/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_cipher.padding.data | 4 Set padding with AES-CBC 8 Set padding with AES-CFB 12 Set padding with AES-CTR 16 Set padding with CAMELLIA-CBC 20 Set padding with CAMELLIA-CFB 24 Set padding with CAMELLIA-CTR 28 Set padding with DES-CBC 32 Set padding with NULL 36 Set non-existent padding with AES-CBC 40 Set non-existent padding with CAMELLIA-CBC [all …]
|
D | test_suite_cipher.des.data | 73 DES Encrypt and decrypt 0 bytes with one and zeros padding 77 DES Encrypt and decrypt 1 byte with one and zeros padding 81 DES Encrypt and decrypt 2 bytes with one and zeros padding 85 DES Encrypt and decrypt 7 bytes with one and zeros padding 89 DES Encrypt and decrypt 8 bytes with one and zeros padding 93 DES Encrypt and decrypt 9 bytes with one and zeros padding 97 DES Encrypt and decrypt 15 bytes with one and zeros padding 101 DES Encrypt and decrypt 16 bytes with one and zeros padding 105 DES Encrypt and decrypt 17 bytes with one and zeros padding 109 DES Encrypt and decrypt 31 bytes with one and zeros padding [all …]
|
D | test_suite_cipher.aes.data | 9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding 13 AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding 17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding 21 AES-128 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding 25 AES-128 CBC - Encrypt and decrypt 8 bytes with PKCS7 padding 29 AES-128 CBC - Encrypt and decrypt 9 bytes with PKCS7 padding 33 AES-128 CBC - Encrypt and decrypt 15 bytes with PKCS7 padding 37 AES-128 CBC - Encrypt and decrypt 16 bytes with PKCS7 padding 41 AES-128 CBC - Encrypt and decrypt 17 bytes with PKCS7 padding 45 AES-128 CBC - Encrypt and decrypt 31 bytes with PKCS7 padding [all …]
|
D | test_suite_cipher.camellia.data | 69 CAMELLIA Encrypt and decrypt 0 bytes with one and zeros padding 73 CAMELLIA Encrypt and decrypt 1 byte with one and zeros padding 77 CAMELLIA Encrypt and decrypt 2 bytes with one and zeros padding 81 CAMELLIA Encrypt and decrypt 7 bytes with one and zeros padding 85 CAMELLIA Encrypt and decrypt 8 bytes with one and zeros padding 89 CAMELLIA Encrypt and decrypt 9 bytes with one and zeros padding 93 CAMELLIA Encrypt and decrypt 15 bytes with one and zeros padding 97 CAMELLIA Encrypt and decrypt 16 bytes with one and zeros padding 101 CAMELLIA Encrypt and decrypt 17 bytes with one and zeros padding 105 CAMELLIA Encrypt and decrypt 31 bytes with one and zeros padding [all …]
|
D | test_suite_ssl_decrypt.function | 129 * of padding and MAC. 136 * - if it's -1, the plaintext length is 0 and minimal padding is applied 137 * - if it's -2, the plaintext length is 0 and maximal padding is applied 139 * it's the length of the rest of the padding, that is, excluding the 167 /* Determine padding/plaintext length */ 173 /* Minimal padding 177 /* Maximal padding? */ 184 /* Minimal non-zero plaintext_length giving desired padding. 218 * Prepare a pre-encryption record (with MAC and padding), and save it. 254 /* Corrupt one byte of the data (could be plaintext, MAC or padding) */ [all …]
|
D | test_suite_pkcs12.data | 49 PBE Encrypt, pad = 8 (PKCS7 padding disabled) 65 PBE Decrypt, (Invalid padding & PKCS7 padding disabled) 69 PBE Decrypt, (Invalid padding & PKCS7 padding enabled)
|
D | test_suite_pem.data | 58 # length read from the decoded ASN.1 data (i.e. extra padding, if any, is ignored). 63 # The text "hello world" together with some invalid padding data is encoded 64 # with AES-128-CBC in order to test padding validation. 70 PEM read (AES-128-CBC, invalid padding data) 77 PEM read (AES-128-CBC, padding data is larger than AES block length) 84 PEM read (DES-CBC, padding data is larger than DES block length)
|
D | test_suite_pkcs1_v15.data | 88 RSAES-V15 decoding: padding too short (0) 91 RSAES-V15 decoding: padding too short (7) 94 RSAES-V15 decoding: unfinished padding
|
D | test_suite_pkcs5.data | 121 PBES2 Encrypt, pad=6 (PKCS7 padding disabled) 125 PBES2 Encrypt, pad=8 (PKCS7 padding disabled) 149 PBES2 Decrypt (Invalid padding & PKCS7 padding disabled) 153 PBES2 Decrypt (Invalid padding & PKCS7 padding enabled)
|
D | test_suite_platform_printf.function | 55 /* We assume that long has no padding bits! */
|
D | test_suite_pk.function | 1085 void pk_rsa_verify_test_vec(data_t *message_str, int padding, int digest, 1108 if (padding >= 0) { 1109 TEST_EQUAL(mbedtls_rsa_set_padding(rsa, padding, MBEDTLS_MD_NONE), 0); 1193 /* Mbed TLS distinguishes "invalid padding" from "valid padding but 1437 void pk_rsa_encrypt_decrypt_test(data_t *message, int mod, int padding, 1462 mbedtls_rsa_set_padding(rsa, padding, MBEDTLS_MD_SHA1); 1482 mbedtls_rsa_set_padding(rsa, padding, MBEDTLS_MD_SHA1); 1517 void pk_rsa_decrypt_test_vec(data_t *cipher, int mod, int padding, int md_alg, 1554 /* set padding mode */ 1555 if (padding >= 0) { [all …]
|
D | test_suite_cipher.aria.data | 341 Check set padding - 128 bit key 345 Check set padding - 192 bit key 349 Check set padding - 256 bit key
|
D | test_suite_bignum_random.function | 182 /* This may theoretically fail on rare platforms with padding in 249 /* This may theoretically fail on rare platforms with padding in
|
D | test_suite_rsa.data | 12 # Good padding but wrong hash 37 # Bad padding after performing the public key operation 148 RSA PKCS1 Verify v1.5 padding too short
|
/openthread-latest/third_party/mbedtls/repo/library/ |
D | rsa.c | 956 ctx->padding = MBEDTLS_RSA_PKCS_V15; in mbedtls_rsa_init() 970 int mbedtls_rsa_set_padding(mbedtls_rsa_context *ctx, int padding, in mbedtls_rsa_set_padding() argument 973 switch (padding) { in mbedtls_rsa_set_padding() 988 if ((padding == MBEDTLS_RSA_PKCS_V21) && in mbedtls_rsa_set_padding() 997 ctx->padding = padding; in mbedtls_rsa_set_padding() 1008 return ctx->padding; in mbedtls_rsa_get_padding_mode() 1893 switch (ctx->padding) { in mbedtls_rsa_pkcs1_encrypt() 1935 if (ctx->padding != MBEDTLS_RSA_PKCS_V21) { in mbedtls_rsa_rsaes_oaep_decrypt() 2056 if (ctx->padding != MBEDTLS_RSA_PKCS_V15) { in mbedtls_rsa_rsaes_pkcs1_v15_decrypt() 2091 switch (ctx->padding) { in mbedtls_rsa_pkcs1_decrypt() [all …]
|
D | pkcs12.c | 211 mbedtls_cipher_padding_t padding = MBEDTLS_PADDING_PKCS7; in mbedtls_pkcs12_pbe_ext() local 219 padding = MBEDTLS_PADDING_NONE; in mbedtls_pkcs12_pbe_ext() 222 if ((ret = mbedtls_cipher_set_padding_mode(&cipher_ctx, padding)) != 0) { in mbedtls_pkcs12_pbe_ext()
|
D | pkcs5.c | 240 mbedtls_cipher_padding_t padding = MBEDTLS_PADDING_PKCS7; in mbedtls_pkcs5_pbes2_ext() local 248 padding = MBEDTLS_PADDING_NONE; in mbedtls_pkcs5_pbes2_ext() 251 if ((ret = mbedtls_cipher_set_padding_mode(&cipher_ctx, padding)) != 0) { in mbedtls_pkcs5_pbes2_ext()
|
D | ssl_msg.c | 982 size_t padding = in mbedtls_ssl_encrypt_buf() local 989 padding) != 0) { in mbedtls_ssl_encrypt_buf() 1006 size_t padding = in mbedtls_ssl_encrypt_buf() local 1020 padding) != 0) { in mbedtls_ssl_encrypt_buf()
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | rsa.h | 111 int MBEDTLS_PRIVATE(padding); /*!< Selects padding mode: 175 int mbedtls_rsa_set_padding(mbedtls_rsa_context *ctx, int padding,
|
/openthread-latest/tests/scripts/thread-cert/ |
D | test_ipv6.py | 963 def padding(self, content_length): member in TestHopByHopFactory 989 data += self.padding(len(data)) 1011 data += self.padding(len(data))
|
/openthread-latest/third_party/mbedtls/repo/docs/ |
D | 3.0-migration-guide.md | 363 ### Remove the padding parameters from `mbedtls_rsa_init()` 373 To choose the padding type when initializing a context, instead of 376 mbedtls_rsa_init(ctx, padding, hash_id); 383 mbedtls_rsa_set_padding(ctx, padding, hash_id); 386 To use PKCS#1 v1.5 padding, instead of 735 This change affects users who modified the default `mbedtls_config.h` padding granularity 740 they used exactly the same padding mechanism and hence their respective padding
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/ |
D | psa-legacy-bridges.md | 284 …* For an RSA key with the `MBEDTLS_RSA_PKCS_V15` padding mode, the algorithm policy is `PSA_ALG_RS… 285 …* For an RSA key with the `MBEDTLS_RSA_PKCS_V21` padding mode, the algorithm policy is `PSA_ALG_RS… 313 …s of the original key's policy. The original key's policy determines the output key's padding mode. 314 …mary algorithm policy is how one conveys the same information as RSA key padding information in th…
|
D | md-cipher-dispatch.md | 132 * AES, DES or 3DES in CBC mode without padding, decrypt only (!). 137 * In practice: 2DES or 3DES in CBC mode with PKCS7 padding, decrypt only 139 * In principle: any cipher-mode (default padding), passed an 142 no documented restriction but in practice TODO (inc. padding and 148 * 3DES or DES in CBC mode with PKCS7 padding, both encrypt and decrypt.
|
/openthread-latest/third_party/mbedtls/repo/ |
D | ChangeLog | 210 * mbedtls_pem_read_buffer() now performs a check on the padding data of 213 mbedtls_pk_encrypt() on non-opaque RSA keys to honor the padding mode in 445 that the output after decryption may include CBC padding. Consider moving 449 * Improve padding calculations in CBC decryption, NIST key unwrapping and 452 time code, which could allow a padding oracle attack if the attacker 573 this call accidentally applied a default padding mode chosen at compile 664 to read non-public fields for padding mode and hash id from 2809 either used both encrypt and decrypt key schedules, or which perform padding. 3005 decryption that could lead to a Bleichenbacher-style padding oracle 3307 * Fix decryption for zero length messages (which contain all padding) when a [all …]
|
/openthread-latest/third_party/mbedtls/repo/docs/architecture/ |
D | psa-crypto-implementation-structure.md | 172 * Tests with invalid data (e.g. wrong size or format, output buffer too small, invalid padding).
|