Home
last modified time | relevance | path

Searched refs:bad (Results 1 – 17 of 17) sorted by relevance

/net-tools-3.7.0/mbedtls-2.4.0/tests/suites/
Dtest_suite_pkcs5.data25 PBES2 Decrypt (bad params tag)
29 PBES2 Decrypt (bad KDF AlgId: not a sequence)
33 PBES2 Decrypt (bad KDF AlgId: overlong)
41 PBES2 Decrypt (bad PBKDF2 params: not a sequence)
45 PBES2 Decrypt (bad PBKDF2 params: overlong)
49 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string)
53 PBES2 Decrypt (bad PBKDF2 params salt: overlong)
57 PBES2 Decrypt (bad PBKDF2 params iter: not an int)
61 PBES2 Decrypt (bad PBKDF2 params iter: overlong)
69 PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong)
[all …]
Dtest_suite_gcm.camellia.data145 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #1 (128-bad)
149 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #2 (128-bad)
153 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #3 (128-bad)
157 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #4 (128-bad)
161 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #5 (128-bad)
165 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #6 (128-bad)
169 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #7 (192-bad)
173 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #8 (192-bad)
177 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #9 (192-bad)
181 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #10 (192-bad)
[all …]
Dtest_suite_pk.data21 RSA verify test vector #2 (bad)
29 ECDSA verify test vector #2 (bad)
37 EC(DSA) verify test vector #2 (bad)
137 Check pair #2 (EC, bad)
145 Check pair #4 (RSA, bad)
Dtest_suite_cmac.data23 CMAC init #5 AES-224: bad key size
27 CMAC init #6 AES-0: bad key size
Dtest_suite_x509parse.data634 X509 Certificate verification #65 (RSASSA-PSS, SHA1, bad cert signature)
648 x509_verify:"data_files/server9-bad-saltlen.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NUL…
652 x509_verify:"data_files/server9-bad-mgfhash.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NUL…
849 X509 Certificate ASN1 (TBSCertificate, correct alg, bad RSASSA-PSS params)
1009 X509 Certificate ASN1 (ExtKeyUsage, bad second tag)
1428 X509 CSR ASN.1 (bad first tag)
1431 X509 CSR ASN.1 (bad sequence: overlong)
1437 X509 CSR ASN.1 (bad CRI: not a sequence)
1440 X509 CSR ASN.1 (bad CRI: overlong)
1443 X509 CSR ASN.1 (bad CRI.Version: overlong)
[all …]
Dtest_suite_ecp.data41 ECP write binary #0 (zero, bad format)
132 ECP tls read group #2 (bad curve_type)
Dtest_suite_ccm.data12 CCM init #3 AES-224: bad key size
16 CCM init #4 BLOWFISH-128: bad block size
/net-tools-3.7.0/mbedtls-2.4.0/scripts/
Dmalloc-init.pl42 my @bad;
53 push @bad, "$file:$line:$name" if $name;
57 push @bad, "$file:$.:???" unless /return mbedtls_malloc/;
62 push @bad, "$file:$line:$name";
70 print "$_\n" for @bad;
/net-tools-3.7.0/libcoap/tests/
Dtest_options.c444 CU_ASSERT(oi.bad == 1); in t_iterate_option1()
447 CU_ASSERT(oi.bad == 1); in t_iterate_option1()
469 CU_ASSERT(oi.bad == 1); in t_iterate_option2()
472 CU_ASSERT(oi.bad == 1); in t_iterate_option2()
495 CU_ASSERT(oi.bad == 0); in t_iterate_option3()
498 CU_ASSERT(oi.bad == 0); in t_iterate_option3()
503 CU_ASSERT(oi.bad == 0); in t_iterate_option3()
508 CU_ASSERT(oi.bad == 0); in t_iterate_option3()
513 CU_ASSERT(oi.bad == 1); in t_iterate_option3()
537 CU_ASSERT(oi.bad == 0); in t_iterate_option4()
[all …]
/net-tools-3.7.0/mbedtls-2.4.0/library/
Dcipher.c473 unsigned char padding_len, bad = 0; in get_pkcs_padding() local
482 bad |= padding_len > input_len; in get_pkcs_padding()
483 bad |= padding_len == 0; in get_pkcs_padding()
489 bad |= ( input[i] ^ padding_len ) * ( i >= pad_idx ); in get_pkcs_padding()
491 return( MBEDTLS_ERR_CIPHER_INVALID_PADDING * ( bad != 0 ) ); in get_pkcs_padding()
514 unsigned char done = 0, prev_done, bad; in get_one_and_zeros_padding() local
519 bad = 0xFF; in get_one_and_zeros_padding()
526 bad &= ( input[i-1] ^ 0x80 ) | ( done == prev_done ); in get_one_and_zeros_padding()
529 return( MBEDTLS_ERR_CIPHER_INVALID_PADDING * ( bad != 0 ) ); in get_one_and_zeros_padding()
553 unsigned char padding_len, bad = 0; in get_zeros_and_len_padding() local
[all …]
Drsa.c691 unsigned char *p, bad, pad_done; in mbedtls_rsa_rsaes_oaep_decrypt() local
757 bad = 0; in mbedtls_rsa_rsaes_oaep_decrypt()
759 bad |= *p++; /* First byte must be 0 */ in mbedtls_rsa_rsaes_oaep_decrypt()
765 bad |= lhash[i] ^ *p++; in mbedtls_rsa_rsaes_oaep_decrypt()
778 bad |= *p++ ^ 0x01; in mbedtls_rsa_rsaes_oaep_decrypt()
786 if( bad != 0 ) in mbedtls_rsa_rsaes_oaep_decrypt()
813 unsigned char *p, bad, pad_done = 0; in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() local
832 bad = 0; in mbedtls_rsa_rsaes_pkcs1_v15_decrypt()
837 bad |= *p++; /* First byte must be 0 */ in mbedtls_rsa_rsaes_pkcs1_v15_decrypt()
842 bad |= *p++ ^ MBEDTLS_RSA_CRYPT; in mbedtls_rsa_rsaes_pkcs1_v15_decrypt()
[all …]
/net-tools-3.7.0/libcoap/src/
Doption.c131 oi->bad = 1; in coap_option_iterator_init()
150 if (oi->bad || oi->length == 0 || in opt_finished()
152 oi->bad = 1; in opt_finished()
155 return oi->bad; in opt_finished()
187 oi->bad = 1; in coap_option_next()
200 oi->bad = 1; in coap_option_next()
/net-tools-3.7.0/libcoap/include/coap/
Doption.h256 unsigned int bad:1; /**< iterator object is ok if not set */ member
/net-tools-3.7.0/libcoap/m4/
Dax_check_compile_flag.m420 # force the compiler to issue an error when a bad flag is given.
Dax_check_link_flag.m420 # issue an error when a bad flag is given.
/net-tools-3.7.0/tinydtls-0.8.2/sha2/
DREADME193 0.9.8 to 0.9.9 - Fixed some really bad typos and mistakes on my part that
/net-tools-3.7.0/mbedtls-2.4.0/
DChangeLog195 * Fix failures in MPI on Sparc(64) due to use of bad assembly code.
594 performance impact was bad for some users (this was introduced in 1.3.10).
709 * Fix potential bad read in parsing ServerHello (found by Adrien
1176 * Fix potential bad read in parsing ServerHello (found by Adrien
1360 * Removed timing differences due to bad padding from
1524 * Removed timing differences due to bad padding from