Pat Long e221f89e68
Fix support for AES-256/GCM openssh keys (#8968)
* Fix detecting AES-256/GCM cipher, fixes #8964 

When you generate a ssh key using the aes-256/gcm cipher, the cipher name in the keyfile includes an @openssh.com at the end.

* Use separate iv length for getting iv data, the assumption that the block size and iv size are equal does not hold for every cipher mode (e.g., GCM)

* Disable AES-256/GCM for now in ssh keys 

Currently, the granularity for the botan gcm implementation is too large. To fix a problem with another algorithm in the library, they are multiplying
the blocksize, so by default the granularity is 64. This causes issues since the encrypted data in the key is only guaranteed to have a length that is a multiple of the block size (16).
2023-01-29 10:57:09 -05:00
..
2021-09-28 15:50:27 +02:00
2022-03-21 00:26:07 +01:00
2022-04-05 23:12:34 -04:00
2022-03-21 23:54:17 +01:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-03-21 23:54:17 +01:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-03-21 23:54:17 +01:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00
2022-04-05 23:12:34 -04:00