/dports/security/py-asyncssh/asyncssh-2.8.1/asyncssh/ |
H A D | pbe.py | 92 def __init__(self, cipher_name, block_size, key, iv): argument 93 self._cipher = BasicCipher(cipher_name, key, iv) 183 def _pbes1(params, passphrase, hash_alg, cipher_name): argument 228 cipher = BasicCipher(cipher_name, key, b'') 236 def _pbes2_iv(enc_params, cipher_name, key): argument 331 enc_handler, cipher_name = _pbes2_cipher[enc_alg] 335 return enc_handler(enc_params, cipher_name, key) 341 _pkcs1_cipher[pkcs1_dek_name] = cipher_name 354 handler, cipher_name): 387 cipher_name = _pkcs1_cipher[pkcs1_dek_name] [all …]
|
H A D | encryption.py | 38 def new(cls, cipher_name, key, iv, mac_alg=b'', mac_key=b'', etm=False): argument 73 def new(cls, cipher_name, key, iv, mac_alg=b'', mac_key=b'', etm=False): argument 76 cipher = BasicCipher(cipher_name, key, iv) 142 def new(cls, cipher_name, key, iv, mac_alg=b'', mac_key=b'', etm=False): argument 145 return cls(GCMCipher(cipher_name, key, iv)) 208 def register_encryption_alg(enc_alg, encryption, cipher_name, default): argument 212 get_cipher_params(cipher_name) 221 _enc_params[enc_alg] = (encryption, cipher_name) 239 encryption, cipher_name = _enc_params[enc_alg] 250 encryption, cipher_name = _enc_params[enc_alg] [all …]
|
/dports/net/vtun/vtun-3.0.4/ |
H A D | lfd_encrypt.c | 155 char cipher_name[32]; in alloc_encrypt() local 200 strcpy(cipher_name,"AES-256-ECB"); in alloc_encrypt() 218 strcpy(cipher_name,"AES-128-ECB"); in alloc_encrypt() 369 char cipher_name[32]; in cipher_enc_init() local 375 strcpy(cipher_name, "AES-256-OFB"); in cipher_enc_init() 380 strcpy(cipher_name, "AES-256-CFB"); in cipher_enc_init() 385 strcpy(cipher_name, "AES-256-CBC"); in cipher_enc_init() 390 strcpy(cipher_name, "AES-128-OFB"); in cipher_enc_init() 394 strcpy(cipher_name, "AES-128-CFB"); in cipher_enc_init() 398 strcpy(cipher_name, "AES-128-CBC"); in cipher_enc_init() [all …]
|
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/mysql-test/suite/auth_sec/include/ |
H A D | cipher_test.inc | 14 --let $cipher_name = `SELECT JSON_UNQUOTE(JSON_EXTRACT(ciphers, '$[$i]')) FROM $cipher_db.p` 15 --echo # Expecting connection success with cipher: $cipher_name 25 --let $cipher_name = `SELECT JSON_UNQUOTE(JSON_EXTRACT(ciphers, '$[$i]')) FROM $cipher_db.a` 26 --echo # Expecting connection success with cipher: $cipher_name 36 --let $cipher_name = `SELECT JSON_UNQUOTE(JSON_EXTRACT(ciphers, '$[$i]')) FROM $cipher_db.d` 37 --echo # Expecting connection success with cipher: $cipher_name 47 --let $cipher_name = `SELECT JSON_UNQUOTE(JSON_EXTRACT(ciphers, '$[$i]')) FROM $cipher_db.n` 48 --eval SET @@global.ssl_cipher = '$cipher_name' 50 --echo # Expecting connection success with cipher: $cipher_name 62 --let $cipher_name = `SELECT JSON_UNQUOTE(JSON_EXTRACT(ciphers, '$[$i]')) FROM $cipher_db.b` [all …]
|
/dports/security/py-pycrypto/pycrypto-2.6.1/ |
H A D | pct-speedtest.py | 94 def test_key_setup(self, cipher_name, module, key_bytes, mode): argument 95 self.announce_start("%s key setup" % (cipher_name,)) 115 def test_encryption(self, cipher_name, module, key_bytes, mode): argument 116 self.announce_start("%s encryption" % (cipher_name,)) 202 for cipher_name, module, key_bytes in block_specs: 203 self.test_key_setup(cipher_name, module, key_bytes, module.MODE_CBC) 204 self.test_encryption("%s-CBC" % (cipher_name,), module, key_bytes, module.MODE_CBC) 206 self.test_encryption("%s-OFB" % (cipher_name,), module, key_bytes, module.MODE_OFB) 210 for cipher_name, module, key_bytes in stream_specs: 211 self.test_key_setup(cipher_name, module, key_bytes, None) [all …]
|
/dports/security/p5-CryptX/CryptX-0.075/lib/Crypt/ |
H A D | Misc.pm | 118 my ($ptype, $cipher_name, $iv_hex); 122 ($cipher_name, $iv_hex) = $v =~ /^\s*(.*?)\s*,\s*([0-9a-fA-F]+)\s*$/ if $k eq 'DEK-Info'; 124 if ($cipher_name && $iv_hex && $ptype && $ptype eq '4,ENCRYPTED') { 127 my ($mode, $klen) = _name2mode($cipher_name); 135 my ($data, $header_name, $password, $cipher_name) = @_; 140 $cipher_name ||= 'AES-256-CBC'; 141 my ($mode, $klen, $ilen) = _name2mode($cipher_name); 145 push @headers, 'Proc-Type: 4,ENCRYPTED', "DEK-Info: ".uc($cipher_name).",".unpack("H*", $iv); 213 my $cipher_name = uc(shift); 217 croak "FATAL: unsupported cipher '$cipher_name'" unless $cipher && $mode; [all …]
|
/dports/security/p5-Alt-Crypt-RSA-BigInt/Alt-Crypt-RSA-BigInt-0.06/lib/Crypt/RSA/Key/Private/ |
H A D | SSH.pm | 127 my $cipher_name; 132 $cipher_name = $name; last; 135 if (!defined $cipher_name) { 140 -cipher => $cipher_name ); 182 my $cipher_name = defined $params{Cipher} ? $params{Cipher} 190 $cipher_type = $CIPHERS_TEXT{ uc $cipher_name }; 191 croak "Unknown cipher: '$cipher_name'" unless defined $cipher_type; 222 my $cipher_name; 227 $cipher_name = $name; last; 230 if (!defined $cipher_name) { [all …]
|
/dports/security/p5-Crypt-RSA/Crypt-RSA-1.99/lib/Crypt/RSA/Key/Private/ |
H A D | SSH.pm | 81 my $cipher_name = $CIPHERS{$cipher_type} or 83 my $class = 'Crypt::' . $cipher_name; 85 if ($@) { croak "Unsupported cipher '$cipher_name': $@" } 87 my $cipher = Crypt::CBC->new($passphrase, $cipher_name); 143 my $cipher_name = $CIPHERS{$cipher_type}; 144 my $class = 'Crypt::' . $cipher_name; 146 if ($@) { croak "Unsupported cipher '$cipher_name': $@" } 148 my $cipher = Crypt::CBC->new($passphrase, $cipher_name);
|
/dports/security/py-asyncssh/asyncssh-2.8.1/asyncssh/crypto/ |
H A D | cipher.py | 39 def __init__(self, cipher_name, key, iv): argument 40 cipher, mode, initial_bytes = _cipher_algs[cipher_name] 74 def __init__(self, cipher_name, key, iv): argument 75 self._cipher = _cipher_algs[cipher_name][0] 119 def register_cipher(cipher_name, key_size, iv_size, block_size): argument 122 _cipher_params[cipher_name] = (key_size, iv_size, block_size) 125 def get_cipher_params(cipher_name): argument 128 return _cipher_params[cipher_name]
|
/dports/security/botan110/Botan-1.10.17/src/engine/openssl/ |
H A D | ossl_bc.cpp | 22 std::string name() const { return cipher_name; } in name() 42 std::string cipher_name; member in Botan::__anon55a7e0310111::EVP_BlockCipher 53 cipher_name(algo_name) in EVP_BlockCipher() 78 cipher_name(algo_name) in EVP_BlockCipher() 130 if(cipher_name == "TripleDES" && length == 16) in key_schedule() 138 cipher_name); in key_schedule() 140 if(cipher_name == "RC2") in key_schedule() 156 cipher_name, in clone()
|
/dports/security/john/john-1.9.0-jumbo-1/run/ |
H A D | ansible2john.py | 40 cipher_name = tmpheader[2].strip() 47 cipher_name = cipher_name .decode("ascii") 49 if cipher_name != "AES256": 50 sys.stderr.write("%s: unsupported ciper '%s' found!\n" % (bfilename, cipher_name))
|
/dports/emulators/qemu60/qemu-6.0.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/dports/emulators/qemu42/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/dports/emulators/qemu/qemu-6.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/dports/emulators/qemu-utils/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/dports/emulators/qemu5/qemu-5.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/dports/sysutils/uefi-edk2-qemu/edk2-edk2-stable201911/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/dports/sysutils/uefi-edk2-bhyve/edk2-edk2-stable202102/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); 171 if (strncmp(cipher_name, "PSK-", 4) != 0) 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) 176 TEST_info("%s OK", cipher_name); 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) 183 TEST_info("%s without EtM OK", cipher_name);
|
/dports/security/acmed/acmed-0.18.0/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/dports/emulators/qemu-guest-agent/qemu-5.0.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/dports/textproc/mdbook-linkcheck/mdbook-linkcheck-0.7.6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/dports/security/openssl/openssl-1.1.1n/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|
/dports/security/openssl-devel/openssl-3.0.2/test/ |
H A D | dtls_mtu_test.c | 168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local 171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests() 174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests() 176 TEST_info("%s OK", cipher_name); in run_mtu_tests() 181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests() 183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
|