Displaying 5 results from an estimated 5 matches for "ciphernam".
Did you mean:
ciphername
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
...??? ?printf(" %s", comment);
+?? ?printf("\n");
+?? ?if (log_level_get() >= SYSLOG_LEVEL_VERBOSE) {
+?? ??? ?printf("Key protection details:\n");
+?? ??? ?printf("File format: %s\n",
sshkey_format_name(vault_info->format));
+?? ??? ?if ( (vault_info->ciphername == NULL ||
strcmp(vault_info->ciphername, "none") == 0)
+?? ??? ?? || (vault_info->kdfname == NULL ||
strcmp(vault_info->kdfname, "none") == 0)) {
+?? ??? ??? ?printf("no passphrase\n");
+?? ??? ?} else {
+?? ??? ??? ?printf("cipher: %s\n", vault_in...
2014 Mar 03
6
[Bug 2207] New: Potential NULL deference, found using coverity
..."memcmp(buffer_ptr(©), "openssh-key-v1", 15U
/* sizeof ("openssh-key-v1") */)", taking false branch
path:/c/amesh/142/src/crypto/openssh/authfile.c:265:
if_end: End of if statement
path:/c/amesh/142/src/crypto/openssh/authfile.c:269:
cond_false: Condition "ciphername == NULL", taking false branch
path:/c/amesh/142/src/crypto/openssh/authfile.c:269:
cond_false: Condition "(c = cipher_by_name(ciphername)) == NULL",
taking false branch
path:/c/amesh/142/src/crypto/openssh/authfile.c:273:
if_end: End of if statement
path:/c/amesh/142/src/crypto/open...
2006 Feb 05
0
Add LUKS support to fstype, second version
...=======
--- /dev/null 1970-01-01 00:00:00.000000000 +0000
+++ klibc/usr/kinit/fstype/luks_fs.h 2006-02-05 10:57:52.000000000 +0100
@@ -0,0 +1,45 @@
+#ifndef __LINUX_LUKS_FS_H
+#define __LINUX_LUKS_FS_H
+
+/* The basic structures of the luks partition header */
+#define LUKS_MAGIC_L 6
+#define LUKS_CIPHERNAME_L 32
+#define LUKS_CIPHERMODE_L 32
+#define LUKS_HASHSPEC_L 32
+#define LUKS_UUID_STRING_L 40
+
+#define LUKS_MAGIC "LUKS\xBA\xBE"
+#define LUKS_DIGESTSIZE 20
+#define LUKS_SALTSIZE 32
+#define LUKS_NUMKEYS 8
+#define LUKS_MKD_ITER 10
+#define LUKS_KEY_DISABLED 0x0000DEAD
+#define...
2023 Mar 26
1
[Bug 3553] New: PROTOCOL.key format specification is incorrect for encryption using AEAD transports
...veloper on a wild
goose chase trying to figure out why their cryptography library is
broken - hi!).
- Parsing of keys encoded by `ssh-keygen` (and by other ecosystem
players following its implementation-specific details) now needs to be
interleaved with interpretation. It is necessary to parse the
`ciphername` field, interpret it to determine what the expected tag
length is, and then provide that as input to the remainder of the
parser.
I don't know what the intended specification is here; it looks like
`ssh-keygen` was itself updated after the fact to parse this format
(https://github.com/openssh...
2007 Jul 14
10
[Bug 1340] New: Support for Camellia block cipher to OpenSSH-portable.
http://bugzilla.mindrot.org/show_bug.cgi?id=1340
Summary: Support for Camellia block cipher to OpenSSH-portable.
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: Miscellaneous
AssignedTo: bitbucket at mindrot.org