Home
last modified time | relevance | path

Searched refs:cipher_name (Results 1 – 25 of 533) sorted by relevance

12345678910>>...22

/dports/security/py-asyncssh/asyncssh-2.8.1/asyncssh/
H A Dpbe.py92 def __init__(self, cipher_name, block_size, key, iv): argument
93 self._cipher = BasicCipher(cipher_name, key, iv)
183 def _pbes1(params, passphrase, hash_alg, cipher_name): argument
228 cipher = BasicCipher(cipher_name, key, b'')
236 def _pbes2_iv(enc_params, cipher_name, key): argument
331 enc_handler, cipher_name = _pbes2_cipher[enc_alg]
335 return enc_handler(enc_params, cipher_name, key)
341 _pkcs1_cipher[pkcs1_dek_name] = cipher_name
354 handler, cipher_name):
387 cipher_name = _pkcs1_cipher[pkcs1_dek_name]
[all …]
H A Dencryption.py38 def new(cls, cipher_name, key, iv, mac_alg=b'', mac_key=b'', etm=False): argument
73 def new(cls, cipher_name, key, iv, mac_alg=b'', mac_key=b'', etm=False): argument
76 cipher = BasicCipher(cipher_name, key, iv)
142 def new(cls, cipher_name, key, iv, mac_alg=b'', mac_key=b'', etm=False): argument
145 return cls(GCMCipher(cipher_name, key, iv))
208 def register_encryption_alg(enc_alg, encryption, cipher_name, default): argument
212 get_cipher_params(cipher_name)
221 _enc_params[enc_alg] = (encryption, cipher_name)
239 encryption, cipher_name = _enc_params[enc_alg]
250 encryption, cipher_name = _enc_params[enc_alg]
[all …]
/dports/net/vtun/vtun-3.0.4/
H A Dlfd_encrypt.c155 char cipher_name[32]; in alloc_encrypt() local
200 strcpy(cipher_name,"AES-256-ECB"); in alloc_encrypt()
218 strcpy(cipher_name,"AES-128-ECB"); in alloc_encrypt()
369 char cipher_name[32]; in cipher_enc_init() local
375 strcpy(cipher_name, "AES-256-OFB"); in cipher_enc_init()
380 strcpy(cipher_name, "AES-256-CFB"); in cipher_enc_init()
385 strcpy(cipher_name, "AES-256-CBC"); in cipher_enc_init()
390 strcpy(cipher_name, "AES-128-OFB"); in cipher_enc_init()
394 strcpy(cipher_name, "AES-128-CFB"); in cipher_enc_init()
398 strcpy(cipher_name, "AES-128-CBC"); in cipher_enc_init()
[all …]
/dports/databases/xtrabackup8/percona-xtrabackup-8.0.14/mysql-test/suite/auth_sec/include/
H A Dcipher_test.inc14 --let $cipher_name = `SELECT JSON_UNQUOTE(JSON_EXTRACT(ciphers, '$[$i]')) FROM $cipher_db.p`
15 --echo # Expecting connection success with cipher: $cipher_name
25 --let $cipher_name = `SELECT JSON_UNQUOTE(JSON_EXTRACT(ciphers, '$[$i]')) FROM $cipher_db.a`
26 --echo # Expecting connection success with cipher: $cipher_name
36 --let $cipher_name = `SELECT JSON_UNQUOTE(JSON_EXTRACT(ciphers, '$[$i]')) FROM $cipher_db.d`
37 --echo # Expecting connection success with cipher: $cipher_name
47 --let $cipher_name = `SELECT JSON_UNQUOTE(JSON_EXTRACT(ciphers, '$[$i]')) FROM $cipher_db.n`
48 --eval SET @@global.ssl_cipher = '$cipher_name'
50 --echo # Expecting connection success with cipher: $cipher_name
62 --let $cipher_name = `SELECT JSON_UNQUOTE(JSON_EXTRACT(ciphers, '$[$i]')) FROM $cipher_db.b`
[all …]
/dports/security/py-pycrypto/pycrypto-2.6.1/
H A Dpct-speedtest.py94 def test_key_setup(self, cipher_name, module, key_bytes, mode): argument
95 self.announce_start("%s key setup" % (cipher_name,))
115 def test_encryption(self, cipher_name, module, key_bytes, mode): argument
116 self.announce_start("%s encryption" % (cipher_name,))
202 for cipher_name, module, key_bytes in block_specs:
203 self.test_key_setup(cipher_name, module, key_bytes, module.MODE_CBC)
204 self.test_encryption("%s-CBC" % (cipher_name,), module, key_bytes, module.MODE_CBC)
206 self.test_encryption("%s-OFB" % (cipher_name,), module, key_bytes, module.MODE_OFB)
210 for cipher_name, module, key_bytes in stream_specs:
211 self.test_key_setup(cipher_name, module, key_bytes, None)
[all …]
/dports/security/p5-CryptX/CryptX-0.075/lib/Crypt/
H A DMisc.pm118 my ($ptype, $cipher_name, $iv_hex);
122 ($cipher_name, $iv_hex) = $v =~ /^\s*(.*?)\s*,\s*([0-9a-fA-F]+)\s*$/ if $k eq 'DEK-Info';
124 if ($cipher_name && $iv_hex && $ptype && $ptype eq '4,ENCRYPTED') {
127 my ($mode, $klen) = _name2mode($cipher_name);
135 my ($data, $header_name, $password, $cipher_name) = @_;
140 $cipher_name ||= 'AES-256-CBC';
141 my ($mode, $klen, $ilen) = _name2mode($cipher_name);
145 push @headers, 'Proc-Type: 4,ENCRYPTED', "DEK-Info: ".uc($cipher_name).",".unpack("H*", $iv);
213 my $cipher_name = uc(shift);
217 croak "FATAL: unsupported cipher '$cipher_name'" unless $cipher && $mode;
[all …]
/dports/security/p5-Alt-Crypt-RSA-BigInt/Alt-Crypt-RSA-BigInt-0.06/lib/Crypt/RSA/Key/Private/
H A DSSH.pm127 my $cipher_name;
132 $cipher_name = $name; last;
135 if (!defined $cipher_name) {
140 -cipher => $cipher_name );
182 my $cipher_name = defined $params{Cipher} ? $params{Cipher}
190 $cipher_type = $CIPHERS_TEXT{ uc $cipher_name };
191 croak "Unknown cipher: '$cipher_name'" unless defined $cipher_type;
222 my $cipher_name;
227 $cipher_name = $name; last;
230 if (!defined $cipher_name) {
[all …]
/dports/security/p5-Crypt-RSA/Crypt-RSA-1.99/lib/Crypt/RSA/Key/Private/
H A DSSH.pm81 my $cipher_name = $CIPHERS{$cipher_type} or
83 my $class = 'Crypt::' . $cipher_name;
85 if ($@) { croak "Unsupported cipher '$cipher_name': $@" }
87 my $cipher = Crypt::CBC->new($passphrase, $cipher_name);
143 my $cipher_name = $CIPHERS{$cipher_type};
144 my $class = 'Crypt::' . $cipher_name;
146 if ($@) { croak "Unsupported cipher '$cipher_name': $@" }
148 my $cipher = Crypt::CBC->new($passphrase, $cipher_name);
/dports/security/py-asyncssh/asyncssh-2.8.1/asyncssh/crypto/
H A Dcipher.py39 def __init__(self, cipher_name, key, iv): argument
40 cipher, mode, initial_bytes = _cipher_algs[cipher_name]
74 def __init__(self, cipher_name, key, iv): argument
75 self._cipher = _cipher_algs[cipher_name][0]
119 def register_cipher(cipher_name, key_size, iv_size, block_size): argument
122 _cipher_params[cipher_name] = (key_size, iv_size, block_size)
125 def get_cipher_params(cipher_name): argument
128 return _cipher_params[cipher_name]
/dports/security/botan110/Botan-1.10.17/src/engine/openssl/
H A Dossl_bc.cpp22 std::string name() const { return cipher_name; } in name()
42 std::string cipher_name; member in Botan::__anon55a7e0310111::EVP_BlockCipher
53 cipher_name(algo_name) in EVP_BlockCipher()
78 cipher_name(algo_name) in EVP_BlockCipher()
130 if(cipher_name == "TripleDES" && length == 16) in key_schedule()
138 cipher_name); in key_schedule()
140 if(cipher_name == "RC2") in key_schedule()
156 cipher_name, in clone()
/dports/security/john/john-1.9.0-jumbo-1/run/
H A Dansible2john.py40 cipher_name = tmpheader[2].strip()
47 cipher_name = cipher_name .decode("ascii")
49 if cipher_name != "AES256":
50 sys.stderr.write("%s: unsupported ciper '%s' found!\n" % (bfilename, cipher_name))
/dports/emulators/qemu60/qemu-6.0.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/dports/emulators/qemu42/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/dports/emulators/qemu/qemu-6.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/dports/emulators/qemu-utils/qemu-4.2.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/dports/emulators/qemu5/qemu-5.2.0/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/dports/sysutils/uefi-edk2-qemu/edk2-edk2-stable201911/CryptoPkg/Library/OpensslLib/openssl/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/dports/sysutils/uefi-edk2-bhyve/edk2-edk2-stable202102/CryptoPkg/Library/OpensslLib/openssl/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher);
171 if (strncmp(cipher_name, "PSK-", 4) != 0)
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0))
176 TEST_info("%s OK", cipher_name);
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0))
183 TEST_info("%s without EtM OK", cipher_name);
/dports/security/acmed/acmed-0.18.0/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/dports/emulators/qemu-guest-agent/qemu-5.0.1/roms/edk2/CryptoPkg/Library/OpensslLib/openssl/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/dports/textproc/mdbook-linkcheck/mdbook-linkcheck-0.7.6/cargo-crates/openssl-src-300.0.2+3.0.0/openssl/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/dports/security/openssl/openssl-1.1.1n/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()
/dports/security/openssl-devel/openssl-3.0.2/test/
H A Ddtls_mtu_test.c168 const char *cipher_name = SSL_CIPHER_get_name(cipher); in run_mtu_tests() local
171 if (strncmp(cipher_name, "PSK-", 4) != 0) in run_mtu_tests()
174 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 0), 0)) in run_mtu_tests()
176 TEST_info("%s OK", cipher_name); in run_mtu_tests()
181 if (!TEST_int_gt(ret = mtu_test(ctx, cipher_name, 1), 0)) in run_mtu_tests()
183 TEST_info("%s without EtM OK", cipher_name); in run_mtu_tests()

12345678910>>...22