/mbedtls-latest/tests/suites/ |
D | test_suite_pkcs5.data | 169 PBES2 Decrypt (bad params tag) 173 PBES2 Decrypt (bad KDF AlgId: not a sequence) 177 PBES2 Decrypt (bad KDF AlgId: overlong) 185 PBES2 Decrypt (bad PBKDF2 params: not a sequence) 189 PBES2 Decrypt (bad PBKDF2 params: overlong) 193 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string) 197 PBES2 Decrypt (bad PBKDF2 params salt: overlong) 201 PBES2 Decrypt (bad PBKDF2 params iter: not an int) 205 PBES2 Decrypt (bad PBKDF2 params iter: overlong) 213 PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong) [all …]
|
D | test_suite_gcm.camellia.data | 145 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #1 (128-bad) 149 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #2 (128-bad) 153 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #3 (128-bad) 157 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #4 (128-bad) 161 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #5 (128-bad) 165 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #6 (128-bad) 169 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #7 (192-bad) 173 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #8 (192-bad) 177 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #9 (192-bad) 181 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #10 (192-bad) [all …]
|
D | test_suite_pk.data | 361 ECDSA verify test vector #2 (bad) 369 EC(DSA) verify test vector #2 (bad) 601 Check pair #2 (EC, bad) 609 Check pair #4 (RSA, bad) 758 PSA attributes for pk: NONE (bad) 764 PSA attributes for pk: RSA usage=0 (bad) 769 PSA attributes for pk: RSA usage=EXPORT (bad) 774 PSA attributes for pk: RSA usage=DECRYPT|EXPORT (bad) 779 PSA attributes for pk: RSA usage=DECRYPT|SIGN_MESSAGE (bad) 784 PSA attributes for pk: RSA usage=SIGN_MESSAGE|SIGN_HASH (bad) [all …]
|
D | test_suite_bignum_random.data | 222 MPI random bad arguments: min < 0 225 MPI random bad arguments: min = N = 0 228 MPI random bad arguments: min = N = 1 231 MPI random bad arguments: min > N = 0 234 MPI random bad arguments: min > N = 1 237 MPI random bad arguments: min > N = 1, 0 limb in upper bound
|
D | test_suite_psa_crypto_entropy.data | 34 PSA validate entropy injection: bad, too big 37 PSA validate entropy injection: bad, too small using MBEDTLS_ENTROPY_MIN_PLATFORM 40 PSA validate entropy injection: bad, too small using MBEDTLS_ENTROPY_BLOCK_SIZE
|
D | test_suite_pkcs1_v15.data | 79 RSAES-V15 decoding: bad first byte 82 RSAES-V15 decoding: bad second byte (0 instead of 2) 85 RSAES-V15 decoding: bad second byte (1 instead of 2)
|
D | test_suite_cmac.data | 24 CMAC init #5 AES-224: bad key size 28 CMAC init #6 AES-0: bad key size
|
D | test_suite_x509parse.data | 890 X509 CRT verification #65 (RSASSA-PSS, SHA1, bad cert signature) 904 x509_verify:"../framework/data_files/server9-bad-saltlen.crt":"../framework/data_files/test-ca.crt"… 908 x509_verify:"../framework/data_files/server9-bad-saltlen.crt":"../framework/data_files/test-ca.crt"… 912 x509_verify:"../framework/data_files/server9-bad-mgfhash.crt":"../framework/data_files/test-ca.crt"… 998 X509 CRT verification #91 (same CA with good then bad key) 1002 X509 CRT verification #91 (same CA with bad then good key) 1006 X509 CRT verification #92 (bad name, allowing callback) 1078 X509 CRT verification: URI with bad data in SubjectAltName 1080 …iles/rsa_single_san_uri.crt.der":"../framework/data_files/crl_sha256.pem":"bad\:example.com\:5ff40… 1185 X509 CRT verification callback: bad name [all …]
|
D | test_suite_psa_crypto.data | 52 PSA import: bad usage flag 55 PSA import AES: bad key size 683 PSA import EC keypair: explicit bit-size=528 for secp521r1 (bad) 711 PSA import EC keypair: secp256r1, all-bits-zero (bad) 719 PSA import EC keypair: secp256r1, d == n (bad) 723 PSA import EC keypair: secp256r1, d > n (bad) 1632 PSA hash setup: bad (unknown hash algorithm) 1636 PSA hash setup: bad (wildcard instead of hash algorithm) 1640 PSA hash setup: bad (not a hash algorithm) 1644 PSA hash: bad order function calls [all …]
|
D | test_suite_random.data | 22 # This bad-usage test case currently crashes in the default configuration
|
D | test_suite_aes.ctr.data | 5 AES-CTR NIST 128 bad
|
D | test_suite_psa_crypto_persistent_key.data | 24 Parse storage: bad magic
|
D | test_suite_ssl.data | 447 Handshake, select RSA-WITH-AES-256-CBC-SHA256, opaque, bad alg 451 Handshake, select RSA-WITH-AES-256-CBC-SHA256, opaque, bad usage 463 Handshake, select RSA-PSK-WITH-AES-256-CBC-SHA384, opaque, bad alg 467 Handshake, select RSA-PSK-WITH-AES-256-CBC-SHA384, opaque, bad usage 491 Handshake, select DHE-RSA-WITH-AES-256-GCM-SHA384, opaque, bad alg 495 Handshake, select DHE-RSA-WITH-AES-256-GCM-SHA384, opaque, bad usage 515 Handshake, select ECDHE-RSA-WITH-AES-256-GCM-SHA384, opaque, bad alg 519 Handshake, select ECDHE-RSA-WITH-AES-256-GCM-SHA384, opaque, bad usage 535 Handshake, select ECDHE-ECDSA-WITH-AES-256-CCM, opaque, bad alg 539 Handshake, select ECDHE-ECDSA-WITH-AES-256-CCM, opaque, bad usage [all …]
|
D | test_suite_nist_kw.data | 19 NIST KW init #4 AES-224: bad key size 23 NIST KW init #5 3DES: bad cipher
|
D | test_suite_pkcs1_v15.function | 250 * because no write to the outputs is performed in the bad case. */
|
D | test_suite_pkcs1_v21.data | 1061 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature 1085 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature
|
D | test_suite_rsa.data | 437 RSA Validate Params, bad N
|
D | test_suite_ecp.data | 407 ECP tls read group #2 (bad curve_type) 613 ECP set public key: bad group (not in enum)
|
/mbedtls-latest/library/ |
D | cipher.c | 857 mbedtls_ct_condition_t bad = mbedtls_ct_uint_gt(padding_len, input_len); in get_pkcs_padding() local 858 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_eq(padding_len, 0)); in get_pkcs_padding() 866 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_and(in_padding, different)); in get_pkcs_padding() 869 return mbedtls_ct_error_if_else_0(bad, MBEDTLS_ERR_CIPHER_INVALID_PADDING); in get_pkcs_padding() 897 mbedtls_ct_condition_t bad = MBEDTLS_CT_TRUE; in get_one_and_zeros_padding() local 908 bad = mbedtls_ct_bool_if(hit_first_nonzero, mbedtls_ct_uint_ne(input[i], 0x80), bad); in get_one_and_zeros_padding() 913 return mbedtls_ct_error_if_else_0(bad, MBEDTLS_ERR_CIPHER_INVALID_PADDING); in get_one_and_zeros_padding() 938 mbedtls_ct_condition_t bad; in get_zeros_and_len_padding() local 948 bad = mbedtls_ct_uint_gt(padding_len, input_len); in get_zeros_and_len_padding() 949 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_eq(padding_len, 0)); in get_zeros_and_len_padding() [all …]
|
D | rsa.c | 463 mbedtls_ct_condition_t bad; in mbedtls_ct_rsaes_pkcs1_v15_unpadding() local 473 bad = mbedtls_ct_bool(input[0]); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 478 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_ne(input[1], MBEDTLS_RSA_CRYPT)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 490 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_not(pad_done)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 493 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_gt(8, pad_count)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 503 bad, (unsigned) plaintext_max_size, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 517 bad, in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 528 mbedtls_ct_zeroize_if(mbedtls_ct_bool_or(bad, output_too_large), input + 11, ilen - 11); in mbedtls_ct_rsaes_pkcs1_v15_unpadding() 1928 mbedtls_ct_condition_t bad, in_padding; in mbedtls_rsa_rsaes_oaep_decrypt() local 1989 bad = mbedtls_ct_bool(*p++); /* First byte must be 0 */ in mbedtls_rsa_rsaes_oaep_decrypt() [all …]
|
/mbedtls-latest/ |
D | .pylintrc | 11 # [bad-builtin] 12 bad-functions=input
|
/mbedtls-latest/scripts/ |
D | ci.requirements.txt | 22 # For building `framework/data_files/server9-bad-saltlen.crt` and check python
|
/mbedtls-latest/tests/ |
D | compat.sh | 1251 Maybe a bad filter ('$FILTER' excluding '$EXCLUDE') or a bad configuration?
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | psa-limitations.md | 210 Files with "bad" in the name are expected to be invalid and rejected in tests. 214 server9-bad-mgfhash.crt (announcing mgf1(sha224), signed with another mgf) 218 server9-bad-saltlen.crt (announcing saltlen = 0xDE, signed with another len)
|
/mbedtls-latest/docs/architecture/testing/ |
D | invasive-testing.md | 234 * Sanitizers check for certain bad usage patterns (ASan, MSan, UBSan, Valgrind).
|