Home
last modified time | relevance | path

Searched refs:ciphername (Results 1 – 4 of 4) sorted by relevance

/external/oss-fuzz/projects/openvpn/
Dcrypto_patch.txt17 @@ -737,6 +740,7 @@ warn_insecure_key_type(const char *ciphername, const cipher_kt_t *cipher)
23 init_key_type(struct key_type *kt, const char *ciphername,
25 @@ -752,6 +756,7 @@ init_key_type(struct key_type *kt, const char *ciphername,
26 kt->cipher = cipher_kt_get(ciphername);
30 msg(M_FATAL, "Cipher %s not supported", ciphername);
33 @@ -766,11 +771,13 @@ init_key_type(struct key_type *kt, const char *ciphername,
38 msg(M_FATAL, "Cipher '%s' mode not supported", ciphername);
44 msg(M_FATAL, "Cipher '%s' not allowed: block size too big.", ciphername);
47 @@ -782,6 +789,7 @@ init_key_type(struct key_type *kt, const char *ciphername,
55 @@ -797,6 +805,7 @@ init_key_type(struct key_type *kt, const char *ciphername,
[all …]
Dfuzz_crypto.c101 char *ciphername = gb_get_random_string(); in LLVMFuzzerTestOneInput() local
105 if (strcmp(ciphername, "AES-256-GCM") == 0 || in LLVMFuzzerTestOneInput()
106 strcmp(ciphername, "AES-128-GCM") == 0 || in LLVMFuzzerTestOneInput()
107 strcmp(ciphername, "AES-192-GCM") == 0 || in LLVMFuzzerTestOneInput()
108 strcmp(ciphername, "CAMELLIA-128-CFB128") == 0) { in LLVMFuzzerTestOneInput()
112 init_key_type(&kt, ciphername, authname, true, 0); in LLVMFuzzerTestOneInput()
114 init_key_type(&kt, ciphername, authname, false, 0); in LLVMFuzzerTestOneInput()
/external/python/cryptography/src/cryptography/hazmat/primitives/serialization/
Dssh.py109 def _init_cipher(ciphername, password, salt, rounds, backend): argument
114 algo, key_len, mode, iv_len = _SSH_CIPHERS[ciphername]
486 ciphername, data = _get_sshstr(data)
504 if (ciphername, kdfname) != (_NONE, _NONE):
505 ciphername = ciphername.tobytes()
506 if ciphername not in _SSH_CIPHERS:
507 raise UnsupportedAlgorithm("Unsupported cipher: %r" % ciphername)
510 blklen = _SSH_CIPHERS[ciphername][3]
516 ciphername, password, salt.tobytes(), rounds, backend
567 ciphername = _DEFAULT_CIPHER
[all …]
/external/python/cryptography/tests/hazmat/primitives/
Dtest_serialization.py2081 ciphername=b"none", argument
2119 main.put_sshstr(ciphername)
2138 data = self.make_file(kdfname=b"unknown", ciphername=b"aes256-ctr")
2143 data = self.make_file(ciphername=b"unknown", kdfname=b"bcrypt")