search for: ciphername

Displaying 5 results from an estimated 5 matches for "ciphername".

2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
...??? ?printf(" %s", comment); +?? ?printf("\n"); +?? ?if (log_level_get() >= SYSLOG_LEVEL_VERBOSE) { +?? ??? ?printf("Key protection details:\n"); +?? ??? ?printf("File format: %s\n", sshkey_format_name(vault_info->format)); +?? ??? ?if ( (vault_info->ciphername == NULL || strcmp(vault_info->ciphername, "none") == 0) +?? ??? ?? || (vault_info->kdfname == NULL || strcmp(vault_info->kdfname, "none") == 0)) { +?? ??? ??? ?printf("no passphrase\n"); +?? ??? ?} else { +?? ??? ??? ?printf("cipher: %s\n", vault_inf...
2014 Mar 03
6
[Bug 2207] New: Potential NULL deference, found using coverity
..."memcmp(buffer_ptr(&copy), "openssh-key-v1", 15U /* sizeof ("openssh-key-v1") */)", taking false branch path:/c/amesh/142/src/crypto/openssh/authfile.c:265: if_end: End of if statement path:/c/amesh/142/src/crypto/openssh/authfile.c:269: cond_false: Condition "ciphername == NULL", taking false branch path:/c/amesh/142/src/crypto/openssh/authfile.c:269: cond_false: Condition "(c = cipher_by_name(ciphername)) == NULL", taking false branch path:/c/amesh/142/src/crypto/openssh/authfile.c:273: if_end: End of if statement path:/c/amesh/142/src/crypto/opens...
2006 Feb 05
0
Add LUKS support to fstype, second version
...======= --- /dev/null 1970-01-01 00:00:00.000000000 +0000 +++ klibc/usr/kinit/fstype/luks_fs.h 2006-02-05 10:57:52.000000000 +0100 @@ -0,0 +1,45 @@ +#ifndef __LINUX_LUKS_FS_H +#define __LINUX_LUKS_FS_H + +/* The basic structures of the luks partition header */ +#define LUKS_MAGIC_L 6 +#define LUKS_CIPHERNAME_L 32 +#define LUKS_CIPHERMODE_L 32 +#define LUKS_HASHSPEC_L 32 +#define LUKS_UUID_STRING_L 40 + +#define LUKS_MAGIC "LUKS\xBA\xBE" +#define LUKS_DIGESTSIZE 20 +#define LUKS_SALTSIZE 32 +#define LUKS_NUMKEYS 8 +#define LUKS_MKD_ITER 10 +#define LUKS_KEY_DISABLED 0x0000DEAD +#define L...
2023 Mar 26
1
[Bug 3553] New: PROTOCOL.key format specification is incorrect for encryption using AEAD transports
...veloper on a wild goose chase trying to figure out why their cryptography library is broken - hi!). - Parsing of keys encoded by `ssh-keygen` (and by other ecosystem players following its implementation-specific details) now needs to be interleaved with interpretation. It is necessary to parse the `ciphername` field, interpret it to determine what the expected tag length is, and then provide that as input to the remainder of the parser. I don't know what the intended specification is here; it looks like `ssh-keygen` was itself updated after the fact to parse this format (https://github.com/openssh/...
2007 Jul 14
10
[Bug 1340] New: Support for Camellia block cipher to OpenSSH-portable.
http://bugzilla.mindrot.org/show_bug.cgi?id=1340 Summary: Support for Camellia block cipher to OpenSSH-portable. Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P2 Component: Miscellaneous AssignedTo: bitbucket at mindrot.org