| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_cipher.padding.data | 64 Check PKCS padding #5 (null padding) 68 Check PKCS padding #6 (too few padding bytes) 72 Check PKCS padding #7 (non-uniform padding bytes #1) 76 Check PKCS padding #7 (non-uniform padding bytes #2) 80 Check PKCS padding #7 (non-uniform padding bytes #3) 84 Check PKCS padding #7 (non-uniform padding bytes #4) 88 Check PKCS padding #7 (non-uniform padding bytes #5) 92 Check PKCS padding #7 (non-uniform padding bytes #6) 96 Check PKCS padding #7 (non-uniform padding bytes #7) 100 Check PKCS padding #7 (non-uniform padding bytes #8) [all …]
|
| A D | test_suite_cipher.des.data | 273 DES Try encrypting 1 bytes with no padding 277 DES Try encrypting 2 bytes with no padding 281 DES Try encrypting 7 bytes with no padding 285 DES Try encrypting 9 bytes with no padding 289 DES Try encrypting 15 bytes with no padding 293 DES Try encrypting 17 bytes with no padding 297 DES Try encrypting 31 bytes with no padding 301 DES Try encrypting 33 bytes with no padding 305 DES Try encrypting 47 bytes with no padding 617 Check set padding - DES [all …]
|
| A D | test_suite_cipher.aes.data | 9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding 13 AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding 17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding 265 AES-128 CBC - Try encrypting 1 bytes with no padding 269 AES-128 CBC - Try encrypting 2 bytes with no padding 273 AES-128 CBC - Try encrypting 7 bytes with no padding 277 AES-128 CBC - Try encrypting 8 bytes with no padding 281 AES-128 CBC - Try encrypting 9 bytes with no padding 2261 Check set padding - 128 bit key 2265 Check set padding - 192 bit key [all …]
|
| A D | test_suite_cipher.camellia.data | 265 CAMELLIA Try encrypting 1 bytes with no padding 269 CAMELLIA Try encrypting 2 bytes with no padding 273 CAMELLIA Try encrypting 7 bytes with no padding 277 CAMELLIA Try encrypting 8 bytes with no padding 281 CAMELLIA Try encrypting 9 bytes with no padding 285 CAMELLIA Try encrypting 15 bytes with no padding 289 CAMELLIA Try encrypting 17 bytes with no padding 293 CAMELLIA Try encrypting 31 bytes with no padding 1105 Check set padding - 128 bit key 1109 Check set padding - 192 bit key [all …]
|
| A D | test_suite_ssl_decrypt.function | 129 * of padding and MAC. 136 * - if it's -1, the plaintext length is 0 and minimal padding is applied 137 * - if it's -2, the plaintext length is 0 and maximal padding is applied 139 * it's the length of the rest of the padding, that is, excluding the 167 /* Determine padding/plaintext length */ 173 /* Minimal padding 177 /* Maximal padding? */ 184 /* Minimal non-zero plaintext_length giving desired padding. 218 * Prepare a pre-encryption record (with MAC and padding), and save it. 278 * (Start the loop with correct padding, just to double-check that record [all …]
|
| A D | test_suite_pkcs12.data | 49 PBE Encrypt, pad = 8 (PKCS7 padding disabled) 65 PBE Decrypt, (Invalid padding & PKCS7 padding disabled) 69 PBE Decrypt, (Invalid padding & PKCS7 padding enabled)
|
| A D | test_suite_pem.data | 58 # length read from the decoded ASN.1 data (i.e. extra padding, if any, is ignored). 63 # The text "hello world" together with some invalid padding data is encoded 64 # with AES-128-CBC in order to test padding validation. 70 PEM read (AES-128-CBC, invalid padding data) 77 PEM read (AES-128-CBC, padding data is larger than AES block length) 84 PEM read (DES-CBC, padding data is larger than DES block length)
|
| A D | test_suite_pkcs1_v15.data | 88 RSAES-V15 decoding: padding too short (0) 91 RSAES-V15 decoding: padding too short (7) 94 RSAES-V15 decoding: unfinished padding
|
| A D | test_suite_pkcs5.data | 121 PBES2 Encrypt, pad=6 (PKCS7 padding disabled) 125 PBES2 Encrypt, pad=8 (PKCS7 padding disabled) 149 PBES2 Decrypt (Invalid padding & PKCS7 padding disabled) 153 PBES2 Decrypt (Invalid padding & PKCS7 padding enabled)
|
| A D | test_suite_pk.function | 1085 void pk_rsa_verify_test_vec(data_t *message_str, int padding, int digest, 1108 if (padding >= 0) { 1193 /* Mbed TLS distinguishes "invalid padding" from "valid padding but 1437 void pk_rsa_encrypt_decrypt_test(data_t *message, int mod, int padding, 1462 mbedtls_rsa_set_padding(rsa, padding, MBEDTLS_MD_SHA1); 1482 mbedtls_rsa_set_padding(rsa, padding, MBEDTLS_MD_SHA1); 1554 /* set padding mode */ 1555 if (padding >= 0) { 1556 TEST_EQUAL(mbedtls_rsa_set_padding(rsa, padding, md_alg), 0); 1617 /* Set padding mode */ [all …]
|
| A D | test_suite_platform_printf.function | 55 /* We assume that long has no padding bits! */
|
| A D | test_suite_cipher.aria.data | 341 Check set padding - 128 bit key 345 Check set padding - 192 bit key 349 Check set padding - 256 bit key
|
| /lib/libavb/ |
| A D | avb_crypto.c | 311 {.padding = NULL, .padding_len = 0, .hash_len = 0}, 313 {.padding = padding_RSA2048_SHA256, 317 {.padding = padding_RSA4096_SHA256, 321 {.padding = padding_RSA8192_SHA256, 325 {.padding = padding_RSA2048_SHA512, 329 {.padding = padding_RSA4096_SHA512, 333 {.padding = padding_RSA8192_SHA512,
|
| A D | avb_rsa.c | 214 const uint8_t* padding, in avb_rsa_verify() argument 220 if (key == NULL || sig == NULL || hash == NULL || padding == NULL) { in avb_rsa_verify() 255 if (avb_safe_memcmp(buf, padding, padding_num_bytes)) { in avb_rsa_verify()
|
| A D | avb_rsa.h | 47 const uint8_t* padding,
|
| A D | avb_crypto.h | 98 const uint8_t* padding; member
|
| A D | avb_vbmeta_image.c | 200 algorithm->padding, in avb_vbmeta_image_verify()
|
| /lib/mbedtls/external/mbedtls/library/ |
| A D | rsa.c | 956 ctx->padding = MBEDTLS_RSA_PKCS_V15; in mbedtls_rsa_init() 973 switch (padding) { in mbedtls_rsa_set_padding() 988 if ((padding == MBEDTLS_RSA_PKCS_V21) && in mbedtls_rsa_set_padding() 997 ctx->padding = padding; in mbedtls_rsa_set_padding() 1008 return ctx->padding; in mbedtls_rsa_get_padding_mode() 1893 switch (ctx->padding) { in mbedtls_rsa_pkcs1_encrypt() 1935 if (ctx->padding != MBEDTLS_RSA_PKCS_V21) { in mbedtls_rsa_rsaes_oaep_decrypt() 2091 switch (ctx->padding) { in mbedtls_rsa_pkcs1_decrypt() 2507 switch (ctx->padding) { in mbedtls_rsa_pkcs1_sign() 2751 switch (ctx->padding) { in mbedtls_rsa_pkcs1_verify() [all …]
|
| A D | pkcs12.c | 211 mbedtls_cipher_padding_t padding = MBEDTLS_PADDING_PKCS7; in mbedtls_pkcs12_pbe_ext() local 219 padding = MBEDTLS_PADDING_NONE; in mbedtls_pkcs12_pbe_ext() 222 if ((ret = mbedtls_cipher_set_padding_mode(&cipher_ctx, padding)) != 0) { in mbedtls_pkcs12_pbe_ext()
|
| A D | pkcs5.c | 240 mbedtls_cipher_padding_t padding = MBEDTLS_PADDING_PKCS7; in mbedtls_pkcs5_pbes2_ext() local 248 padding = MBEDTLS_PADDING_NONE; in mbedtls_pkcs5_pbes2_ext() 251 if ((ret = mbedtls_cipher_set_padding_mode(&cipher_ctx, padding)) != 0) { in mbedtls_pkcs5_pbes2_ext()
|
| /lib/rsa/ |
| A D | rsa-verify.c | 334 struct padding_algo *padding = info->padding; in rsa_verify_key() local 337 if (!prop || !sig || !hash || !checksum || !padding) in rsa_verify_key() 373 ret = padding->verify(info, buf, key_len, hash, hash_len); in rsa_verify_key()
|
| /lib/mbedtls/external/mbedtls/include/mbedtls/ |
| A D | rsa.h | 111 int MBEDTLS_PRIVATE(padding); /*!< Selects padding mode: 175 int mbedtls_rsa_set_padding(mbedtls_rsa_context *ctx, int padding,
|
| /lib/lwip/lwip/src/include/lwip/prot/ |
| A D | ethernet.h | 78 PACK_STRUCT_FLD_8(u8_t padding[ETH_PAD_SIZE]);
|
| /lib/crypto/ |
| A D | public_key.c | 83 info.padding = image_get_padding_algo("pkcs-1.5"); in public_key_verify_signature()
|
| /lib/mbedtls/external/mbedtls/docs/ |
| A D | 3.0-migration-guide.md | 363 ### Remove the padding parameters from `mbedtls_rsa_init()` 373 To choose the padding type when initializing a context, instead of 376 mbedtls_rsa_init(ctx, padding, hash_id); 383 mbedtls_rsa_set_padding(ctx, padding, hash_id); 386 To use PKCS#1 v1.5 padding, instead of 735 This change affects users who modified the default `mbedtls_config.h` padding granularity 740 they used exactly the same padding mechanism and hence their respective padding
|