scanoss 0.12.0 → 0.12.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/assets/data/defaultCryptoRules.json +1752 -0
- package/package.json +3 -3
|
@@ -0,0 +1,1752 @@
|
|
|
1
|
+
[
|
|
2
|
+
{
|
|
3
|
+
"algorithm": "3des",
|
|
4
|
+
"strength": "128",
|
|
5
|
+
"keywords": [
|
|
6
|
+
"botan-3.dll",
|
|
7
|
+
"botan.dll",
|
|
8
|
+
"libbotan-3.dylib",
|
|
9
|
+
"libbotan-2.dylib",
|
|
10
|
+
"libbotan-3.so",
|
|
11
|
+
"libbotan-2.so",
|
|
12
|
+
"libbotan-2.s"
|
|
13
|
+
]
|
|
14
|
+
},
|
|
15
|
+
{
|
|
16
|
+
"algorithm": "3way",
|
|
17
|
+
"strength": "128",
|
|
18
|
+
"keywords": [
|
|
19
|
+
"3way.h",
|
|
20
|
+
"CRYPTOPP_THREEWAY_H"
|
|
21
|
+
]
|
|
22
|
+
},
|
|
23
|
+
{
|
|
24
|
+
"algorithm": "aes",
|
|
25
|
+
"strength": "256",
|
|
26
|
+
"keywords": [
|
|
27
|
+
"GibberishAES",
|
|
28
|
+
"aes.h",
|
|
29
|
+
"tiny-AES-c",
|
|
30
|
+
"AES_set_encrypt_key",
|
|
31
|
+
"AES_set_decrypt_key",
|
|
32
|
+
"AES_ige_encrypt",
|
|
33
|
+
"AES_ofb128_encrypt",
|
|
34
|
+
"AES_ecb_encrypt",
|
|
35
|
+
"AES_cbc_encrypt",
|
|
36
|
+
"AES_cfb8_encrypt",
|
|
37
|
+
"AES_cfb128_encrypt",
|
|
38
|
+
"AES_wrap_key",
|
|
39
|
+
"AES_cfb1_encrypt",
|
|
40
|
+
"AES_unwrap_key",
|
|
41
|
+
"aes.js",
|
|
42
|
+
"require('aes-js')",
|
|
43
|
+
"require('sjcl')",
|
|
44
|
+
"require('crypto-js');",
|
|
45
|
+
"CryptoJS.AES.encrypt",
|
|
46
|
+
"CryptoJS.AES.decryp",
|
|
47
|
+
"<openssl/aes.h>",
|
|
48
|
+
".getInstance(\"AES\");",
|
|
49
|
+
"module.exports = AES",
|
|
50
|
+
"AES.prototype",
|
|
51
|
+
"aes.AES",
|
|
52
|
+
"AES/CBC/NoPadding",
|
|
53
|
+
"AES/CBC/PKCS5Padding ",
|
|
54
|
+
"AES/ECB/NoPadding",
|
|
55
|
+
"AES/ECB/PKCS5Padding",
|
|
56
|
+
"AES/GCM/NoPadding"
|
|
57
|
+
]
|
|
58
|
+
},
|
|
59
|
+
{
|
|
60
|
+
"algorithm": "aria",
|
|
61
|
+
"strength": "128",
|
|
62
|
+
"keywords": [
|
|
63
|
+
"aria.cpp",
|
|
64
|
+
"aria.h",
|
|
65
|
+
"r.re.nsri.aria",
|
|
66
|
+
"ARIAEngine",
|
|
67
|
+
"ossl_aria_set_encrypt_key",
|
|
68
|
+
"ossl_aria_set_decrypt_key",
|
|
69
|
+
"ossl_aria_encrypt",
|
|
70
|
+
"#include <openssl/aria.h>",
|
|
71
|
+
"ARIA_set_encrypt_key",
|
|
72
|
+
"ARIA_encrypt",
|
|
73
|
+
".getInstance(\"ARIA/ECB/NoPadding\"",
|
|
74
|
+
".createCipheriv('ARIA-128-ECB'",
|
|
75
|
+
"crypto/aria",
|
|
76
|
+
"aria.NewCipher",
|
|
77
|
+
"ARIA-128-ECB",
|
|
78
|
+
"from Cryptodome.Cipher import ARIA",
|
|
79
|
+
"ARIA.new("
|
|
80
|
+
]
|
|
81
|
+
},
|
|
82
|
+
{
|
|
83
|
+
"algorithm": "ASN1",
|
|
84
|
+
"strength": "256",
|
|
85
|
+
"keywords": [
|
|
86
|
+
"#include <openssl/asn1.h>",
|
|
87
|
+
"ASN1_INTEGER_new",
|
|
88
|
+
"import org.bouncycastle.asn1.ASN1Integer",
|
|
89
|
+
"ASN1Integer",
|
|
90
|
+
"forge.asn1.Class.UNIVERSAL",
|
|
91
|
+
"from pyasn1.codec.der import encoder"
|
|
92
|
+
]
|
|
93
|
+
},
|
|
94
|
+
{
|
|
95
|
+
"algorithm": "bcrypt",
|
|
96
|
+
"strength": "320",
|
|
97
|
+
"keywords": [
|
|
98
|
+
"bcrypt",
|
|
99
|
+
"pycabcrypt.h",
|
|
100
|
+
"BCrypt.java",
|
|
101
|
+
"jBCrypt"
|
|
102
|
+
]
|
|
103
|
+
},
|
|
104
|
+
{
|
|
105
|
+
"algorithm": "blakex",
|
|
106
|
+
"strength": "256/512",
|
|
107
|
+
"keywords": [
|
|
108
|
+
"blake3.h",
|
|
109
|
+
"blake3_hasher_update",
|
|
110
|
+
"blake3_impl.h",
|
|
111
|
+
"BLAKE2b512",
|
|
112
|
+
"BLAKE2b256",
|
|
113
|
+
"blake2",
|
|
114
|
+
"pycabcrypt.h"
|
|
115
|
+
]
|
|
116
|
+
},
|
|
117
|
+
{
|
|
118
|
+
"algorithm": "blowfish",
|
|
119
|
+
"strength": "320",
|
|
120
|
+
"keywords": [
|
|
121
|
+
"egoroof-blowfish",
|
|
122
|
+
"blowfish"
|
|
123
|
+
]
|
|
124
|
+
},
|
|
125
|
+
{
|
|
126
|
+
"algorithm": "blum-goldwasser",
|
|
127
|
+
"strength": "320",
|
|
128
|
+
"keywords": [
|
|
129
|
+
"blumgoldwasser.py",
|
|
130
|
+
"BlumGoldwasser",
|
|
131
|
+
"sage.crypto.public_key.blum_goldwasser.BlumGoldwasser"
|
|
132
|
+
]
|
|
133
|
+
},
|
|
134
|
+
{
|
|
135
|
+
"algorithm": "cast",
|
|
136
|
+
"strength": "320",
|
|
137
|
+
"keywords": [
|
|
138
|
+
"CAST_ecb_encrypt",
|
|
139
|
+
"CAST_encrypt",
|
|
140
|
+
"CAST_decrypt",
|
|
141
|
+
"CAST_cbc_encrypt",
|
|
142
|
+
"CAST_set_key",
|
|
143
|
+
"CAST3.h",
|
|
144
|
+
"cast5.h",
|
|
145
|
+
"pyCast6"
|
|
146
|
+
]
|
|
147
|
+
},
|
|
148
|
+
{
|
|
149
|
+
"algorithm": "cmea",
|
|
150
|
+
"strength": "64",
|
|
151
|
+
"keywords": [
|
|
152
|
+
"startCMEA",
|
|
153
|
+
"CmeaSys"
|
|
154
|
+
]
|
|
155
|
+
},
|
|
156
|
+
{
|
|
157
|
+
"algorithm": "cms",
|
|
158
|
+
"strength": "64",
|
|
159
|
+
"keywords": [
|
|
160
|
+
"#include <openssl/cms.h>",
|
|
161
|
+
"CMS_ContentInfo_new",
|
|
162
|
+
"CMS_encrypt",
|
|
163
|
+
"import org.bouncycastle.cms.",
|
|
164
|
+
"CMSEnvelopedDataGenerator"
|
|
165
|
+
]
|
|
166
|
+
},
|
|
167
|
+
{
|
|
168
|
+
"algorithm": "crc16",
|
|
169
|
+
"strength": "16",
|
|
170
|
+
"keywords": [
|
|
171
|
+
"CRC_16",
|
|
172
|
+
"CRC_16CCITT",
|
|
173
|
+
"CRC_16XModem",
|
|
174
|
+
"CRC16"
|
|
175
|
+
]
|
|
176
|
+
},
|
|
177
|
+
{
|
|
178
|
+
"algorithm": "crc32",
|
|
179
|
+
"strength": "32",
|
|
180
|
+
"keywords": [
|
|
181
|
+
"crc32h.h",
|
|
182
|
+
"crc32.c",
|
|
183
|
+
"crc32_table",
|
|
184
|
+
"xcrc32"
|
|
185
|
+
]
|
|
186
|
+
},
|
|
187
|
+
{
|
|
188
|
+
"algorithm": "camellia",
|
|
189
|
+
"strength": "256",
|
|
190
|
+
"keywords": [
|
|
191
|
+
"camellia.core",
|
|
192
|
+
"CIPHERCAMELLIA256",
|
|
193
|
+
"CAMELLIA-256-CBC",
|
|
194
|
+
"Camellia_cfb8_encrypt",
|
|
195
|
+
"Camellia_ctr128_encrypt",
|
|
196
|
+
"Camellia_set_key",
|
|
197
|
+
"Camellia_EncryptBlock_Rounds",
|
|
198
|
+
"Camellia_DecryptBlock",
|
|
199
|
+
"Camellia_decrypt",
|
|
200
|
+
"Camellia_DecryptBlock_Rounds",
|
|
201
|
+
"Camellia_cfb128_encrypt",
|
|
202
|
+
"Camellia_Ekeygen",
|
|
203
|
+
"Camellia_EncryptBlock",
|
|
204
|
+
"Camellia_cbc_encrypt",
|
|
205
|
+
"Camellia_cfb1_encrypt",
|
|
206
|
+
"Camellia_ecb_encrypt",
|
|
207
|
+
"Camellia_encrypt",
|
|
208
|
+
"Camellia_ofb128_encrypt"
|
|
209
|
+
]
|
|
210
|
+
},
|
|
211
|
+
{
|
|
212
|
+
"algorithm": "chacha(salsa)",
|
|
213
|
+
"strength": "256",
|
|
214
|
+
"keywords": [
|
|
215
|
+
"TLS_RSA_WITH_CHACHA20_SHA",
|
|
216
|
+
"TLS_ECDHE_RSA_WITH_CHACHA20_SHA",
|
|
217
|
+
"TLS_ECDHE_ECDSA_WITH_CHACHA20_SHA",
|
|
218
|
+
"TLS_RSA_WITH_CHACHA20_POLY1305",
|
|
219
|
+
"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 ",
|
|
220
|
+
"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305",
|
|
221
|
+
"TLS_DHE_RSA_WITH_CHACHA20_POLY1305",
|
|
222
|
+
"TLS_DHE_PSK_WITH_CHACHA20_POLY1305",
|
|
223
|
+
"TLS_PSK_WITH_CHACHA20_POLY1305",
|
|
224
|
+
"TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305",
|
|
225
|
+
"TLS_RSA_PSK_WITH_CHACHA20_POLY1305",
|
|
226
|
+
"chacha20_core",
|
|
227
|
+
"ChaCha20_ctr32",
|
|
228
|
+
"#include <openssl/chacha.h>",
|
|
229
|
+
".getInstance(\"ChaCha20\")",
|
|
230
|
+
"createCipheriv('chacha20'",
|
|
231
|
+
"golang.org/x/crypto/chacha20poly1305",
|
|
232
|
+
"chacha20poly1305",
|
|
233
|
+
"sodium_crypto_stream_xchacha20_xor",
|
|
234
|
+
"from cryptography.hazmat.primitives.ciphers import ChaCha20",
|
|
235
|
+
"ChaCha20Poly1305",
|
|
236
|
+
"chacha_encrypt"
|
|
237
|
+
]
|
|
238
|
+
},
|
|
239
|
+
{
|
|
240
|
+
"algorithm": "cobra",
|
|
241
|
+
"strength": "128",
|
|
242
|
+
"keywords": [
|
|
243
|
+
"Cobra_algorithm",
|
|
244
|
+
"cobra.java"
|
|
245
|
+
]
|
|
246
|
+
},
|
|
247
|
+
{
|
|
248
|
+
"algorithm": "dcc",
|
|
249
|
+
"strength": "64",
|
|
250
|
+
"keywords": [
|
|
251
|
+
"DCC.py"
|
|
252
|
+
]
|
|
253
|
+
},
|
|
254
|
+
{
|
|
255
|
+
"algorithm": "des",
|
|
256
|
+
"strength": "168",
|
|
257
|
+
"keywords": [
|
|
258
|
+
"des_setparity",
|
|
259
|
+
"DESERR_NONE",
|
|
260
|
+
"DES_encrypt",
|
|
261
|
+
"DES_ncbc_",
|
|
262
|
+
"DES_set_",
|
|
263
|
+
"DES_ede3_",
|
|
264
|
+
"DES_ecb_",
|
|
265
|
+
"DES_pcbc_",
|
|
266
|
+
"DES_cfb",
|
|
267
|
+
"DES_cbc_",
|
|
268
|
+
"DES_random_key",
|
|
269
|
+
"DES_ecb3_",
|
|
270
|
+
"DES_ofb",
|
|
271
|
+
"DES_is_weak_key",
|
|
272
|
+
"DES_check_key_parity",
|
|
273
|
+
"DES_key_sched",
|
|
274
|
+
"DES_crypt",
|
|
275
|
+
"DES_quad_cksum",
|
|
276
|
+
"DES_string_to_key",
|
|
277
|
+
"DES_xcbc_",
|
|
278
|
+
"DES_string_to_2keys",
|
|
279
|
+
"DES_fcrypt",
|
|
280
|
+
"DESede/CBC",
|
|
281
|
+
"DESede/ECB"
|
|
282
|
+
]
|
|
283
|
+
},
|
|
284
|
+
{
|
|
285
|
+
"algorithm": "desede",
|
|
286
|
+
"strength": "168",
|
|
287
|
+
"keywords": [
|
|
288
|
+
"javax.crypto.spec.DESedeKeySpec",
|
|
289
|
+
"DESedeKeySpec",
|
|
290
|
+
"DES_EDE_KEY_LEN"
|
|
291
|
+
]
|
|
292
|
+
},
|
|
293
|
+
{
|
|
294
|
+
"algorithm": "CMAC",
|
|
295
|
+
"strength": "128",
|
|
296
|
+
"keywords": [
|
|
297
|
+
"#include <openssl/cmac.h>",
|
|
298
|
+
".getInstance(\"AESCMAC\");",
|
|
299
|
+
"from Crypto.Hash import CMAC"
|
|
300
|
+
]
|
|
301
|
+
},
|
|
302
|
+
{
|
|
303
|
+
"algorithm": "diffiehellman",
|
|
304
|
+
"strength": "128",
|
|
305
|
+
"keywords": [
|
|
306
|
+
"getDhObjectFromEvent",
|
|
307
|
+
"RSA_DH.cpp",
|
|
308
|
+
"dh_cmp_parameters",
|
|
309
|
+
"dh_pkey_",
|
|
310
|
+
"DH_get_ex_data",
|
|
311
|
+
"DH_meth_",
|
|
312
|
+
"DH_check_params_ex",
|
|
313
|
+
"dh_gen_named_group",
|
|
314
|
+
"dh_param_init",
|
|
315
|
+
"DH_set_ex_data",
|
|
316
|
+
"ossl_dh_",
|
|
317
|
+
"DH_test_flags",
|
|
318
|
+
"DH_set0_",
|
|
319
|
+
"DH_security_bits",
|
|
320
|
+
"DH_set_default_method",
|
|
321
|
+
"DH_get0_",
|
|
322
|
+
"dh_public_print"
|
|
323
|
+
]
|
|
324
|
+
},
|
|
325
|
+
{
|
|
326
|
+
"algorithm": "dhe",
|
|
327
|
+
"strength": "128",
|
|
328
|
+
"keywords": [
|
|
329
|
+
"ECDHE-RSA-AES",
|
|
330
|
+
"DHE-RSA-AES",
|
|
331
|
+
"DHE-RSA-CAMELLIA256-SHA",
|
|
332
|
+
"DHE-RSA-CAMELLIA128-SHA"
|
|
333
|
+
]
|
|
334
|
+
},
|
|
335
|
+
{
|
|
336
|
+
"algorithm": "dhies",
|
|
337
|
+
"strength": "128",
|
|
338
|
+
"keywords": [
|
|
339
|
+
"DHIES"
|
|
340
|
+
]
|
|
341
|
+
},
|
|
342
|
+
{
|
|
343
|
+
"algorithm": "ecdh",
|
|
344
|
+
"strength": "128",
|
|
345
|
+
"keywords": [
|
|
346
|
+
"ecdh_generate_keys",
|
|
347
|
+
"ecdh_shared_secret",
|
|
348
|
+
"ECC_PRV_KEY_SIZE"
|
|
349
|
+
]
|
|
350
|
+
},
|
|
351
|
+
{
|
|
352
|
+
"algorithm": "ecmqv",
|
|
353
|
+
"strength": "128",
|
|
354
|
+
"keywords": [
|
|
355
|
+
"ECMQV",
|
|
356
|
+
"IEEEP1363",
|
|
357
|
+
"#include <openssl/ecdh.h>",
|
|
358
|
+
"EC_KEY_generate_key",
|
|
359
|
+
".getInstance(\"EC\"",
|
|
360
|
+
"import org.bouncycastle.jce.ECNamedCurveTable",
|
|
361
|
+
"require('elliptic').ec",
|
|
362
|
+
"crypto/elliptic",
|
|
363
|
+
"crypto/ecdsa",
|
|
364
|
+
"secp256r1"
|
|
365
|
+
]
|
|
366
|
+
},
|
|
367
|
+
{
|
|
368
|
+
"algorithm": "elgamal",
|
|
369
|
+
"strength": "128",
|
|
370
|
+
"keywords": [
|
|
371
|
+
"egKey",
|
|
372
|
+
"elgamal.py",
|
|
373
|
+
"elgamal.h",
|
|
374
|
+
"ElGamalEncryptor",
|
|
375
|
+
"ElGamalDecryptor",
|
|
376
|
+
"CRYPTOPP_ELGAMAL_H"
|
|
377
|
+
]
|
|
378
|
+
},
|
|
379
|
+
{
|
|
380
|
+
"algorithm": "f8",
|
|
381
|
+
"strength": "128",
|
|
382
|
+
"keywords": [
|
|
383
|
+
"SrtpCipherF8",
|
|
384
|
+
"F8Context",
|
|
385
|
+
"processPacketAesF8"
|
|
386
|
+
]
|
|
387
|
+
},
|
|
388
|
+
{
|
|
389
|
+
"algorithm": "fasthash",
|
|
390
|
+
"strength": "256",
|
|
391
|
+
"keywords": [
|
|
392
|
+
"AQUAHASH_H"
|
|
393
|
+
]
|
|
394
|
+
},
|
|
395
|
+
{
|
|
396
|
+
"algorithm": "fcrypt",
|
|
397
|
+
"strength": "128",
|
|
398
|
+
"keywords": [
|
|
399
|
+
"fcrypt.encrypt",
|
|
400
|
+
"fcrypt.decrypt",
|
|
401
|
+
"fcrypt_ctx",
|
|
402
|
+
"fcrypt_mod_init",
|
|
403
|
+
"F_ENCRYPT"
|
|
404
|
+
]
|
|
405
|
+
},
|
|
406
|
+
{
|
|
407
|
+
"algorithm": "fnv1",
|
|
408
|
+
"strength": "1024",
|
|
409
|
+
"keywords": [
|
|
410
|
+
"Fnv1a1024",
|
|
411
|
+
"Fnv1a256",
|
|
412
|
+
"Fnv1a512",
|
|
413
|
+
"Fnv1aBigBase"
|
|
414
|
+
]
|
|
415
|
+
},
|
|
416
|
+
{
|
|
417
|
+
"algorithm": "feal",
|
|
418
|
+
"strength": "64",
|
|
419
|
+
"keywords": [
|
|
420
|
+
"FEAL_key_schedule",
|
|
421
|
+
"FEAL_Encrypt",
|
|
422
|
+
"FEAL_Decrypt",
|
|
423
|
+
"feal8.h"
|
|
424
|
+
]
|
|
425
|
+
},
|
|
426
|
+
{
|
|
427
|
+
"algorithm": "fletcher",
|
|
428
|
+
"strength": "64",
|
|
429
|
+
"keywords": [
|
|
430
|
+
"fletcher64",
|
|
431
|
+
"fletcher32",
|
|
432
|
+
"fletcher16"
|
|
433
|
+
]
|
|
434
|
+
},
|
|
435
|
+
{
|
|
436
|
+
"algorithm": "fortuna",
|
|
437
|
+
"strength": "64",
|
|
438
|
+
"keywords": [
|
|
439
|
+
"fortuna"
|
|
440
|
+
]
|
|
441
|
+
},
|
|
442
|
+
{
|
|
443
|
+
"algorithm": "feal",
|
|
444
|
+
"strength": "64",
|
|
445
|
+
"keywords": [
|
|
446
|
+
"FEAL_key_schedule",
|
|
447
|
+
"FEAL_Encrypt",
|
|
448
|
+
"FEAL_Decrypt",
|
|
449
|
+
"feal8.h"
|
|
450
|
+
]
|
|
451
|
+
},
|
|
452
|
+
{
|
|
453
|
+
"algorithm": "gea0-x",
|
|
454
|
+
"strength": "64-128",
|
|
455
|
+
"keywords": [
|
|
456
|
+
"LL_GEA",
|
|
457
|
+
"hf_nas_eps_emm_gea"
|
|
458
|
+
]
|
|
459
|
+
},
|
|
460
|
+
{
|
|
461
|
+
"algorithm": "gost",
|
|
462
|
+
"strength": "64",
|
|
463
|
+
"keywords": [
|
|
464
|
+
"gost_28147_89",
|
|
465
|
+
"gost.hpp",
|
|
466
|
+
"GOST28147_COMPRESSED_SBOX",
|
|
467
|
+
"GOST28147EncryptCycle",
|
|
468
|
+
"GOST28147EncryptBlock",
|
|
469
|
+
"GOST28147SBoxTransformation"
|
|
470
|
+
]
|
|
471
|
+
},
|
|
472
|
+
{
|
|
473
|
+
"algorithm": "grain",
|
|
474
|
+
"strength": "128",
|
|
475
|
+
"keywords": [
|
|
476
|
+
"grain128aead.h",
|
|
477
|
+
"Grain-128AEAD",
|
|
478
|
+
"grain_data",
|
|
479
|
+
"grain_state",
|
|
480
|
+
"Grain128Engine",
|
|
481
|
+
"grain.h"
|
|
482
|
+
]
|
|
483
|
+
},
|
|
484
|
+
{
|
|
485
|
+
"algorithm": "haval",
|
|
486
|
+
"strength": "128",
|
|
487
|
+
"keywords": [
|
|
488
|
+
"haval.h",
|
|
489
|
+
"haval_context",
|
|
490
|
+
"Haval-160",
|
|
491
|
+
"Haval-192",
|
|
492
|
+
"Haval-224",
|
|
493
|
+
"Haval-256",
|
|
494
|
+
"Haval-128"
|
|
495
|
+
]
|
|
496
|
+
},
|
|
497
|
+
{
|
|
498
|
+
"algorithm": "hc128",
|
|
499
|
+
"strength": "128",
|
|
500
|
+
"keywords": [
|
|
501
|
+
"CRYPTOPP_HC128_H",
|
|
502
|
+
"HC-128",
|
|
503
|
+
"HC128Info",
|
|
504
|
+
"Hc128Rng"
|
|
505
|
+
]
|
|
506
|
+
},
|
|
507
|
+
{
|
|
508
|
+
"algorithm": "hc256",
|
|
509
|
+
"strength": "256",
|
|
510
|
+
"keywords": [
|
|
511
|
+
"hc256_generate",
|
|
512
|
+
"hc256_setkey",
|
|
513
|
+
"hc256_crypt",
|
|
514
|
+
"CRYPTOPP_HC256_H"
|
|
515
|
+
]
|
|
516
|
+
},
|
|
517
|
+
{
|
|
518
|
+
"algorithm": "ice",
|
|
519
|
+
"strength": "128",
|
|
520
|
+
"keywords": [
|
|
521
|
+
"node-ice",
|
|
522
|
+
"iceKey",
|
|
523
|
+
"__RUBY_ICE_KEY_H",
|
|
524
|
+
"ice_cipher_",
|
|
525
|
+
"IceSubkey"
|
|
526
|
+
]
|
|
527
|
+
},
|
|
528
|
+
{
|
|
529
|
+
"algorithm": "isaac",
|
|
530
|
+
"strength": "256",
|
|
531
|
+
"keywords": [
|
|
532
|
+
"isaacCSPRNG",
|
|
533
|
+
"isaacRandomPool.h"
|
|
534
|
+
]
|
|
535
|
+
},
|
|
536
|
+
{
|
|
537
|
+
"algorithm": "idea",
|
|
538
|
+
"strength": "64",
|
|
539
|
+
"keywords": [
|
|
540
|
+
"IdeaMode_h",
|
|
541
|
+
"IdeaEncryptStreamStatus",
|
|
542
|
+
"IdeaStreamEncrypt",
|
|
543
|
+
"IdeaStreamDecrypt",
|
|
544
|
+
"IdeaStreamCTRRandomAccessInit",
|
|
545
|
+
"IdeaStreamPCB",
|
|
546
|
+
"IdeaStreamCFB"
|
|
547
|
+
]
|
|
548
|
+
},
|
|
549
|
+
{
|
|
550
|
+
"algorithm": "juniper",
|
|
551
|
+
"strength": "",
|
|
552
|
+
"keywords": [
|
|
553
|
+
"mod_Juniper_Decrypt",
|
|
554
|
+
"juniper_decrypt"
|
|
555
|
+
]
|
|
556
|
+
},
|
|
557
|
+
{
|
|
558
|
+
"algorithm": "khazad",
|
|
559
|
+
"strength": "16",
|
|
560
|
+
"keywords": [
|
|
561
|
+
"KHAZAD_ROUNDS",
|
|
562
|
+
"khazad_setkey",
|
|
563
|
+
"khazad_crypt",
|
|
564
|
+
"khazad_encrypt",
|
|
565
|
+
"khazad_decrypt",
|
|
566
|
+
"khazad_mod_fini",
|
|
567
|
+
"khazad-min.h",
|
|
568
|
+
"KHAZAD_H",
|
|
569
|
+
"KHAZAD_BLOCK_SIZE",
|
|
570
|
+
"KHAZAD_NUM_ROUNDS",
|
|
571
|
+
"KHAZAD_KEY_"
|
|
572
|
+
]
|
|
573
|
+
},
|
|
574
|
+
{
|
|
575
|
+
"algorithm": "kazumi",
|
|
576
|
+
"strength": "64",
|
|
577
|
+
"keywords": [
|
|
578
|
+
"__KASUMI_H__",
|
|
579
|
+
"kasumi.h",
|
|
580
|
+
"kasumi_desc"
|
|
581
|
+
]
|
|
582
|
+
},
|
|
583
|
+
{
|
|
584
|
+
"algorithm": "keccak",
|
|
585
|
+
"strength": "256",
|
|
586
|
+
"keywords": [
|
|
587
|
+
"KeccakHash.h",
|
|
588
|
+
"Keccak_HashFinal",
|
|
589
|
+
"KeccakSum"
|
|
590
|
+
]
|
|
591
|
+
},
|
|
592
|
+
{
|
|
593
|
+
"algorithm": "feal",
|
|
594
|
+
"strength": "64",
|
|
595
|
+
"keywords": [
|
|
596
|
+
"lmhashConstant",
|
|
597
|
+
"unKnownLMHashes",
|
|
598
|
+
"createLMHash"
|
|
599
|
+
]
|
|
600
|
+
},
|
|
601
|
+
{
|
|
602
|
+
"algorithm": "loki91",
|
|
603
|
+
"strength": "64",
|
|
604
|
+
"keywords": [
|
|
605
|
+
"loki.h",
|
|
606
|
+
"loki.i",
|
|
607
|
+
"loki_lib_ver",
|
|
608
|
+
"setlokikey",
|
|
609
|
+
"setlokikey"
|
|
610
|
+
]
|
|
611
|
+
},
|
|
612
|
+
{
|
|
613
|
+
"algorithm": "luc",
|
|
614
|
+
"strength": "64",
|
|
615
|
+
"keywords": [
|
|
616
|
+
"CRYPTOPP_LUC_H",
|
|
617
|
+
"LUCFunction",
|
|
618
|
+
"luc.h"
|
|
619
|
+
]
|
|
620
|
+
},
|
|
621
|
+
{
|
|
622
|
+
"algorithm": "lucifer",
|
|
623
|
+
"strength": "128",
|
|
624
|
+
"keywords": [
|
|
625
|
+
"lucifer.h"
|
|
626
|
+
]
|
|
627
|
+
},
|
|
628
|
+
{
|
|
629
|
+
"algorithm": "md160",
|
|
630
|
+
"strength": "64",
|
|
631
|
+
"keywords": [
|
|
632
|
+
"ripemd160.h",
|
|
633
|
+
"ripemd160_Init",
|
|
634
|
+
"ripemd160_process",
|
|
635
|
+
"ripemd160_update"
|
|
636
|
+
]
|
|
637
|
+
},
|
|
638
|
+
{
|
|
639
|
+
"algorithm": "md2",
|
|
640
|
+
"strength": "256",
|
|
641
|
+
"keywords": [
|
|
642
|
+
"MD2.py",
|
|
643
|
+
"md2_block",
|
|
644
|
+
"MD2_Init",
|
|
645
|
+
"MD2_Update",
|
|
646
|
+
"MD2_Final"
|
|
647
|
+
]
|
|
648
|
+
},
|
|
649
|
+
{
|
|
650
|
+
"algorithm": "md4",
|
|
651
|
+
"strength": "128",
|
|
652
|
+
"keywords": [
|
|
653
|
+
"MD4.h",
|
|
654
|
+
"MD4_HMAC_BLOCK_SIZE",
|
|
655
|
+
"MD4_BLOCK_WORDS",
|
|
656
|
+
"MD4_HASH_WORDS",
|
|
657
|
+
"MD4_DIGEST_SIZE",
|
|
658
|
+
"md4_update",
|
|
659
|
+
"md4_init",
|
|
660
|
+
"md4_final",
|
|
661
|
+
"MD4_Init",
|
|
662
|
+
"md4_block_data_order",
|
|
663
|
+
"#include <openssl/md4.h>",
|
|
664
|
+
"MD4_DIGEST_LENGTH",
|
|
665
|
+
".createHash('md4')",
|
|
666
|
+
"crypto/md4",
|
|
667
|
+
"hashlib.new('md4'"
|
|
668
|
+
]
|
|
669
|
+
},
|
|
670
|
+
{
|
|
671
|
+
"algorithm": "md5",
|
|
672
|
+
"strength": "128",
|
|
673
|
+
"keywords": [
|
|
674
|
+
"md5_file",
|
|
675
|
+
"md5",
|
|
676
|
+
"md5crypt",
|
|
677
|
+
"aprcrypt",
|
|
678
|
+
"md5_encrypt",
|
|
679
|
+
"md5_block_data_order",
|
|
680
|
+
"ossl_md5_sha1_",
|
|
681
|
+
"MD5_Init"
|
|
682
|
+
]
|
|
683
|
+
},
|
|
684
|
+
{
|
|
685
|
+
"algorithm": "md6",
|
|
686
|
+
"strength": "512",
|
|
687
|
+
"keywords": [
|
|
688
|
+
"MD6.py",
|
|
689
|
+
"md6_encrypt",
|
|
690
|
+
"CatMD6Crypto",
|
|
691
|
+
"md6Crypto.hash"
|
|
692
|
+
]
|
|
693
|
+
},
|
|
694
|
+
{
|
|
695
|
+
"algorithm": "mdc2",
|
|
696
|
+
"strength": "128",
|
|
697
|
+
"keywords": [
|
|
698
|
+
"MDC2.h",
|
|
699
|
+
"mdc2",
|
|
700
|
+
"mdc2_with_aes.py",
|
|
701
|
+
"MDC2_Init",
|
|
702
|
+
"MDC2_Update",
|
|
703
|
+
"MDC2_Final",
|
|
704
|
+
"mdc2_body"
|
|
705
|
+
]
|
|
706
|
+
},
|
|
707
|
+
{
|
|
708
|
+
"algorithm": "misty1",
|
|
709
|
+
"strength": "32",
|
|
710
|
+
"keywords": [
|
|
711
|
+
"misty1_keyinit",
|
|
712
|
+
"misty1_encrypt_block",
|
|
713
|
+
"MISTY1_KEYSIZE"
|
|
714
|
+
]
|
|
715
|
+
},
|
|
716
|
+
{
|
|
717
|
+
"algorithm": "mqv",
|
|
718
|
+
"strength": "512",
|
|
719
|
+
"keywords": [
|
|
720
|
+
"mqv.h",
|
|
721
|
+
"hmqv.h",
|
|
722
|
+
"ECMQV",
|
|
723
|
+
"EQV_Domain",
|
|
724
|
+
"ECHMQV512",
|
|
725
|
+
"ECHMQV384",
|
|
726
|
+
"ECHMQV256",
|
|
727
|
+
"ECHMQV128",
|
|
728
|
+
"FHMQV",
|
|
729
|
+
"FHMQV512",
|
|
730
|
+
"FHMQV384",
|
|
731
|
+
"FHMQV256",
|
|
732
|
+
"FHMQV128"
|
|
733
|
+
]
|
|
734
|
+
},
|
|
735
|
+
{
|
|
736
|
+
"algorithm": "mscash",
|
|
737
|
+
"strength": "256",
|
|
738
|
+
"keywords": [
|
|
739
|
+
"mscash.x.gz",
|
|
740
|
+
"mscash"
|
|
741
|
+
]
|
|
742
|
+
},
|
|
743
|
+
{
|
|
744
|
+
"algorithm": "mscash2",
|
|
745
|
+
"strength": "128",
|
|
746
|
+
"keywords": [
|
|
747
|
+
"mascash2"
|
|
748
|
+
]
|
|
749
|
+
},
|
|
750
|
+
{
|
|
751
|
+
"algorithm": "multi2",
|
|
752
|
+
"strength": "128",
|
|
753
|
+
"keywords": [
|
|
754
|
+
"multi2.h",
|
|
755
|
+
"LTC_MULTI2",
|
|
756
|
+
"multi2_desc",
|
|
757
|
+
"multi2_setup",
|
|
758
|
+
"multi2_ecb_encrypt",
|
|
759
|
+
"multi2_ecb_decrypt"
|
|
760
|
+
]
|
|
761
|
+
},
|
|
762
|
+
{
|
|
763
|
+
"algorithm": "mceliece",
|
|
764
|
+
"strength": "64",
|
|
765
|
+
"keywords": [
|
|
766
|
+
"MCELIECE_H",
|
|
767
|
+
"mceliece.h",
|
|
768
|
+
"mceliece_init",
|
|
769
|
+
"delete_mceliece",
|
|
770
|
+
"mceliececipher.py"
|
|
771
|
+
]
|
|
772
|
+
},
|
|
773
|
+
{
|
|
774
|
+
"algorithm": "ntruencrypt",
|
|
775
|
+
"strength": "128",
|
|
776
|
+
"keywords": [
|
|
777
|
+
"NTRU_NTRU_H",
|
|
778
|
+
"ntru.h",
|
|
779
|
+
"ntruprime_gen_key_pair",
|
|
780
|
+
"ntru_gen_key_pair_multi",
|
|
781
|
+
"ntru_gen_pub",
|
|
782
|
+
"ntru_encrypt",
|
|
783
|
+
"ntru_decrypt",
|
|
784
|
+
"net.sf.ntru.util"
|
|
785
|
+
]
|
|
786
|
+
},
|
|
787
|
+
{
|
|
788
|
+
"algorithm": "nimbus",
|
|
789
|
+
"strength": "256",
|
|
790
|
+
"keywords": [
|
|
791
|
+
"nimbusds.jose",
|
|
792
|
+
"JOSEObjectType "
|
|
793
|
+
]
|
|
794
|
+
},
|
|
795
|
+
{
|
|
796
|
+
"algorithm": "noekeon",
|
|
797
|
+
"strength": "128",
|
|
798
|
+
"keywords": [
|
|
799
|
+
"NoekeonIndirectRef",
|
|
800
|
+
"noekeon.h",
|
|
801
|
+
"NoekeonEngine",
|
|
802
|
+
"NoekeonEngine.cs"
|
|
803
|
+
]
|
|
804
|
+
},
|
|
805
|
+
{
|
|
806
|
+
"algorithm": "pbe",
|
|
807
|
+
"strength": "128",
|
|
808
|
+
"keywords": [
|
|
809
|
+
"org.xeustechnologies.crypto.kpbe",
|
|
810
|
+
"PBE",
|
|
811
|
+
"KPBE"
|
|
812
|
+
]
|
|
813
|
+
},
|
|
814
|
+
{
|
|
815
|
+
"algorithm": "pbes1",
|
|
816
|
+
"strength": "128",
|
|
817
|
+
"keywords": [
|
|
818
|
+
"PBEWithMD5AndDES",
|
|
819
|
+
"getPBES1EncryptionObject",
|
|
820
|
+
"getPBES1Hash",
|
|
821
|
+
"getPBES1KDF",
|
|
822
|
+
"PKCS5_SCHEME_PBES1"
|
|
823
|
+
]
|
|
824
|
+
},
|
|
825
|
+
{
|
|
826
|
+
"algorithm": "pbes2",
|
|
827
|
+
"strength": "256",
|
|
828
|
+
"keywords": [
|
|
829
|
+
"getPBES2EncryptionObject",
|
|
830
|
+
"id-PBES2",
|
|
831
|
+
"PBES2HS256A128KW",
|
|
832
|
+
"PBES2AESKW",
|
|
833
|
+
"PBES2-HS256+A128K"
|
|
834
|
+
]
|
|
835
|
+
},
|
|
836
|
+
{
|
|
837
|
+
"algorithm": "panama",
|
|
838
|
+
"strength": "128",
|
|
839
|
+
"keywords": [
|
|
840
|
+
"panama.h",
|
|
841
|
+
"panama_LTX__"
|
|
842
|
+
]
|
|
843
|
+
},
|
|
844
|
+
{
|
|
845
|
+
"algorithm": "quad",
|
|
846
|
+
"strength": "128",
|
|
847
|
+
"keywords": [
|
|
848
|
+
"QUAD.pack",
|
|
849
|
+
"QUAD.unpack"
|
|
850
|
+
]
|
|
851
|
+
},
|
|
852
|
+
{
|
|
853
|
+
"algorithm": "rc2",
|
|
854
|
+
"strength": "128",
|
|
855
|
+
"keywords": [
|
|
856
|
+
"rc2_LTX__mcrypt_",
|
|
857
|
+
"RC2_encrypt",
|
|
858
|
+
"RC2_decrypt",
|
|
859
|
+
"RC2_ecb_encrypt",
|
|
860
|
+
"RC2_set_key",
|
|
861
|
+
"RC2_cfb64_encrypt",
|
|
862
|
+
"RC2_ofb64_encrypt",
|
|
863
|
+
"RC2_cbc_encrypt",
|
|
864
|
+
"#include <openssl/rc2.h>"
|
|
865
|
+
]
|
|
866
|
+
},
|
|
867
|
+
{
|
|
868
|
+
"algorithm": "rc4",
|
|
869
|
+
"strength": "2048",
|
|
870
|
+
"keywords": [
|
|
871
|
+
"RC4_H",
|
|
872
|
+
"RC4_KEY_S",
|
|
873
|
+
"RC4_key",
|
|
874
|
+
"RC4",
|
|
875
|
+
"RC4_set_key"
|
|
876
|
+
]
|
|
877
|
+
},
|
|
878
|
+
{
|
|
879
|
+
"algorithm": "rc4-hmac",
|
|
880
|
+
"strength": "2048",
|
|
881
|
+
"keywords": [
|
|
882
|
+
"RC4-HMAC-MD5",
|
|
883
|
+
"RC4HMAC",
|
|
884
|
+
"RC4-HMAC.go"
|
|
885
|
+
]
|
|
886
|
+
},
|
|
887
|
+
{
|
|
888
|
+
"algorithm": "rc5",
|
|
889
|
+
"strength": "128",
|
|
890
|
+
"keywords": [
|
|
891
|
+
"RC5.new",
|
|
892
|
+
"rc5.rb",
|
|
893
|
+
"RC5Enc",
|
|
894
|
+
"RC5Dec",
|
|
895
|
+
"RC5Enc.java",
|
|
896
|
+
"RC5Dec.java",
|
|
897
|
+
"RC5_32_decrypt",
|
|
898
|
+
"RC5_32_set_key",
|
|
899
|
+
"RC5_32_cfb64_encrypt",
|
|
900
|
+
"RC5_32_ofb64_encrypt",
|
|
901
|
+
"RC5_32_ecb_encrypt",
|
|
902
|
+
"RC5_32_cbc_encrypt",
|
|
903
|
+
"RC5_32_encrypt",
|
|
904
|
+
"import org.bouncycastle.crypto.engines.RC532Engine",
|
|
905
|
+
"require('rc5-cipher')",
|
|
906
|
+
"rc5.encrypt(",
|
|
907
|
+
"github.com/inge6/gorc5",
|
|
908
|
+
"gorc5.NewCipher",
|
|
909
|
+
"require 'RC5.php'",
|
|
910
|
+
"RC5::encrypt",
|
|
911
|
+
"from rc5 import RC5"
|
|
912
|
+
]
|
|
913
|
+
},
|
|
914
|
+
{
|
|
915
|
+
"algorithm": "rc6",
|
|
916
|
+
"strength": "128",
|
|
917
|
+
"keywords": [
|
|
918
|
+
"AlgorithmRC6",
|
|
919
|
+
"RC6.encrypt",
|
|
920
|
+
"RC6.decript",
|
|
921
|
+
"RC6_HPP__"
|
|
922
|
+
]
|
|
923
|
+
},
|
|
924
|
+
{
|
|
925
|
+
"algorithm": "ripemd",
|
|
926
|
+
"strength": "128",
|
|
927
|
+
"keywords": [
|
|
928
|
+
"RIPEMD160_DIGEST_LENGTH",
|
|
929
|
+
"RIPEMD160_CTX",
|
|
930
|
+
"ripemd160_Init",
|
|
931
|
+
"ripemd160_process",
|
|
932
|
+
"ripemd160_Update",
|
|
933
|
+
"RIPEMD160_Init",
|
|
934
|
+
"ripemd160_block_data_order",
|
|
935
|
+
"ripemd160_block_x86",
|
|
936
|
+
"ripemd160_block",
|
|
937
|
+
"#include <openssl/ripemd.h>",
|
|
938
|
+
"RIPEMD160_Init",
|
|
939
|
+
"RIPEMD160_Update",
|
|
940
|
+
"RIPEMD160_Final",
|
|
941
|
+
".getInstance(\"RIPEMD160\")",
|
|
942
|
+
"crypto.createHash('ripemd160')",
|
|
943
|
+
"golang.org/x/crypto/ripemd160",
|
|
944
|
+
"ripemd160.New()",
|
|
945
|
+
"hash('ripemd160'",
|
|
946
|
+
"hashlib.new('ripemd160'"
|
|
947
|
+
]
|
|
948
|
+
},
|
|
949
|
+
{
|
|
950
|
+
"algorithm": "rsa-oaep",
|
|
951
|
+
"strength": "128",
|
|
952
|
+
"keywords": [
|
|
953
|
+
"encryptRSAWithOAEP",
|
|
954
|
+
"decryptRSAWithOAEP",
|
|
955
|
+
"RSA_OAEP_H",
|
|
956
|
+
"RSA_OAEP"
|
|
957
|
+
]
|
|
958
|
+
},
|
|
959
|
+
{
|
|
960
|
+
"algorithm": "rsa",
|
|
961
|
+
"strength": "128",
|
|
962
|
+
"keywords": [
|
|
963
|
+
"forge.pki.rsa.",
|
|
964
|
+
"require('node-rsa')",
|
|
965
|
+
"RSACRYPT_H",
|
|
966
|
+
"RSAcrypt",
|
|
967
|
+
"RSAdecrypt",
|
|
968
|
+
"JSEncryptRSAKey",
|
|
969
|
+
"ossl_rsa_acvp_",
|
|
970
|
+
"RSA_size",
|
|
971
|
+
"rsa_priv_print",
|
|
972
|
+
"RSA_verify_PKCS1_PSS",
|
|
973
|
+
"RSA_get0_crt_params",
|
|
974
|
+
"RSA_meth_set_",
|
|
975
|
+
"RSA_meth_free",
|
|
976
|
+
"RSA_padding_check_none",
|
|
977
|
+
"pkey_rsa_ctrl_str",
|
|
978
|
+
"ossl_rsa_check_",
|
|
979
|
+
"ossl_rsa_pss_get_param_unverified",
|
|
980
|
+
"rsa_pkey_dirty_cnt",
|
|
981
|
+
"rsa_int_import_from",
|
|
982
|
+
"rsa_pkey_import_from",
|
|
983
|
+
"ossl_rsa_dup",
|
|
984
|
+
"rsa_new_intern",
|
|
985
|
+
"RSA_set_method",
|
|
986
|
+
"RSA_sign_ASN1_OCTET_STRIN",
|
|
987
|
+
"rsa_validate_rng_strength",
|
|
988
|
+
"rsa_validate_keypair_multiprime",
|
|
989
|
+
"RSA_meth_new",
|
|
990
|
+
"RSA_verify_ASN1_OCTET_STRING",
|
|
991
|
+
"RSA_X931_generate_key_ex",
|
|
992
|
+
"RSA_generate_multi_prime_key",
|
|
993
|
+
"RSA_get_ex_data",
|
|
994
|
+
"RSA_padding_add_PKCS1_type_2",
|
|
995
|
+
"rsa_pub_encode",
|
|
996
|
+
"rsa_item_sign",
|
|
997
|
+
"EVP_PKEY_CTX_set_rsa_keygen_primes",
|
|
998
|
+
"RSA_padding_add_PKCS1_OAEP",
|
|
999
|
+
"RSA/ECB/",
|
|
1000
|
+
"RSAES-PKCS1-V1_5-ENCRYPT",
|
|
1001
|
+
"RSAES-PKCS1-V1_5"
|
|
1002
|
+
]
|
|
1003
|
+
},
|
|
1004
|
+
{
|
|
1005
|
+
"algorithm": "rabin",
|
|
1006
|
+
"strength": "128",
|
|
1007
|
+
"keywords": [
|
|
1008
|
+
"Rabin.genKey",
|
|
1009
|
+
"Rabin.encrypt",
|
|
1010
|
+
"Rabin.decrypt"
|
|
1011
|
+
]
|
|
1012
|
+
},
|
|
1013
|
+
{
|
|
1014
|
+
"algorithm": "rabbit",
|
|
1015
|
+
"strength": "128",
|
|
1016
|
+
"keywords": [
|
|
1017
|
+
"Rabbit_Util",
|
|
1018
|
+
"Rabbit_ctx",
|
|
1019
|
+
"Rabbit_state",
|
|
1020
|
+
"Rabbit_Cipher.py",
|
|
1021
|
+
"#include \"rabbit.h\"",
|
|
1022
|
+
"rabbit_encrypt",
|
|
1023
|
+
"SecretKeySpec(key, \"Rabbit\")",
|
|
1024
|
+
"createCipheriv('Rabbit'",
|
|
1025
|
+
"from Crypto.Cipher import Rabbit"
|
|
1026
|
+
]
|
|
1027
|
+
},
|
|
1028
|
+
{
|
|
1029
|
+
"algorithm": "rijndael",
|
|
1030
|
+
"strength": "256",
|
|
1031
|
+
"keywords": [
|
|
1032
|
+
"Rijndael.h",
|
|
1033
|
+
"Rijndael256"
|
|
1034
|
+
]
|
|
1035
|
+
},
|
|
1036
|
+
{
|
|
1037
|
+
"algorithm": "salsa10",
|
|
1038
|
+
"strength": "64",
|
|
1039
|
+
"keywords": [
|
|
1040
|
+
"salsa10",
|
|
1041
|
+
"salsa10-src.bin",
|
|
1042
|
+
"salsa10-nonce.bin"
|
|
1043
|
+
]
|
|
1044
|
+
},
|
|
1045
|
+
{
|
|
1046
|
+
"algorithm": "salsa20",
|
|
1047
|
+
"strength": "128",
|
|
1048
|
+
"keywords": [
|
|
1049
|
+
"ESTREAM_SALSA20",
|
|
1050
|
+
"wrap_salsa20_set_nonce",
|
|
1051
|
+
"c_salsa20_crypt",
|
|
1052
|
+
"#include \"salsa20.h\"",
|
|
1053
|
+
".createCipheriv('salsa20'",
|
|
1054
|
+
"from Crypto.Cipher import Salsa20",
|
|
1055
|
+
"Salsa20.new"
|
|
1056
|
+
]
|
|
1057
|
+
},
|
|
1058
|
+
{
|
|
1059
|
+
"algorithm": "shs",
|
|
1060
|
+
"strength": "128",
|
|
1061
|
+
"keywords": [
|
|
1062
|
+
"secret-handshake",
|
|
1063
|
+
"shsInit",
|
|
1064
|
+
"shs1",
|
|
1065
|
+
"shsInit",
|
|
1066
|
+
"SHS_CTX",
|
|
1067
|
+
"shsUpdate",
|
|
1068
|
+
"shs.h"
|
|
1069
|
+
]
|
|
1070
|
+
},
|
|
1071
|
+
{
|
|
1072
|
+
"algorithm": "sms4",
|
|
1073
|
+
"strength": "128",
|
|
1074
|
+
"keywords": [
|
|
1075
|
+
"sm4_encdec",
|
|
1076
|
+
"CRYPTOPP_SM4_H",
|
|
1077
|
+
"CRYPTOPP_SM4_ADVANCED_PROCESS_BLOCKS",
|
|
1078
|
+
"sms4.h",
|
|
1079
|
+
"SMS4CROL",
|
|
1080
|
+
"SMS4MASK"
|
|
1081
|
+
]
|
|
1082
|
+
},
|
|
1083
|
+
{
|
|
1084
|
+
"algorithm": "snow",
|
|
1085
|
+
"strength": "128",
|
|
1086
|
+
"keywords": [
|
|
1087
|
+
"snow5_aes_round",
|
|
1088
|
+
"snow-3g.h",
|
|
1089
|
+
"RTE_CRYPTO_CIPHER_SNOW3G_UEA2",
|
|
1090
|
+
"RTE_CRYPTO_AUTH_SNOW3G_UIA2"
|
|
1091
|
+
]
|
|
1092
|
+
},
|
|
1093
|
+
{
|
|
1094
|
+
"algorithm": "snerfu",
|
|
1095
|
+
"strength": "256",
|
|
1096
|
+
"keywords": [
|
|
1097
|
+
"Snefru"
|
|
1098
|
+
]
|
|
1099
|
+
},
|
|
1100
|
+
{
|
|
1101
|
+
"algorithm": "sosemanuk",
|
|
1102
|
+
"strength": "128",
|
|
1103
|
+
"keywords": [
|
|
1104
|
+
"SOSEMANUK_H__",
|
|
1105
|
+
"sosemanuk_key_context",
|
|
1106
|
+
"sosemanuk_schedule",
|
|
1107
|
+
"sosemanuk_init",
|
|
1108
|
+
"sosemanuk_encrypt",
|
|
1109
|
+
"SosemanukSlow",
|
|
1110
|
+
"SosemanukFast"
|
|
1111
|
+
]
|
|
1112
|
+
},
|
|
1113
|
+
{
|
|
1114
|
+
"algorithm": "ssha",
|
|
1115
|
+
"strength": "128",
|
|
1116
|
+
"keywords": [
|
|
1117
|
+
"checkssha",
|
|
1118
|
+
"SSHA",
|
|
1119
|
+
"SSHA224PasswordEncoder",
|
|
1120
|
+
"SSHA224PasswordDecoder",
|
|
1121
|
+
"SSHA256PasswordEncoder",
|
|
1122
|
+
"SSHA256PasswordDecoder"
|
|
1123
|
+
]
|
|
1124
|
+
},
|
|
1125
|
+
{
|
|
1126
|
+
"algorithm": "seal",
|
|
1127
|
+
"strength": "128",
|
|
1128
|
+
"keywords": [
|
|
1129
|
+
"SEALContext",
|
|
1130
|
+
"seal.h",
|
|
1131
|
+
"SEALWrapper",
|
|
1132
|
+
"toSealObject",
|
|
1133
|
+
"fromSealObject"
|
|
1134
|
+
]
|
|
1135
|
+
},
|
|
1136
|
+
{
|
|
1137
|
+
"algorithm": "seed",
|
|
1138
|
+
"strength": "256",
|
|
1139
|
+
"keywords": [
|
|
1140
|
+
"seed128Cipher",
|
|
1141
|
+
"seed.go"
|
|
1142
|
+
]
|
|
1143
|
+
},
|
|
1144
|
+
{
|
|
1145
|
+
"algorithm": "shax",
|
|
1146
|
+
"strength": "128-512",
|
|
1147
|
+
"keywords": [
|
|
1148
|
+
"SHA-1",
|
|
1149
|
+
"SHA-224",
|
|
1150
|
+
"SHA-256",
|
|
1151
|
+
"SHA-384",
|
|
1152
|
+
"SHA-512",
|
|
1153
|
+
"SHA3-224",
|
|
1154
|
+
"SHA3-256",
|
|
1155
|
+
"SHA3-384",
|
|
1156
|
+
"SHA3-512",
|
|
1157
|
+
"jsSHA1",
|
|
1158
|
+
"jsSHA256",
|
|
1159
|
+
"jsSHA512",
|
|
1160
|
+
"jsSHA3",
|
|
1161
|
+
"sha3.sha3_256",
|
|
1162
|
+
"sha.ts",
|
|
1163
|
+
"SHA512_Update",
|
|
1164
|
+
"SHA512_Init",
|
|
1165
|
+
"sha512_block_data_order",
|
|
1166
|
+
"SHA512_Transform",
|
|
1167
|
+
"sha512_block_p8",
|
|
1168
|
+
"SHA512_Final",
|
|
1169
|
+
"SHA256_Init",
|
|
1170
|
+
"SHA224_Update",
|
|
1171
|
+
"SHA224_Final",
|
|
1172
|
+
"sha512_256_init",
|
|
1173
|
+
"sha512_block_ppc",
|
|
1174
|
+
"import org.bouncycastle.crypto.digests.SHA256Digest",
|
|
1175
|
+
"import org.bouncycastle.crypto.digests.SHA512Digest",
|
|
1176
|
+
"forge.md.sha256.",
|
|
1177
|
+
"createHash('sha256')",
|
|
1178
|
+
"CryptoJS.SHA256",
|
|
1179
|
+
"DigestUtils.sha256Hex",
|
|
1180
|
+
".getInstance(\"SHA-256\")",
|
|
1181
|
+
"'sha512'",
|
|
1182
|
+
"openssl/sha.h",
|
|
1183
|
+
"cryptopp/sha.h",
|
|
1184
|
+
"crypto/sha1",
|
|
1185
|
+
"crypto/sha256",
|
|
1186
|
+
"crypto/sha512",
|
|
1187
|
+
"hash('sha256'",
|
|
1188
|
+
"sha256("
|
|
1189
|
+
]
|
|
1190
|
+
},
|
|
1191
|
+
{
|
|
1192
|
+
"algorithm": "shacal",
|
|
1193
|
+
"strength": "128",
|
|
1194
|
+
"keywords": [
|
|
1195
|
+
"Shacal",
|
|
1196
|
+
"isShacal1",
|
|
1197
|
+
"CRYPTOPP_SHACAL2_H",
|
|
1198
|
+
"SHACAL2Encryption",
|
|
1199
|
+
"SHACAL2",
|
|
1200
|
+
"#include \"shacal.h\"",
|
|
1201
|
+
".getInstance(\"Shacal2\");",
|
|
1202
|
+
"require('shacal')",
|
|
1203
|
+
"crypto/shacal2",
|
|
1204
|
+
"from Crypto.Cipher import SHACAL2",
|
|
1205
|
+
"SHACAL2.new"
|
|
1206
|
+
]
|
|
1207
|
+
},
|
|
1208
|
+
{
|
|
1209
|
+
"algorithm": "shark",
|
|
1210
|
+
"strength": "64",
|
|
1211
|
+
"keywords": [
|
|
1212
|
+
"voipshark",
|
|
1213
|
+
"shark.h",
|
|
1214
|
+
"SHARKTransform",
|
|
1215
|
+
"CRYPTOPP_SHARK_H"
|
|
1216
|
+
]
|
|
1217
|
+
},
|
|
1218
|
+
{
|
|
1219
|
+
"algorithm": "skein",
|
|
1220
|
+
"strength": "256",
|
|
1221
|
+
"keywords": [
|
|
1222
|
+
"skeincrypto.h",
|
|
1223
|
+
"skein",
|
|
1224
|
+
"sk_init",
|
|
1225
|
+
"sk_encrypt",
|
|
1226
|
+
"sk_decrypt"
|
|
1227
|
+
]
|
|
1228
|
+
},
|
|
1229
|
+
{
|
|
1230
|
+
"algorithm": "skipjack",
|
|
1231
|
+
"strength": "32",
|
|
1232
|
+
"keywords": [
|
|
1233
|
+
"FastSkipJack",
|
|
1234
|
+
"SkipJack",
|
|
1235
|
+
"skipjackCipher",
|
|
1236
|
+
"skipjack.go"
|
|
1237
|
+
]
|
|
1238
|
+
},
|
|
1239
|
+
{
|
|
1240
|
+
"algorithm": "sober",
|
|
1241
|
+
"strength": "128",
|
|
1242
|
+
"keywords": [
|
|
1243
|
+
"LTC_SOBER128",
|
|
1244
|
+
"sober128_start",
|
|
1245
|
+
"sober128_add_entropy",
|
|
1246
|
+
"sober128_ready",
|
|
1247
|
+
"sober128_read",
|
|
1248
|
+
"sober128_done",
|
|
1249
|
+
"sober128_export",
|
|
1250
|
+
"sober128_import",
|
|
1251
|
+
"sober128_test"
|
|
1252
|
+
]
|
|
1253
|
+
},
|
|
1254
|
+
{
|
|
1255
|
+
"algorithm": "tdes",
|
|
1256
|
+
"strength": "128",
|
|
1257
|
+
"keywords": [
|
|
1258
|
+
"TDES_FLAGS_ENCRYPT",
|
|
1259
|
+
"TDES_FLAGS_OPMODE_MASK",
|
|
1260
|
+
"TDES_FLAGS_ECB",
|
|
1261
|
+
"TDES_FLAGS_CBC",
|
|
1262
|
+
"TDES_FLAGS_OFB",
|
|
1263
|
+
"TDES_FLAGS_CFB64",
|
|
1264
|
+
"TDES_FLAGS_CFB32",
|
|
1265
|
+
"TDES_FLAGS_CFB16",
|
|
1266
|
+
"TDES_FLAGS_CFB8",
|
|
1267
|
+
"DES_ecb3_encrypt"
|
|
1268
|
+
]
|
|
1269
|
+
},
|
|
1270
|
+
{
|
|
1271
|
+
"algorithm": "tea",
|
|
1272
|
+
"strength": "128",
|
|
1273
|
+
"keywords": [
|
|
1274
|
+
"tea_encrypt",
|
|
1275
|
+
"tea_decrypt",
|
|
1276
|
+
"tea_cbc_mode",
|
|
1277
|
+
"tea_ofb_mode"
|
|
1278
|
+
]
|
|
1279
|
+
},
|
|
1280
|
+
{
|
|
1281
|
+
"algorithm": "tnepres",
|
|
1282
|
+
"strength": "256",
|
|
1283
|
+
"keywords": [
|
|
1284
|
+
"TnepresEngine",
|
|
1285
|
+
"Cipher.Tnepres",
|
|
1286
|
+
"KeyGenerator.Tnepres",
|
|
1287
|
+
"AlgorithmParameters.Tnepres"
|
|
1288
|
+
]
|
|
1289
|
+
},
|
|
1290
|
+
{
|
|
1291
|
+
"algorithm": "threefish",
|
|
1292
|
+
"strength": "1024",
|
|
1293
|
+
"keywords": [
|
|
1294
|
+
"Crypto.Threefish.Common",
|
|
1295
|
+
"newThreefish256",
|
|
1296
|
+
"newThreefish512",
|
|
1297
|
+
"newThreefish1024",
|
|
1298
|
+
"threefish_mod_fini",
|
|
1299
|
+
"threefish_algs",
|
|
1300
|
+
"threefish_round",
|
|
1301
|
+
"threefish_roundinv",
|
|
1302
|
+
"threefish_encrypt_generic"
|
|
1303
|
+
]
|
|
1304
|
+
},
|
|
1305
|
+
{
|
|
1306
|
+
"algorithm": "tiger",
|
|
1307
|
+
"strength": "256",
|
|
1308
|
+
"keywords": [
|
|
1309
|
+
"tiger_compress_macro",
|
|
1310
|
+
"tiger_compress",
|
|
1311
|
+
"ausTigerTokens1"
|
|
1312
|
+
]
|
|
1313
|
+
},
|
|
1314
|
+
{
|
|
1315
|
+
"algorithm": "twofish",
|
|
1316
|
+
"strength": "64",
|
|
1317
|
+
"keywords": [
|
|
1318
|
+
"twofish.h",
|
|
1319
|
+
"Twofish_fatal",
|
|
1320
|
+
"Twofish_Byte",
|
|
1321
|
+
"exp_Twofish_prepare_key",
|
|
1322
|
+
"Twofish_prepare_key",
|
|
1323
|
+
"twofish.h"
|
|
1324
|
+
]
|
|
1325
|
+
},
|
|
1326
|
+
{
|
|
1327
|
+
"algorithm": "vmpc",
|
|
1328
|
+
"strength": "",
|
|
1329
|
+
"keywords": [
|
|
1330
|
+
"VMPCEngine.java ",
|
|
1331
|
+
"VMPCrypt.py",
|
|
1332
|
+
"_VMPC_H_",
|
|
1333
|
+
"VmpcInitKeyRound",
|
|
1334
|
+
"VmpcInitKey",
|
|
1335
|
+
"VmpcInitKeyBASIC",
|
|
1336
|
+
"VmpcEncrypt",
|
|
1337
|
+
"VmpcEncryptMAC",
|
|
1338
|
+
"VmpcDecryptMAC",
|
|
1339
|
+
"VmpcOutputMAC"
|
|
1340
|
+
]
|
|
1341
|
+
},
|
|
1342
|
+
{
|
|
1343
|
+
"algorithm": "wake",
|
|
1344
|
+
"strength": "64",
|
|
1345
|
+
"keywords": [
|
|
1346
|
+
"WAKE.h",
|
|
1347
|
+
"WAKE_TestInstantiations",
|
|
1348
|
+
"WAKE_Base",
|
|
1349
|
+
"WAKE_Policy",
|
|
1350
|
+
"WAKE_Output"
|
|
1351
|
+
]
|
|
1352
|
+
},
|
|
1353
|
+
{
|
|
1354
|
+
"algorithm": "whirpool",
|
|
1355
|
+
"strength": "128",
|
|
1356
|
+
"keywords": [
|
|
1357
|
+
"whirlpool.New",
|
|
1358
|
+
"whirpool.go",
|
|
1359
|
+
"rhash_whirlpool_init",
|
|
1360
|
+
"rhash_whirlpool_sbox",
|
|
1361
|
+
"rhash_whirlpool_process_block",
|
|
1362
|
+
"WHIRLPOOL_OP",
|
|
1363
|
+
"WHIRLPOOL_Update",
|
|
1364
|
+
"WHIRLPOOL_BitUpdate",
|
|
1365
|
+
"WHIRLPOOL_Final",
|
|
1366
|
+
"whirlpool_block_mmx",
|
|
1367
|
+
"whirlpool_block",
|
|
1368
|
+
"WHIRLPOOL_Init",
|
|
1369
|
+
"#include <whirlpool.h>",
|
|
1370
|
+
"#include \"whirlpool.h\"",
|
|
1371
|
+
"import org.bouncycastle.crypto.digests.WhirlpoolDigest",
|
|
1372
|
+
"crypto.createHash('whirlpool')",
|
|
1373
|
+
"github.com/jzelinskie/whirlpool",
|
|
1374
|
+
"hashlib.new('whirlpool')"
|
|
1375
|
+
]
|
|
1376
|
+
},
|
|
1377
|
+
{
|
|
1378
|
+
"algorithm": "xtr",
|
|
1379
|
+
"strength": "64",
|
|
1380
|
+
"keywords": [
|
|
1381
|
+
"CRYPTOPP_XTR_H",
|
|
1382
|
+
"XTR_FindPrimesAndGenerator",
|
|
1383
|
+
"XTR_Exponentiate"
|
|
1384
|
+
]
|
|
1385
|
+
},
|
|
1386
|
+
{
|
|
1387
|
+
"algorithm": "yarrow",
|
|
1388
|
+
"strength": "160",
|
|
1389
|
+
"keywords": [
|
|
1390
|
+
"yarrow_start",
|
|
1391
|
+
"yarrow_desc",
|
|
1392
|
+
"yarrow_start",
|
|
1393
|
+
"yarrow_add_entropy",
|
|
1394
|
+
"yarrow_ready",
|
|
1395
|
+
"yarrow_read",
|
|
1396
|
+
"yarrow_done",
|
|
1397
|
+
"yarrow_export",
|
|
1398
|
+
"yarrow_import",
|
|
1399
|
+
"yarrow_test",
|
|
1400
|
+
"LTC_YARROW",
|
|
1401
|
+
"LTC_YARROW_AES",
|
|
1402
|
+
"#include <yarrow.h>",
|
|
1403
|
+
"yarrow256_done",
|
|
1404
|
+
"yarrow256_context"
|
|
1405
|
+
]
|
|
1406
|
+
},
|
|
1407
|
+
{
|
|
1408
|
+
"algorithm": "zuc",
|
|
1409
|
+
"strength": "128",
|
|
1410
|
+
"keywords": [
|
|
1411
|
+
"ZUC_H",
|
|
1412
|
+
"__ZUC_H__",
|
|
1413
|
+
"zuc.asm",
|
|
1414
|
+
"_zuc_init",
|
|
1415
|
+
"_zuc_generate_keystream"
|
|
1416
|
+
]
|
|
1417
|
+
},
|
|
1418
|
+
{
|
|
1419
|
+
"algorithm": "zipcrypt",
|
|
1420
|
+
"strength": "64",
|
|
1421
|
+
"keywords": [
|
|
1422
|
+
"zipcloak",
|
|
1423
|
+
"zipbare"
|
|
1424
|
+
]
|
|
1425
|
+
},
|
|
1426
|
+
{
|
|
1427
|
+
"algorithm": "dsa",
|
|
1428
|
+
"strength": "128",
|
|
1429
|
+
"keywords": [
|
|
1430
|
+
"ossl_dsa_generate_ffc_parameters",
|
|
1431
|
+
"DSA_set_method",
|
|
1432
|
+
"ossl_dsa_sign_int",
|
|
1433
|
+
"DSA_set_ex_data",
|
|
1434
|
+
"DSA_print",
|
|
1435
|
+
"DSA_SIG_new",
|
|
1436
|
+
"DSA_do_sign",
|
|
1437
|
+
"dsa_finish",
|
|
1438
|
+
"ossl_dsa_key_from_pkcs8",
|
|
1439
|
+
"DSA_bits",
|
|
1440
|
+
"dsa_pkey_ctrl",
|
|
1441
|
+
"dsa_keygen_pairwise_test",
|
|
1442
|
+
"pkey_dsa_keygen",
|
|
1443
|
+
"pkey_dsa_copy",
|
|
1444
|
+
"dsa_param_print",
|
|
1445
|
+
"dsa_pub_print",
|
|
1446
|
+
"DSA_meth_set_",
|
|
1447
|
+
"ossl_dsa_key_fromdata",
|
|
1448
|
+
"DSA_set_default_method",
|
|
1449
|
+
"pkey_dsa_cleanup",
|
|
1450
|
+
"pkey_dsa_ctrl_str",
|
|
1451
|
+
"ossl_dsa_is_foreign",
|
|
1452
|
+
"ossl_dsa_check_pairwise",
|
|
1453
|
+
"DSA_meth_set0_app_data",
|
|
1454
|
+
"pkey_dsa_init",
|
|
1455
|
+
"dsa_sign_setup",
|
|
1456
|
+
"ossl_dsa_check_params",
|
|
1457
|
+
"DSA_up_ref",
|
|
1458
|
+
"DSA_set0_key",
|
|
1459
|
+
"DSA_meth_set1_name",
|
|
1460
|
+
"dsa_init",
|
|
1461
|
+
"dsa_mod_inverse_fermat",
|
|
1462
|
+
"ossl_dsa_ffc_params_fromdata",
|
|
1463
|
+
"DSA_meth_new",
|
|
1464
|
+
"pkey_dsa_verify",
|
|
1465
|
+
"DSA_generate_",
|
|
1466
|
+
"ossl_dsa_get0_params",
|
|
1467
|
+
"dsa_pub_encode",
|
|
1468
|
+
"ossl_ffc_params_cmp",
|
|
1469
|
+
"DSAparams_dup",
|
|
1470
|
+
"DSA_meth_dup",
|
|
1471
|
+
"EVP_PKEY_CTX_set_dsa_paramgen_md",
|
|
1472
|
+
"dsa_priv_decode",
|
|
1473
|
+
"int_dsa_free",
|
|
1474
|
+
"ossl_dsa_check_",
|
|
1475
|
+
"DSA_clear_flags",
|
|
1476
|
+
"DSA_verify",
|
|
1477
|
+
"i2d_DSAparams",
|
|
1478
|
+
"DSA_test_flags",
|
|
1479
|
+
"DSA_meth_get_",
|
|
1480
|
+
"dsa_sign_setup_no_digest",
|
|
1481
|
+
"dsa_priv_encode",
|
|
1482
|
+
"dsa_copy_parameters",
|
|
1483
|
+
"#include <openssl/dsa.h>",
|
|
1484
|
+
".getInstance(\"DSA\")",
|
|
1485
|
+
".getInstance(\"SHA256withDSA\")",
|
|
1486
|
+
"crypto.generateKeyPairSync('dsa'",
|
|
1487
|
+
"dsa.GenerateKey",
|
|
1488
|
+
"crypto/dsa",
|
|
1489
|
+
"dsa.Sign",
|
|
1490
|
+
"OPENSSL_KEYTYPE_DSA",
|
|
1491
|
+
"from Crypto.PublicKey import DSA"
|
|
1492
|
+
]
|
|
1493
|
+
},
|
|
1494
|
+
{
|
|
1495
|
+
"algorithm": "pbkdf1",
|
|
1496
|
+
"strength": "128",
|
|
1497
|
+
"keywords": [
|
|
1498
|
+
"pbkdf1.js"
|
|
1499
|
+
]
|
|
1500
|
+
},
|
|
1501
|
+
{
|
|
1502
|
+
"algorithm": "pbkdf2",
|
|
1503
|
+
"strength": "128",
|
|
1504
|
+
"keywords": [
|
|
1505
|
+
"pbkdf2.js",
|
|
1506
|
+
"Ikonoshirt_Pbkdf2_Model_Encryption",
|
|
1507
|
+
"KeyDerivation.Pbkdf2",
|
|
1508
|
+
"_pbkdf2"
|
|
1509
|
+
]
|
|
1510
|
+
},
|
|
1511
|
+
{
|
|
1512
|
+
"algorithm": "pkcs12",
|
|
1513
|
+
"strength": "128",
|
|
1514
|
+
"keywords": [
|
|
1515
|
+
"PKCS7_digest_from_attributes",
|
|
1516
|
+
"PKCS7_set_content",
|
|
1517
|
+
"ossl_x509_add_cert_new",
|
|
1518
|
+
"PKCS7_add_",
|
|
1519
|
+
"PKCS7_type_is_other",
|
|
1520
|
+
"PKCS7_find_digest",
|
|
1521
|
+
"pkcs7_ecdsa_or_dsa_sign_verify_setup",
|
|
1522
|
+
"pkcs7_rsa_sign_verify_setup",
|
|
1523
|
+
"PKCS7_RECIP_INFO_set",
|
|
1524
|
+
"i2d_PKCS7_bio_stream",
|
|
1525
|
+
"PKCS7_final",
|
|
1526
|
+
"ASN1_INTEGER_cmp",
|
|
1527
|
+
"PKCS7_dataDecode",
|
|
1528
|
+
"PKCS7_encrypt_ex",
|
|
1529
|
+
"ossl_err_load_PKCS7_strings",
|
|
1530
|
+
"PKCS7_RECIP_INFO_get0_alg",
|
|
1531
|
+
"PKCS7_sign_add_signer",
|
|
1532
|
+
"PKCS7_verify",
|
|
1533
|
+
"pkcs7_cmp_ri",
|
|
1534
|
+
"PKCS7_SIGNER_INFO_sign",
|
|
1535
|
+
"PKCS7_set_type",
|
|
1536
|
+
"PKCS7_encrypt",
|
|
1537
|
+
"PKCS7_dataInit",
|
|
1538
|
+
"PKCS7_set_attributes",
|
|
1539
|
+
"PKCS7_SIGNER_INFO_set",
|
|
1540
|
+
"pkcs7_bio_add_digest",
|
|
1541
|
+
"ossl_pkcs7_ctx_propagate",
|
|
1542
|
+
"PKCS7_stream",
|
|
1543
|
+
"PKCS7_decrypt",
|
|
1544
|
+
"PKCS7_get_octet_string",
|
|
1545
|
+
"PKCS7_get_attribute",
|
|
1546
|
+
"PKCS7_content_new",
|
|
1547
|
+
"ossl_pkcs7_set0_libctx",
|
|
1548
|
+
"ossl_pkcs7_ctx_get0_libctx",
|
|
1549
|
+
"PKCS7_SIGNER_INFO_get0_algs",
|
|
1550
|
+
"PKCS7_sign",
|
|
1551
|
+
"PKCS7_new",
|
|
1552
|
+
"pkcs7_decrypt_rinfo",
|
|
1553
|
+
"PKCS7_dataFinal",
|
|
1554
|
+
"ossl_pkcs7_resolve_libctx",
|
|
1555
|
+
"PEM_write_bio_PKCS7_stream",
|
|
1556
|
+
"PKCS7_ctrl",
|
|
1557
|
+
"SMIME_write_PKCS7",
|
|
1558
|
+
"SMIME_write_ASN1_ex",
|
|
1559
|
+
"PKCS7_add1_attrib_digest",
|
|
1560
|
+
"PKCS7_get_issuer_and_serial",
|
|
1561
|
+
"PKCS7_get_signed_attribute",
|
|
1562
|
+
"PKCS7_sign_ex",
|
|
1563
|
+
"PKCS12_get0_mac",
|
|
1564
|
+
"PKCS12_pack_p7encdata",
|
|
1565
|
+
"PKCS12_add_",
|
|
1566
|
+
"PKCS12_PBE_",
|
|
1567
|
+
"PKCS12_item_i2d_encrypt",
|
|
1568
|
+
"PKCS12_init",
|
|
1569
|
+
"PKCS12_gen_mac",
|
|
1570
|
+
"PKCS12_decrypt_skey",
|
|
1571
|
+
"PKCS12_add1_attr_by_NID",
|
|
1572
|
+
"PKCS12_key_gen_utf8_ex",
|
|
1573
|
+
"PKCS12_get_attr",
|
|
1574
|
+
"PKCS8_get_attr",
|
|
1575
|
+
"PKCS12_SAFEBAG_create0_pkcs8",
|
|
1576
|
+
"PKCS12_init_ex",
|
|
1577
|
+
"parse_pk12",
|
|
1578
|
+
"PKCS12_pack_",
|
|
1579
|
+
"PKCS12_item_i2d_encrypt_ex",
|
|
1580
|
+
"PKCS12_verify_mac",
|
|
1581
|
+
"PKCS12_SAFEBAG_get_nid",
|
|
1582
|
+
"OPENSSL_asc2uni",
|
|
1583
|
+
"PKCS12_SAFEBAG_create_pkcs8_encrypt",
|
|
1584
|
+
"PKCS8_decrypt_ex",
|
|
1585
|
+
"PKCS12_key_gen_asc_ex",
|
|
1586
|
+
"pkcs12_gen_mac",
|
|
1587
|
+
"PKCS8_decrypt",
|
|
1588
|
+
"PKCS12_decrypt_skey_ex"
|
|
1589
|
+
]
|
|
1590
|
+
},
|
|
1591
|
+
{
|
|
1592
|
+
"algorithm": "pkcs7",
|
|
1593
|
+
"strength": "128",
|
|
1594
|
+
"keywords": [
|
|
1595
|
+
"PKCS7_digest_from_attributes",
|
|
1596
|
+
"PKCS7_set_content",
|
|
1597
|
+
"ossl_x509_add_cert_new",
|
|
1598
|
+
"PKCS7_add_attrib_smimecap",
|
|
1599
|
+
"PKCS7_type_is_other",
|
|
1600
|
+
"PKCS7_find_digest",
|
|
1601
|
+
"pkcs7_ecdsa_or_dsa_sign_verify_setup",
|
|
1602
|
+
"pkcs7_rsa_sign_verify_setup",
|
|
1603
|
+
"PKCS7_RECIP_INFO_set",
|
|
1604
|
+
"i2d_PKCS7_bio_stream",
|
|
1605
|
+
"PKCS7_final",
|
|
1606
|
+
"ASN1_INTEGER_cmp",
|
|
1607
|
+
"PKCS7_dataDecode",
|
|
1608
|
+
"PKCS7_encrypt_ex",
|
|
1609
|
+
"ossl_err_load_PKCS7_strings",
|
|
1610
|
+
"PKCS7_RECIP_INFO_get0_alg",
|
|
1611
|
+
"PKCS7_sign_add_signer",
|
|
1612
|
+
"PKCS7_verify",
|
|
1613
|
+
"pkcs7_cmp_ri",
|
|
1614
|
+
"PKCS7_SIGNER_INFO_sign",
|
|
1615
|
+
"PKCS7_set_type",
|
|
1616
|
+
"PKCS7_add_recipient",
|
|
1617
|
+
"PKCS7_encrypt",
|
|
1618
|
+
"PKCS7_dataInit",
|
|
1619
|
+
"PKCS7_set_attributes",
|
|
1620
|
+
"PKCS7_SIGNER_INFO_set",
|
|
1621
|
+
"pkcs7_bio_add_digest",
|
|
1622
|
+
"PKCS7_add_signed_attribute",
|
|
1623
|
+
"PKCS7_add_crl",
|
|
1624
|
+
"PKCS7_add_signer",
|
|
1625
|
+
"PKCS7_add_signature",
|
|
1626
|
+
"ossl_pkcs7_ctx_propagate",
|
|
1627
|
+
"PKCS7_stream",
|
|
1628
|
+
"PKCS7_decrypt",
|
|
1629
|
+
"PKCS7_get_octet_string",
|
|
1630
|
+
"PKCS7_get_attribute",
|
|
1631
|
+
"PKCS7_content_new",
|
|
1632
|
+
"ossl_pkcs7_set0_libctx",
|
|
1633
|
+
"ossl_pkcs7_ctx_get0_libctx",
|
|
1634
|
+
"PKCS7_SIGNER_INFO_get0_algs",
|
|
1635
|
+
"PKCS7_sign",
|
|
1636
|
+
"PKCS7_new",
|
|
1637
|
+
"pkcs7_decrypt_rinfo",
|
|
1638
|
+
"PKCS7_dataFinal",
|
|
1639
|
+
"ossl_pkcs7_resolve_libctx",
|
|
1640
|
+
"PEM_write_bio_PKCS7_stream",
|
|
1641
|
+
"PKCS7_ctrl",
|
|
1642
|
+
"PKCS7_add_certificate",
|
|
1643
|
+
"SMIME_write_PKCS7",
|
|
1644
|
+
"SMIME_write_ASN1_ex",
|
|
1645
|
+
"PKCS7_add1_attrib_digest",
|
|
1646
|
+
"PKCS7_get_issuer_and_serial",
|
|
1647
|
+
"PKCS7_get_signed_attribute",
|
|
1648
|
+
"PKCS7_sign_ex"
|
|
1649
|
+
]
|
|
1650
|
+
},
|
|
1651
|
+
{
|
|
1652
|
+
"algorithm": "sapphire",
|
|
1653
|
+
"strength": "256",
|
|
1654
|
+
"keywords": [
|
|
1655
|
+
"sapphire.h",
|
|
1656
|
+
"sapphire::keyrand",
|
|
1657
|
+
"sapphire::initialize",
|
|
1658
|
+
"sapphire::init_hash"
|
|
1659
|
+
]
|
|
1660
|
+
},
|
|
1661
|
+
{
|
|
1662
|
+
"algorithm": "serpent",
|
|
1663
|
+
"strength": "128",
|
|
1664
|
+
"keywords": [
|
|
1665
|
+
"serpent_subkey_t",
|
|
1666
|
+
"serpent_blk"
|
|
1667
|
+
]
|
|
1668
|
+
},
|
|
1669
|
+
{
|
|
1670
|
+
"algorithm": "srp",
|
|
1671
|
+
"strength": "128",
|
|
1672
|
+
"keywords": [
|
|
1673
|
+
"SRP_VBASE_get1_by_user",
|
|
1674
|
+
"SRP_create_verifier_BN_ex",
|
|
1675
|
+
"SRP_Calc_client_key",
|
|
1676
|
+
"SRP_get_gN_by_id",
|
|
1677
|
+
"SRP_VBASE_get_by_user",
|
|
1678
|
+
"SRP_create_verifier_BN",
|
|
1679
|
+
"SRP_Calc_x_ex",
|
|
1680
|
+
"SRP_Verify_B_mod_N",
|
|
1681
|
+
"SRP_user_pwd_set_gN",
|
|
1682
|
+
"SRP_user_pwd_set1_ids",
|
|
1683
|
+
"SRP_VBASE_add0_user",
|
|
1684
|
+
"SRP_Calc_server_key",
|
|
1685
|
+
"SRP_Calc_B_ex",
|
|
1686
|
+
"SRP_get_default_gN",
|
|
1687
|
+
"SRP_VBASE_new",
|
|
1688
|
+
"SRP_user_pwd_set_sv",
|
|
1689
|
+
"SRP_VBASE_free",
|
|
1690
|
+
"SRP_gN_free",
|
|
1691
|
+
"SRP_create_verifier_ex",
|
|
1692
|
+
"SRP_gN_new_init",
|
|
1693
|
+
"SRP_gN_place_bn",
|
|
1694
|
+
"SRP_VBASE_init",
|
|
1695
|
+
"SRP_Calc_u_ex",
|
|
1696
|
+
"SRP_Calc_x",
|
|
1697
|
+
"SRP_check_known_gN_param",
|
|
1698
|
+
"srp_user_pwd_dup",
|
|
1699
|
+
"SRP_Calc_B",
|
|
1700
|
+
"SRP_Verify_A_mod_N",
|
|
1701
|
+
"SRP_user_pwd_new",
|
|
1702
|
+
"SRP_user_pwd_set0_sv",
|
|
1703
|
+
"SRP_create_verifier",
|
|
1704
|
+
"SRP_Calc_A",
|
|
1705
|
+
"SRP_Calc_client_key_ex",
|
|
1706
|
+
"SRP_user_pwd_free",
|
|
1707
|
+
"SRPClient",
|
|
1708
|
+
"SRPServer",
|
|
1709
|
+
"libsrp",
|
|
1710
|
+
"srp",
|
|
1711
|
+
"_pysrp",
|
|
1712
|
+
"_ctsrp"
|
|
1713
|
+
]
|
|
1714
|
+
},
|
|
1715
|
+
{
|
|
1716
|
+
"algorithm": "tcrypt",
|
|
1717
|
+
"strength": "128",
|
|
1718
|
+
"keywords": [
|
|
1719
|
+
"tcrypt.h",
|
|
1720
|
+
"tcrypt_encrypt",
|
|
1721
|
+
"tcrypt_decrypt",
|
|
1722
|
+
"tcrypt_init",
|
|
1723
|
+
"_CRYPTO_TCRYPT_H"
|
|
1724
|
+
]
|
|
1725
|
+
},
|
|
1726
|
+
{
|
|
1727
|
+
"algorithm": "xtea",
|
|
1728
|
+
"strength": "128",
|
|
1729
|
+
"keywords": [
|
|
1730
|
+
"xtea_setkey",
|
|
1731
|
+
"xtea.h",
|
|
1732
|
+
"xtea_encodeecb",
|
|
1733
|
+
"xtea_decodecbc",
|
|
1734
|
+
"xtea_declen"
|
|
1735
|
+
]
|
|
1736
|
+
},
|
|
1737
|
+
{
|
|
1738
|
+
"algorithm": "X509",
|
|
1739
|
+
"strength": "128",
|
|
1740
|
+
"keywords": [
|
|
1741
|
+
"#include <openssl/x509.h>",
|
|
1742
|
+
"PEM_read_X509",
|
|
1743
|
+
"import java.security.cert.X509Certificate",
|
|
1744
|
+
".getInstance(\"X.509\")",
|
|
1745
|
+
"crypto/x509",
|
|
1746
|
+
"x509.ParseCertificate",
|
|
1747
|
+
"openssl_x509_free",
|
|
1748
|
+
"from cryptography import x509",
|
|
1749
|
+
"x509.load_pem_x509_certificate"
|
|
1750
|
+
]
|
|
1751
|
+
}
|
|
1752
|
+
]
|