scapy.layers.tls.crypto.cipher_block
Block ciphers.
- class scapy.layers.tls.crypto.cipher_block.Cipher_3DES_EDE_CBC(key=None, iv=None)[源代码]
基类:
_BlockCipher
- block_size = 8
- key_len = 24
- name = '3DES_EDE_CBC'
- class scapy.layers.tls.crypto.cipher_block.Cipher_AES_128_CBC(key=None, iv=None)[源代码]
基类:
_BlockCipher
- block_size = 16
- key_len = 16
- name = 'AES_128_CBC'
- class scapy.layers.tls.crypto.cipher_block.Cipher_AES_256_CBC(key=None, iv=None)[源代码]
-
- key_len = 32
- name = 'AES_256_CBC'
- class scapy.layers.tls.crypto.cipher_block.Cipher_CAMELLIA_128_CBC(key=None, iv=None)[源代码]
基类:
_BlockCipher
- block_size = 16
- key_len = 16
- name = 'CAMELLIA_128_CBC'
- class scapy.layers.tls.crypto.cipher_block.Cipher_CAMELLIA_256_CBC(key=None, iv=None)[源代码]
-
- key_len = 32
- name = 'CAMELLIA_256_CBC'
- class scapy.layers.tls.crypto.cipher_block.Cipher_DES40_CBC(key=None, iv=None)[源代码]
-
This is an export cipher example. The key length has been weakened to 5 random bytes (i.e. 5 bytes will be extracted from the master_secret). Yet, we still need to know the original length which will actually be fed into the encryption algorithm. This is what expanded_key_len is for, and it gets used in PRF.postprocess_key_for_export(). We never define this attribute with non-export ciphers.
- expanded_key_len = 8
- key_len = 5
- name = 'DES40_CBC'
- class scapy.layers.tls.crypto.cipher_block.Cipher_DES_CBC(key=None, iv=None)[源代码]
基类:
_BlockCipher
- block_size = 8
- key_len = 8
- name = 'DES_CBC'
- class scapy.layers.tls.crypto.cipher_block.Cipher_IDEA_CBC(key=None, iv=None)[源代码]
基类:
_BlockCipher
- block_size = 8
- key_len = 16
- name = 'IDEA_CBC'
- class scapy.layers.tls.crypto.cipher_block.Cipher_RC2_CBC(key=None, iv=None)[源代码]
基类:
_BlockCipher
- block_size = 8
- key_len = 16
- name = 'RC2_CBC'