Home
last modified time | relevance | path

Searched refs:bad (Results 1 – 25 of 32) sorted by relevance

12

/mbedtls-latest/tests/suites/
Dtest_suite_pkcs5.data169 PBES2 Decrypt (bad params tag)
173 PBES2 Decrypt (bad KDF AlgId: not a sequence)
177 PBES2 Decrypt (bad KDF AlgId: overlong)
185 PBES2 Decrypt (bad PBKDF2 params: not a sequence)
189 PBES2 Decrypt (bad PBKDF2 params: overlong)
193 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string)
197 PBES2 Decrypt (bad PBKDF2 params salt: overlong)
201 PBES2 Decrypt (bad PBKDF2 params iter: not an int)
205 PBES2 Decrypt (bad PBKDF2 params iter: overlong)
213 PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong)
[all …]
Dtest_suite_gcm.camellia.data145 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #1 (128-bad)
149 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #2 (128-bad)
153 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #3 (128-bad)
157 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #4 (128-bad)
161 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #5 (128-bad)
165 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #6 (128-bad)
169 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #7 (192-bad)
173 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #8 (192-bad)
177 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #9 (192-bad)
181 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #10 (192-bad)
[all …]
Dtest_suite_pk.data361 ECDSA verify test vector #2 (bad)
369 EC(DSA) verify test vector #2 (bad)
601 Check pair #2 (EC, bad)
609 Check pair #4 (RSA, bad)
758 PSA attributes for pk: NONE (bad)
764 PSA attributes for pk: RSA usage=0 (bad)
769 PSA attributes for pk: RSA usage=EXPORT (bad)
774 PSA attributes for pk: RSA usage=DECRYPT|EXPORT (bad)
779 PSA attributes for pk: RSA usage=DECRYPT|SIGN_MESSAGE (bad)
784 PSA attributes for pk: RSA usage=SIGN_MESSAGE|SIGN_HASH (bad)
[all …]
Dtest_suite_bignum_random.data222 MPI random bad arguments: min < 0
225 MPI random bad arguments: min = N = 0
228 MPI random bad arguments: min = N = 1
231 MPI random bad arguments: min > N = 0
234 MPI random bad arguments: min > N = 1
237 MPI random bad arguments: min > N = 1, 0 limb in upper bound
Dtest_suite_psa_crypto_entropy.data34 PSA validate entropy injection: bad, too big
37 PSA validate entropy injection: bad, too small using MBEDTLS_ENTROPY_MIN_PLATFORM
40 PSA validate entropy injection: bad, too small using MBEDTLS_ENTROPY_BLOCK_SIZE
Dtest_suite_pkcs1_v15.data79 RSAES-V15 decoding: bad first byte
82 RSAES-V15 decoding: bad second byte (0 instead of 2)
85 RSAES-V15 decoding: bad second byte (1 instead of 2)
Dtest_suite_cmac.data24 CMAC init #5 AES-224: bad key size
28 CMAC init #6 AES-0: bad key size
Dtest_suite_x509parse.data890 X509 CRT verification #65 (RSASSA-PSS, SHA1, bad cert signature)
904 x509_verify:"../framework/data_files/server9-bad-saltlen.crt":"../framework/data_files/test-ca.crt"…
908 x509_verify:"../framework/data_files/server9-bad-saltlen.crt":"../framework/data_files/test-ca.crt"…
912 x509_verify:"../framework/data_files/server9-bad-mgfhash.crt":"../framework/data_files/test-ca.crt"…
998 X509 CRT verification #91 (same CA with good then bad key)
1002 X509 CRT verification #91 (same CA with bad then good key)
1006 X509 CRT verification #92 (bad name, allowing callback)
1078 X509 CRT verification: URI with bad data in SubjectAltName
1080 …iles/rsa_single_san_uri.crt.der":"../framework/data_files/crl_sha256.pem":"bad\:example.com\:5ff40…
1185 X509 CRT verification callback: bad name
[all …]
Dtest_suite_psa_crypto.data52 PSA import: bad usage flag
55 PSA import AES: bad key size
683 PSA import EC keypair: explicit bit-size=528 for secp521r1 (bad)
711 PSA import EC keypair: secp256r1, all-bits-zero (bad)
719 PSA import EC keypair: secp256r1, d == n (bad)
723 PSA import EC keypair: secp256r1, d > n (bad)
1632 PSA hash setup: bad (unknown hash algorithm)
1636 PSA hash setup: bad (wildcard instead of hash algorithm)
1640 PSA hash setup: bad (not a hash algorithm)
1644 PSA hash: bad order function calls
[all …]
Dtest_suite_random.data22 # This bad-usage test case currently crashes in the default configuration
Dtest_suite_aes.ctr.data5 AES-CTR NIST 128 bad
Dtest_suite_psa_crypto_persistent_key.data24 Parse storage: bad magic
Dtest_suite_ssl.data447 Handshake, select RSA-WITH-AES-256-CBC-SHA256, opaque, bad alg
451 Handshake, select RSA-WITH-AES-256-CBC-SHA256, opaque, bad usage
463 Handshake, select RSA-PSK-WITH-AES-256-CBC-SHA384, opaque, bad alg
467 Handshake, select RSA-PSK-WITH-AES-256-CBC-SHA384, opaque, bad usage
491 Handshake, select DHE-RSA-WITH-AES-256-GCM-SHA384, opaque, bad alg
495 Handshake, select DHE-RSA-WITH-AES-256-GCM-SHA384, opaque, bad usage
515 Handshake, select ECDHE-RSA-WITH-AES-256-GCM-SHA384, opaque, bad alg
519 Handshake, select ECDHE-RSA-WITH-AES-256-GCM-SHA384, opaque, bad usage
535 Handshake, select ECDHE-ECDSA-WITH-AES-256-CCM, opaque, bad alg
539 Handshake, select ECDHE-ECDSA-WITH-AES-256-CCM, opaque, bad usage
[all …]
Dtest_suite_nist_kw.data19 NIST KW init #4 AES-224: bad key size
23 NIST KW init #5 3DES: bad cipher
Dtest_suite_pkcs1_v15.function250 * because no write to the outputs is performed in the bad case. */
Dtest_suite_pkcs1_v21.data1061 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature
1085 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature
Dtest_suite_rsa.data437 RSA Validate Params, bad N
Dtest_suite_ecp.data407 ECP tls read group #2 (bad curve_type)
613 ECP set public key: bad group (not in enum)
/mbedtls-latest/library/
Dcipher.c857 mbedtls_ct_condition_t bad = mbedtls_ct_uint_gt(padding_len, input_len); in get_pkcs_padding() local
858 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_eq(padding_len, 0)); in get_pkcs_padding()
866 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_and(in_padding, different)); in get_pkcs_padding()
869 return mbedtls_ct_error_if_else_0(bad, MBEDTLS_ERR_CIPHER_INVALID_PADDING); in get_pkcs_padding()
897 mbedtls_ct_condition_t bad = MBEDTLS_CT_TRUE; in get_one_and_zeros_padding() local
908 bad = mbedtls_ct_bool_if(hit_first_nonzero, mbedtls_ct_uint_ne(input[i], 0x80), bad); in get_one_and_zeros_padding()
913 return mbedtls_ct_error_if_else_0(bad, MBEDTLS_ERR_CIPHER_INVALID_PADDING); in get_one_and_zeros_padding()
938 mbedtls_ct_condition_t bad; in get_zeros_and_len_padding() local
948 bad = mbedtls_ct_uint_gt(padding_len, input_len); in get_zeros_and_len_padding()
949 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_eq(padding_len, 0)); in get_zeros_and_len_padding()
[all …]
Drsa.c463 mbedtls_ct_condition_t bad; in mbedtls_ct_rsaes_pkcs1_v15_unpadding() local
473 bad = mbedtls_ct_bool(input[0]); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
478 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_ne(input[1], MBEDTLS_RSA_CRYPT)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
490 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_bool_not(pad_done)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
493 bad = mbedtls_ct_bool_or(bad, mbedtls_ct_uint_gt(8, pad_count)); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
503 bad, (unsigned) plaintext_max_size, in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
517 bad, in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
528 mbedtls_ct_zeroize_if(mbedtls_ct_bool_or(bad, output_too_large), input + 11, ilen - 11); in mbedtls_ct_rsaes_pkcs1_v15_unpadding()
1928 mbedtls_ct_condition_t bad, in_padding; in mbedtls_rsa_rsaes_oaep_decrypt() local
1989 bad = mbedtls_ct_bool(*p++); /* First byte must be 0 */ in mbedtls_rsa_rsaes_oaep_decrypt()
[all …]
/mbedtls-latest/
D.pylintrc11 # [bad-builtin]
12 bad-functions=input
/mbedtls-latest/scripts/
Dci.requirements.txt22 # For building `framework/data_files/server9-bad-saltlen.crt` and check python
/mbedtls-latest/tests/
Dcompat.sh1251 Maybe a bad filter ('$FILTER' excluding '$EXCLUDE') or a bad configuration?
/mbedtls-latest/docs/architecture/psa-migration/
Dpsa-limitations.md210 Files with "bad" in the name are expected to be invalid and rejected in tests.
214 server9-bad-mgfhash.crt (announcing mgf1(sha224), signed with another mgf)
218 server9-bad-saltlen.crt (announcing saltlen = 0xDE, signed with another len)
/mbedtls-latest/docs/architecture/testing/
Dinvasive-testing.md234 * Sanitizers check for certain bad usage patterns (ASan, MSan, UBSan, Valgrind).

12