj_uncompress_tcp()
642 goto bad; in vj_uncompress_tcp()
648 goto bad; in vj_uncompress_tcp()
668 goto bad; in vj_uncompress_tcp()
680 bad: in vj_uncompress_tcp()
A Dchap_ms.c262 goto bad; in chapms_verify_response()
268 goto bad; in chapms_verify_response()
290 bad: in chapms_verify_response()
309 goto bad; /* not even the right length */ in chapms2_verify_response()
346 bad: in chapms2_verify_response()
/lib/mbedtls/external/mbedtls/library/
A Dcipher.c854 mbedtls_ct_condition_t bad = mbedtls_ct_uint_gt(padding_len, input_len); in get_pkcs_padding() local
855 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_eq(padding_len, 0)); in get_pkcs_padding()
863 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_and(in_padding, different)); in get_pkcs_padding()
866 return mbedtls_ct_error_if_else_0(bad, MBEDTLS_ERR_CIPHER_INVALID_PADDING); in get_pkcs_padding()
894 mbedtls_ct_condition_t bad = MBEDTLS_CT_TRUE; in get_one_and_zeros_padding() local
905 bad = mbedtls_ct_bool_if(hit_first_nonzero, mbedtls_ct_uint_ne(input[i], 0x80), bad); in get_one_and_zeros_padding()
910 return mbedtls_ct_error_if_else_0(bad, MBEDTLS_ERR_CIPHER_INVALID_PADDING); in get_one_and_zeros_padding()
935 mbedtls_ct_condition_t bad; in get_zeros_and_len_padding() local
945 bad = mbedtls_ct_uint_gt(padding_len, input_len); in get_zeros_and_len_padding()
946 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_eq(padding_len, 0)); in get_zeros_and_len_padding()
[all …]
A Drsa.c462 mbedtls_ct_condition_t bad; in mbedtls_ct_rsaes_pkcs1_v15_unpadding() local
472 bad = mbedtls_ct_bool(input[0]); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
477 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_ne(input[1], MBEDTLS_RSA_CRYPT)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
489 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_not(pad_done)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
492 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_gt(8, pad_count)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
502 bad, (unsigned) plaintext_max_size, in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
516 bad, in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
1927 mbedtls_ct_condition_t bad, in_padding; in mbedtls_rsa_rsaes_oaep_decrypt() local
1993 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool(mbedtls_ct_memcmp(lhash, p, hlen))); in mbedtls_rsa_rsaes_oaep_decrypt()
2006 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_ne(*p++, 0x01)); in mbedtls_rsa_rsaes_oaep_decrypt()
[all …]
/lib/
A Doid_registry.c119 goto bad; in sprint_oid()
137 goto bad; in sprint_oid()
152 bad: in sprint_oid()
/lib/mbedtls/external/mbedtls/tests/data_files/base64/
A Ddef_bad_b64.txt1 // Context with added extra 'A' before '==' add the end to simulate bad length of base64 code
/lib/mbedtls/external/mbedtls/
A D.pylintrc11 # [bad-builtin]
12 bad-functions=input
/lib/mbedtls/external/mbedtls/docs/
A Dredirects.yaml6 # made available in PR jobs - preventing bad actors from crafting PRs to
/lib/mbedtls/external/mbedtls/scripts/
A Dci.requirements.txt22 # For building `tests/data_files/server9-bad-saltlen.crt` and check python
/lib/mbedtls/external/mbedtls/docs/architecture/psa-migration/
A Dpsa-limitations.md210 Files with "bad" in the name are expected to be invalid and rejected in tests.
214 server9-bad-mgfhash.crt (announcing mgf1(sha224), signed with another mgf)
218 server9-bad-saltlen.crt (announcing saltlen = 0xDE, signed with another len)

Completed in 88 milliseconds

12