/net-tools-3.7.0/mbedtls-2.4.0/tests/suites/ |
D | test_suite_pkcs5.data | 25 PBES2 Decrypt (bad params tag) 29 PBES2 Decrypt (bad KDF AlgId: not a sequence) 33 PBES2 Decrypt (bad KDF AlgId: overlong) 41 PBES2 Decrypt (bad PBKDF2 params: not a sequence) 45 PBES2 Decrypt (bad PBKDF2 params: overlong) 49 PBES2 Decrypt (bad PBKDF2 params salt: not an octet string) 53 PBES2 Decrypt (bad PBKDF2 params salt: overlong) 57 PBES2 Decrypt (bad PBKDF2 params iter: not an int) 61 PBES2 Decrypt (bad PBKDF2 params iter: overlong) 69 PBES2 Decrypt (bad PBKDF2 params explicit keylen: overlong) [all …]
|
D | test_suite_gcm.camellia.data | 145 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #1 (128-bad) 149 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #2 (128-bad) 153 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #3 (128-bad) 157 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #4 (128-bad) 161 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #5 (128-bad) 165 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #6 (128-bad) 169 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #7 (192-bad) 173 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #8 (192-bad) 177 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #9 (192-bad) 181 Camellia-GCM test vect draft-kato-ipsec-camellia-gcm #10 (192-bad) [all …]
|
D | test_suite_pk.data | 21 RSA verify test vector #2 (bad) 29 ECDSA verify test vector #2 (bad) 37 EC(DSA) verify test vector #2 (bad) 137 Check pair #2 (EC, bad) 145 Check pair #4 (RSA, bad)
|
D | test_suite_cmac.data | 23 CMAC init #5 AES-224: bad key size 27 CMAC init #6 AES-0: bad key size
|
D | test_suite_x509parse.data | 634 X509 Certificate verification #65 (RSASSA-PSS, SHA1, bad cert signature) 648 x509_verify:"data_files/server9-bad-saltlen.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NUL… 652 x509_verify:"data_files/server9-bad-mgfhash.crt":"data_files/test-ca.crt":"data_files/crl.pem":"NUL… 849 X509 Certificate ASN1 (TBSCertificate, correct alg, bad RSASSA-PSS params) 1009 X509 Certificate ASN1 (ExtKeyUsage, bad second tag) 1428 X509 CSR ASN.1 (bad first tag) 1431 X509 CSR ASN.1 (bad sequence: overlong) 1437 X509 CSR ASN.1 (bad CRI: not a sequence) 1440 X509 CSR ASN.1 (bad CRI: overlong) 1443 X509 CSR ASN.1 (bad CRI.Version: overlong) [all …]
|
D | test_suite_ecp.data | 41 ECP write binary #0 (zero, bad format) 132 ECP tls read group #2 (bad curve_type)
|
D | test_suite_ccm.data | 12 CCM init #3 AES-224: bad key size 16 CCM init #4 BLOWFISH-128: bad block size
|
/net-tools-3.7.0/mbedtls-2.4.0/scripts/ |
D | malloc-init.pl | 42 my @bad; 53 push @bad, "$file:$line:$name" if $name; 57 push @bad, "$file:$.:???" unless /return mbedtls_malloc/; 62 push @bad, "$file:$line:$name"; 70 print "$_\n" for @bad;
|
/net-tools-3.7.0/libcoap/tests/ |
D | test_options.c | 444 CU_ASSERT(oi.bad == 1); in t_iterate_option1() 447 CU_ASSERT(oi.bad == 1); in t_iterate_option1() 469 CU_ASSERT(oi.bad == 1); in t_iterate_option2() 472 CU_ASSERT(oi.bad == 1); in t_iterate_option2() 495 CU_ASSERT(oi.bad == 0); in t_iterate_option3() 498 CU_ASSERT(oi.bad == 0); in t_iterate_option3() 503 CU_ASSERT(oi.bad == 0); in t_iterate_option3() 508 CU_ASSERT(oi.bad == 0); in t_iterate_option3() 513 CU_ASSERT(oi.bad == 1); in t_iterate_option3() 537 CU_ASSERT(oi.bad == 0); in t_iterate_option4() [all …]
|
/net-tools-3.7.0/mbedtls-2.4.0/library/ |
D | cipher.c | 473 unsigned char padding_len, bad = 0; in get_pkcs_padding() local 482 bad |= padding_len > input_len; in get_pkcs_padding() 483 bad |= padding_len == 0; in get_pkcs_padding() 489 bad |= ( input[i] ^ padding_len ) * ( i >= pad_idx ); in get_pkcs_padding() 491 return( MBEDTLS_ERR_CIPHER_INVALID_PADDING * ( bad != 0 ) ); in get_pkcs_padding() 514 unsigned char done = 0, prev_done, bad; in get_one_and_zeros_padding() local 519 bad = 0xFF; in get_one_and_zeros_padding() 526 bad &= ( input[i-1] ^ 0x80 ) | ( done == prev_done ); in get_one_and_zeros_padding() 529 return( MBEDTLS_ERR_CIPHER_INVALID_PADDING * ( bad != 0 ) ); in get_one_and_zeros_padding() 553 unsigned char padding_len, bad = 0; in get_zeros_and_len_padding() local [all …]
|
D | rsa.c | 691 unsigned char *p, bad, pad_done; in mbedtls_rsa_rsaes_oaep_decrypt() local 757 bad = 0; in mbedtls_rsa_rsaes_oaep_decrypt() 759 bad |= *p++; /* First byte must be 0 */ in mbedtls_rsa_rsaes_oaep_decrypt() 765 bad |= lhash[i] ^ *p++; in mbedtls_rsa_rsaes_oaep_decrypt() 778 bad |= *p++ ^ 0x01; in mbedtls_rsa_rsaes_oaep_decrypt() 786 if( bad != 0 ) in mbedtls_rsa_rsaes_oaep_decrypt() 813 unsigned char *p, bad, pad_done = 0; in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() local 832 bad = 0; in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() 837 bad |= *p++; /* First byte must be 0 */ in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() 842 bad |= *p++ ^ MBEDTLS_RSA_CRYPT; in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() [all …]
|
/net-tools-3.7.0/libcoap/src/ |
D | option.c | 131 oi->bad = 1; in coap_option_iterator_init() 150 if (oi->bad || oi->length == 0 || in opt_finished() 152 oi->bad = 1; in opt_finished() 155 return oi->bad; in opt_finished() 187 oi->bad = 1; in coap_option_next() 200 oi->bad = 1; in coap_option_next()
|
/net-tools-3.7.0/libcoap/include/coap/ |
D | option.h | 256 unsigned int bad:1; /**< iterator object is ok if not set */ member
|
/net-tools-3.7.0/libcoap/m4/ |
D | ax_check_compile_flag.m4 | 20 # force the compiler to issue an error when a bad flag is given.
|
D | ax_check_link_flag.m4 | 20 # issue an error when a bad flag is given.
|
/net-tools-3.7.0/tinydtls-0.8.2/sha2/ |
D | README | 193 0.9.8 to 0.9.9 - Fixed some really bad typos and mistakes on my part that
|
/net-tools-3.7.0/mbedtls-2.4.0/ |
D | ChangeLog | 195 * Fix failures in MPI on Sparc(64) due to use of bad assembly code. 594 performance impact was bad for some users (this was introduced in 1.3.10). 709 * Fix potential bad read in parsing ServerHello (found by Adrien 1176 * Fix potential bad read in parsing ServerHello (found by Adrien 1360 * Removed timing differences due to bad padding from 1524 * Removed timing differences due to bad padding from
|