Public scan · 2026-05-01
pyca/cryptography
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers.
- cryptography
- python
Files scanned
1,530
Shor-vulnerable
71
RSA / ECC / Ed* / X25519
Grover-weakened
399
AES-128 / SHA-1 / MD5
Total occurrences
470
Breakdown by primitive
- SHA-1 (broken, replace with SHA-256) 312
- MD5 (broken, replace with SHA-256) 48
- AES-128 (double to AES-256) 39
- RSA certificate 21
- ECDSA/ECDH 10
- RSA 10
- Asymmetric 9
- ECC certificate 7
- Ed25519 3
- RSA/DSA/DH 3
- DH 2
- DSA 2
- X25519 2
- ECC 1
- EdDSA 1
Findings
download CycloneDX 1.6 CBOM → docs/development/custom-vectors/rsa-oaep-sha2/generate_rsa_oaep_sha2.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import padding, rsa -
mgf=padding.MGF1(algorithm=hashes.SHA1()), -
algorithm=hashes.SHA1(), -
hashes.SHA1(), -
if isinstance(hashtuple[0], hashes.SHA1) and isinstance( -
hashtuple[1], hashes.SHA1
docs/development/custom-vectors/secp256k1/verify_secp256k1.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import ec -
"SHA-1": hashes.SHA1, -
"SHA-1": hashes.SHA1,
src/_cffi_src/openssl/evp.py open ↗
-
static const int EVP_PKEY_RSA; -
static const int EVP_PKEY_DSA; -
static const int EVP_PKEY_DH; -
static const int EVP_PKEY_EC; -
static const int Cryptography_HAS_EVP_PKEY_DHX; -
#ifdef EVP_PKEY_DHX -
const long Cryptography_HAS_EVP_PKEY_DHX = 1; -
const long Cryptography_HAS_EVP_PKEY_DHX = 0;
src/_cffi_src/openssl/rsa.py open ↗
-
#include <openssl/rsa.h> -
int RSA_generate_key_ex(RSA *, int, BIGNUM *, BN_GENCB *);
src/cryptography/hazmat/backends/openssl/backend.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import ec -
return self._lib.Cryptography_HAS_EVP_PKEY_DHX == 1 -
# Sometimes SHA1 is still permissible. That logic is contained -
# signatures, e.g. RSA PKCS#1 v1.5 SHA1 (sha1WithRSAEncryption). -
if self._fips_enabled and isinstance(algorithm, hashes.SHA1): -
# FIPS mode still allows SHA1 for HMAC -
if self._fips_enabled and isinstance(algorithm, hashes.SHA1): -
hashes.MD5, -
hashes.SHA1, -
if self._fips_enabled and isinstance(algorithm, hashes.SHA1): -
hashes.SHA1,
src/cryptography/hazmat/primitives/asymmetric/padding.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import rsa
src/cryptography/hazmat/primitives/serialization/pkcs7.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import ec, padding, rsa -
from cryptography.hazmat.primitives.asymmetric import ec, padding, rsa -
type[algorithms.AES128], type[algorithms.AES256] -
algorithms.AES128, -
raise TypeError("Only AES128 and AES256 are supported") -
# The default content encryption algorithm is AES-128-CBC, which the -
self._content_encryption_algorithm or algorithms.AES128
tests/doubles.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import ed25519, padding
tests/hazmat/primitives/fixtures_dh.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import dh
tests/hazmat/primitives/fixtures_ec.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import ec
tests/hazmat/primitives/fixtures_rsa.py open ↗
-
-----BEGIN RSA PRIVATE KEY-----
tests/hazmat/primitives/test_dh.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import dh
tests/hazmat/primitives/test_dsa.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import dsa -
"SHA1": hashes.SHA1(), -
"SHA1": hashes.SHA1(), -
public_key.verify(b"fakesig", b"fakemsg", hashes.SHA1()) -
algorithm = hashes.SHA1() -
h = hashes.Hash(hashes.SHA1(), backend) -
prehashed_alg = Prehashed(hashes.SHA1()) -
signature = private_key.sign(message, hashes.SHA1()) -
h = hashes.Hash(hashes.SHA1(), backend) -
algorithm = hashes.SHA1() -
algorithm = hashes.SHA1() -
h = hashes.Hash(hashes.SHA1(), backend) -
prehashed_alg = Prehashed(hashes.SHA1()) -
public_key.verify(signature, message, hashes.SHA1()) -
h = hashes.Hash(hashes.SHA1(), backend)
tests/hazmat/primitives/test_ec.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import ec -
"SHA-1": hashes.SHA1, -
"SHA-1": hashes.SHA1, -
"SHA1": hashes.SHA1(), -
"SHA1": hashes.SHA1(),
tests/hazmat/primitives/test_hpke.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import ec, mlkem, x25519 -
from cryptography.hazmat.primitives.asymmetric import ec, mlkem, x25519
tests/hazmat/primitives/test_pkcs7.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import ed25519, padding, rsa -
from cryptography.hazmat.primitives.asymmetric import ed25519, padding, rsa -
builder = builder.set_content_encryption_algorithm(algorithms.AES128) -
builder.set_content_encryption_algorithm(algorithms.AES128)
tests/hazmat/primitives/test_rsa.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import padding, rsa -
hashes.SHA1(), -
# of all the SHAs above, but SHA1/SHA1 is something we already -
# of all the SHAs above, but SHA1/SHA1 is something we already -
hashes.SHA1() -
skip_message="Does not support SHA1 signature.", -
hashes.SHA1(), -
mgf=padding.MGF1(hashes.SHA1()), -
hashes.SHA1() -
skip_message="Does not support SHA1 signature.", -
mgf=padding.MGF1(algorithm=hashes.SHA1()), -
hashes.SHA1(), -
mgf=padding.MGF1(algorithm=hashes.SHA1()), -
hashes.SHA1(), -
mgf=padding.MGF1(hashes.SHA1()), -
hashes.SHA1() -
skip_message="Does not support SHA1 signature.", -
signature, message, padding.PKCS1v15(), hashes.SHA1() -
digest = hashes.Hash(hashes.SHA1()) -
signature, padding.PKCS1v15(), hashes.SHA1() -
padding.PSS(mgf=padding.MGF1(hashes.SHA1()), salt_length=20) -
hashes.SHA1() -
skip_message="Does not support SHA1 signature.", -
mgf=padding.MGF1(algorithm=hashes.SHA1()), -
hashes.SHA1(), -
mgf=padding.MGF1(hashes.SHA1()), -
and backend.signature_hash_supported(hashes.SHA1()) -
"Does not support PSS using MGF1 with SHA1 or SHA1 signature." -
"Does not support PSS using MGF1 with SHA1 or SHA1 signature." -
hashes.SHA1(), -
backend.signature_hash_supported(hashes.SHA1()) -
skip_message="Does not support SHA1 and PKCS1v1.5.", -
hashes.SHA1(), -
mgf=padding.MGF1(algorithm=hashes.SHA1()), -
algorithm=hashes.SHA1(), -
mgf=padding.MGF1(algorithm=hashes.SHA1()), -
algorithm=hashes.SHA1(), -
mgf=padding.MGF1(algorithm=hashes.SHA1()), -
algorithm=hashes.SHA1(), -
algorithm=hashes.SHA1(), -
mgf=padding.MGF1(hashes.SHA1()), -
hashes.SHA1(), -
hashes.SHA1(),
tests/hazmat/primitives/test_serialization.py open ↗
-
-----BEGIN RSA PRIVATE KEY----- -
-----BEGIN RSA PRIVATE KEY----- -
-----BEGIN RSA PRIVATE KEY----- -
from cryptography.hazmat.primitives.hashes import MD5, SHA1 -
from cryptography.hazmat.primitives.hashes import MD5, SHA1 -
backend.hash_supported(MD5()) -
skip_message="Does not support DES MD5", -
DEK-Info: AES-128-CBC,5E22A2BD85A653FB7A3ED20DE84F54CD -
b.hmac_hash(SHA1()) -
b = PrivateFormat.PKCS12.encryption_builder().hmac_hash(SHA1()) -
b.hmac_hash(SHA1())
tests/hazmat/primitives/test_ssh.py open ↗
-
data = self.make_file(header=b"-----BEGIN RSA PRIVATE KEY-----\n") -
pytest.skip("FIPS does not support RSA SHA1") -
pytest.skip("FIPS does not support RSA SHA1") -
only_if=lambda backend: backend.hash_supported(hashes.MD5()), -
skip_message="Does not support MD5", -
fingerprint = ssh_key_fingerprint(public_key, hashes.MD5()) -
only_if=lambda backend: backend.hash_supported(hashes.MD5()), -
skip_message="Does not support MD5 or Ed25519", -
fingerprint = ssh_key_fingerprint(public_key, hashes.MD5()) -
only_if=lambda backend: backend.hash_supported(hashes.MD5()), -
skip_message="Does not support MD5", -
fingerprint = ssh_key_fingerprint(public_key, hashes.MD5()) -
ssh_key_fingerprint(public_key, hashes.SHA1()) # type: ignore[arg-type]
tests/hazmat/primitives/test_x25519.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import x25519
tests/hazmat/primitives/utils.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import rsa -
"hmac_sha1": hashes.SHA1,
tests/wycheproof/test_dsa.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import dsa -
"SHA-1": hashes.SHA1(), -
"SHA-1": hashes.SHA1(),
tests/wycheproof/test_ecdh.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import ec
tests/wycheproof/test_ecdsa.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import ec -
"SHA-1": hashes.SHA1(), -
"SHA-1": hashes.SHA1(),
tests/wycheproof/test_rsa.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import padding, rsa -
"SHA-1": hashes.SHA1(), -
"SHA-1": hashes.SHA1(), -
digest, hashes.SHA1 -
isinstance(digest, hashes.SHA1) -
or isinstance(mgf_digest, hashes.SHA1)
tests/x509/test_ocsp.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import ec, ed448, ed25519, rsa -
from cryptography.hazmat.primitives.asymmetric import ec, ed448, ed25519, rsa -
from cryptography.hazmat.primitives.asymmetric import ec, ed448, ed25519, rsa -
from cryptography.hazmat.primitives.asymmetric import ec, ed448, ed25519, rsa -
assert isinstance(req.hash_algorithm, hashes.SHA1) -
builder = builder.add_certificate(cert, issuer, hashes.SHA1()) -
builder.add_certificate(cert, issuer, hashes.SHA1()) -
b"0" * 20, b"0" * 20, 1, hashes.SHA1() -
b"0" * 20, b"0" * 20, 1, hashes.SHA1() -
b"0" * 20, b"0" * 20, 1, hashes.SHA1() -
builder.add_certificate(cert, issuer, hashes.SHA1()) -
b"0" * 19, b"0" * 20, 1, hashes.SHA1() -
b"0" * 20, b"0" * 21, 1, hashes.SHA1() -
hashes.SHA1(), -
builder.add_certificate(cert, issuer, hashes.MD5()) -
hashes.SHA1(), -
hashes.SHA1(), -
builder = builder.add_certificate(cert, issuer, hashes.SHA1()) -
cert, issuer, hashes.SHA1() -
h = hashes.Hash(hashes.SHA1()) -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
assert isinstance(resp.hash_algorithm, hashes.SHA1) -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(),
tests/x509/test_x509_ext.py open ↗
-
from cryptography.hazmat.primitives.asymmetric import ec, rsa -
from cryptography.hazmat.primitives.asymmetric import ec, rsa
vectors/cryptography_vectors/asymmetric/EC/ec-missing-curve.pem open ↗
-
-----BEGIN EC PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/EC/explicit_parameters_private_key.pem open ↗
-
-----BEGIN EC PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/EC/explicit_parameters_wap_wsg_idm_ecid_wtls11_private_key.pem open ↗
-
-----BEGIN EC PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/EC/high-bit-set.pem open ↗
-
-----BEGIN EC PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/EC/secp128r1_private_key.pem open ↗
-
-----BEGIN EC PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/PEM_Serialization/ec_private_key.pem open ↗
-
-----BEGIN EC PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/PEM_Serialization/ec_private_key_encrypted.pem open ↗
-
-----BEGIN EC PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/PEM_Serialization/ec_public_key_rsa_delimiter.pem open ↗
-
-----BEGIN RSA PUBLIC KEY-----
vectors/cryptography_vectors/asymmetric/PEM_Serialization/rsa-bad-1025-q-is-2.pem open ↗
-
-----BEGIN RSA PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/PEM_Serialization/rsa_private_key.pem open ↗
-
-----BEGIN RSA PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/PEM_Serialization/rsa_wrong_delimiter_public_key.pem open ↗
-
-----BEGIN RSA PUBLIC KEY-----
vectors/cryptography_vectors/asymmetric/PKCS8/wrong-pem-delimiter-rsa.pem open ↗
-
-----BEGIN RSA PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/Traditional_OpenSSL_Serialization/key1-malformed-dek-info.pem open ↗
-
-----BEGIN RSA PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/Traditional_OpenSSL_Serialization/key1-malformed-iv.pem open ↗
-
-----BEGIN RSA PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/Traditional_OpenSSL_Serialization/key1-no-dek-info.pem open ↗
-
-----BEGIN RSA PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/Traditional_OpenSSL_Serialization/key1-short-iv.pem open ↗
-
-----BEGIN RSA PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/Traditional_OpenSSL_Serialization/key1.pem open ↗
-
-----BEGIN RSA PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/Traditional_OpenSSL_Serialization/key2.pem open ↗
-
-----BEGIN RSA PRIVATE KEY----- -
DEK-Info: AES-128-CBC,5334E33DCBCAB62637BB26E3CD983AC1
vectors/cryptography_vectors/asymmetric/Traditional_OpenSSL_Serialization/rsa-wrong-version.pem open ↗
-
-----BEGIN RSA PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/Traditional_OpenSSL_Serialization/testrsa-encrypted.pem open ↗
-
-----BEGIN RSA PRIVATE KEY----- -
DEK-Info: AES-128-CBC,2371A6F3F6DEF67420EED171CA8434D6
vectors/cryptography_vectors/asymmetric/Traditional_OpenSSL_Serialization/testrsa.pem open ↗
-
-----BEGIN RSA PRIVATE KEY-----
vectors/cryptography_vectors/asymmetric/public/PKCS1/rsa.pub.pem open ↗
-
-----BEGIN RSA PUBLIC KEY-----
vectors/cryptography_vectors/x509/cryptography.io.with_headers.pem open ↗
-
-----BEGIN RSA PRIVATE KEY-----
docs/development/custom-vectors/cast5/generate_cast5.py open ↗
-
ctr_path = "tests/hazmat/primitives/vectors/ciphers/AES/CTR/aes-128-ctr.txt"
docs/development/custom-vectors/rsa-oaep-sha2/VerifyRSAOAEPSHA2.java open ↗
-
br.readLine(); // # # Derived from the NIST OAEP SHA1 vectors -
SHA1, SHA224, SHA256, SHA384, SHA512 -
case SHA1: -
case SHA1: -
mgf1 = MGF1ParameterSpec.SHA1; -
case SHA1: -
oaep_spec = new OAEPParameterSpec("SHA1", "MGF1", mgf1_spec, PSource.PSpecified.DEFAULT);
docs/development/custom-vectors/secp256k1/generate_secp256k1.py open ↗
-
"SHA-1": hashlib.sha1,
src/cryptography/hazmat/_oid.py open ↗
-
# This is an alternate OID for RSA with SHA1 that is occasionally seen -
SignatureAlgorithmOID.RSA_WITH_MD5: hashes.MD5(), -
SignatureAlgorithmOID.RSA_WITH_SHA1: hashes.SHA1(), -
SignatureAlgorithmOID._RSA_WITH_SHA1: hashes.SHA1(), -
SignatureAlgorithmOID.ECDSA_WITH_SHA1: hashes.SHA1(), -
SignatureAlgorithmOID.DSA_WITH_SHA1: hashes.SHA1(), -
SHA1 = ObjectIdentifier("1.3.14.3.2.26") -
SignatureAlgorithmOID.ECDSA_WITH_SHA1: "ecdsa-with-SHA1", -
HashAlgorithmOID.SHA1: "sha1",
src/cryptography/hazmat/primitives/_serialization.py open ↗
-
PBESv1SHA1And3KeyTripleDESCBC = "PBESv1 using SHA1 and 3-Key TripleDES"
src/cryptography/hazmat/primitives/ciphers/algorithms.py open ↗
-
class AES128(BlockCipherAlgorithm):
src/cryptography/hazmat/primitives/ciphers/modes.py open ↗
-
if isinstance(algorithm, (algorithms.AES128, algorithms.AES256)): -
"The AES128 and AES256 classes do not support XTS, please use " -
"The XTS specification requires a 256-bit key for AES-128-XTS"
src/cryptography/hazmat/primitives/hashes.py open ↗
-
"MD5", -
"SHA1", -
class SHA1(HashAlgorithm): -
class MD5(HashAlgorithm):
src/cryptography/hazmat/primitives/serialization/ssh.py open ↗
-
hash_alg = hashes.SHA1() -
hash_algorithm: hashes.MD5 | hashes.SHA256, -
if not isinstance(hash_algorithm, (hashes.MD5, hashes.SHA256)): -
raise TypeError("hash_algorithm must be either MD5 or SHA256")
src/cryptography/hazmat/primitives/twofactor/hotp.py open ↗
-
from cryptography.hazmat.primitives.hashes import SHA1, SHA256, SHA512 -
HOTPHashTypes = typing.Union[SHA1, SHA256, SHA512] -
if not isinstance(algorithm, (SHA1, SHA256, SHA512)): -
raise TypeError("Algorithm must be SHA1, SHA256 or SHA512.")
src/cryptography/x509/ocsp.py open ↗
-
hashes.SHA1, -
"Algorithm must be SHA1, SHA224, SHA256, SHA384, or SHA512"
src/rust/cryptography-key-parsing/src/pem.rs open ↗
-
/// Supported ciphers: AES-128-CBC, AES-256-CBC, DES-EDE3-CBC -
"AES-128-CBC" => openssl::symm::Cipher::aes_128_cbc(), -
"AES-128-CBC" => openssl::symm::Cipher::aes_128_cbc(), -
// Derive key using MD5-based KDF (for compatibility with traditional
src/rust/cryptography-key-parsing/src/pkcs8.rs open ↗
-
(openssl::symm::Cipher::aes_128_cbc(), &iv[..])
src/rust/cryptography-x509-verification/src/policy/extension.rs open ↗
-
// but many root CAs still use RSA with SHA-1 (which is intentionally unsupported
src/rust/src/backend/aead.rs open ↗
-
16 => openssl::cipher::Cipher::aes_128_gcm(), -
16 => openssl::cipher::Cipher::aes_128_ccm(), -
16 => "aes-128-gcm-siv",
src/rust/src/backend/cipher_registry.rs open ↗
-
let aes128 = types::AES128.get(py)?; -
m.add(&aes, &cbc, Some(128), Cipher::aes_128_cbc())?; -
m.add(&aes, &gcm, Some(128), Cipher::aes_128_gcm())?; -
m.add(&aes, &ctr, Some(128), Cipher::aes_128_ctr())?; -
m.add(&aes128, &cbc, Some(128), Cipher::aes_128_cbc())?; -
m.add(&aes128, &gcm, Some(128), Cipher::aes_128_gcm())?; -
m.add(&aes128, &ctr, Some(128), Cipher::aes_128_ctr())?;
src/rust/src/pkcs12.rs open ↗
-
key_id = Some(cert.fingerprint(py, &types::SHA1.get(py)?.call0()?)?);
src/rust/src/pkcs7.rs open ↗
-
let algorithm_parameters = if content_encryption_algorithm_type.eq(types::AES128.get(py)?)? { -
// The function can decrypt content encrypted with AES-128-CBC, which the S/MIME v3.2 -
types::AES128.get(py)?.call1((key,))?,
src/rust/src/types.rs open ↗
-
pub static SHA1: LazyPyImport = -
LazyPyImport::new("cryptography.hazmat.primitives.hashes", &["SHA1"]); -
pub static AES128: LazyPyImport = LazyPyImport::new( -
&["AES128"],
src/rust/src/x509/ocsp.rs open ↗
-
h.insert(common::AlgorithmParameters::Sha1(None), "SHA1"); -
h.insert(common::AlgorithmParameters::Sha1(Some(())), "SHA1");
src/rust/src/x509/ocsp_resp.rs open ↗
-
let sha1 = types::SHA1.get(py)?.call0()?;
src/rust/src/x509/sct.rs open ↗
-
HashAlgorithm::Md5 => "MD5", -
HashAlgorithm::Sha1 => "SHA1", -
(HashAlgorithm::Md5, "MD5"), -
(HashAlgorithm::Sha1, "SHA1"),
src/rust/src/x509/sign.rs open ↗
-
h.insert(&oid::SHA1_OID, "SHA1");
tests/hazmat/backends/test_openssl.py open ↗
-
_algorithm = hashes.SHA1() -
hashes.SHA1(), -
isinstance(mgf1alg, hashes.SHA1) -
or isinstance(oaepalg, hashes.SHA1) -
algorithm=hashes.SHA1(), -
mgf=padding.MGF1(algorithm=hashes.MD5()), -
algorithm=hashes.MD5(),
tests/hazmat/primitives/test_aes.py open ↗
-
base.Cipher(algorithms.AES128(b"0" * 16), modes.XTS(b"\x00" * 16)) -
["aes-128-ctr.txt", "aes-192-ctr.txt", "aes-256-ctr.txt"], -
@pytest.mark.parametrize("alg_cls", [algorithms.AES128, algorithms.AES256])
tests/hazmat/primitives/test_aes_gcm.py open ↗
-
@pytest.mark.parametrize("alg", [algorithms.AES128, algorithms.AES256])
tests/hazmat/primitives/test_hash_vectors.py open ↗
-
only_if=lambda backend: backend.hash_supported(hashes.SHA1()), -
skip_message="Does not support SHA1", -
os.path.join("hashes", "SHA1"), -
hashes.SHA1(), -
only_if=lambda backend: backend.hash_supported(hashes.MD5()), -
skip_message="Does not support MD5", -
os.path.join("hashes", "MD5"), -
hashes.MD5(),
tests/hazmat/primitives/test_hashes.py open ↗
-
m = hashes.Hash(hashes.SHA1(), backend=backend) -
hashes.Hash(hashes.SHA1, backend=backend) # type: ignore[arg-type] -
h = hashes.Hash(hashes.SHA1(), backend=backend) -
only_if=lambda backend: backend.hash_supported(hashes.SHA1()), -
skip_message="Does not support SHA1", -
hashes.SHA1(), -
only_if=lambda backend: backend.hash_supported(hashes.MD5()), -
skip_message="Does not support MD5", -
hashes.MD5(), -
hashes.Hash.hash(hashes.SHA1, b"data") # type: ignore[arg-type]
tests/hazmat/primitives/test_hkdf_vectors.py open ↗
-
only_if=lambda backend: backend.hmac_supported(hashes.SHA1()), -
skip_message="Does not support SHA1.", -
["rfc-5869-HKDF-SHA1.txt"], -
hashes.SHA1(),
tests/hazmat/primitives/test_hmac.py open ↗
-
only_if=lambda backend: backend.hmac_supported(hashes.MD5()), -
skip_message="Does not support MD5", -
hashes.MD5(), -
h = hmac.HMAC(b"mykey", hashes.SHA1(), backend=backend) -
hashes.SHA1, # type: ignore[arg-type] -
h = hmac.HMAC(b"key", hashes.SHA1(), backend=backend) -
h = hmac.HMAC(b"", hashes.SHA1(), backend=backend) -
h = hmac.HMAC(b"", hashes.SHA1(), backend=backend) -
h = hmac.HMAC(b"", hashes.SHA1(), backend=backend) -
h = hmac.HMAC(b"", hashes.SHA1(), backend=backend)
tests/hazmat/primitives/test_hmac_vectors.py open ↗
-
only_if=lambda backend: backend.hmac_supported(hashes.MD5()), -
skip_message="Does not support MD5", -
hashes.MD5(), -
only_if=lambda backend: backend.hmac_supported(hashes.SHA1()), -
skip_message="Does not support SHA1", -
hashes.SHA1(),
tests/hazmat/primitives/test_kbkdf.py open ↗
-
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(), -
hashes.SHA1(),
tests/hazmat/primitives/test_pbkdf2hmac.py open ↗
-
kdf = PBKDF2HMAC(hashes.SHA1(), 20, b"salt", 10, backend) -
kdf = PBKDF2HMAC(hashes.SHA1(), 20, b"salt", 10, backend) -
kdf = PBKDF2HMAC(hashes.SHA1(), 20, b"salt", 10, backend) -
kdf = PBKDF2HMAC(hashes.SHA1(), 20, b"salt", 10, backend) -
kdf = PBKDF2HMAC(hashes.SHA1(), 20, b"salt", 10, backend) -
hashes.SHA1(), -
kdf = PBKDF2HMAC(hashes.SHA1(), 20, b"salt", 10, backend) -
kdf = PBKDF2HMAC(hashes.SHA1(), 10, b"salt", 10, backend) -
kdf = PBKDF2HMAC(hashes.SHA1(), 20, b"salt", 10, backend) -
kdf2 = PBKDF2HMAC(hashes.SHA1(), 20, b"salt", 10, backend) -
kdf = PBKDF2HMAC(hashes.SHA1(), outlen, b"salt", 10, backend) -
kdf = PBKDF2HMAC(hashes.SHA1(), 20, b"salt", 10, backend) -
PBKDF2HMAC(hashes.SHA1(), 20, b"salt", 0, backend)
tests/hazmat/primitives/test_pbkdf2hmac_vectors.py open ↗
-
only_if=lambda backend: backend.pbkdf2_hmac_supported(hashes.SHA1()), -
skip_message="Does not support SHA1 for PBKDF2HMAC", -
os.path.join("KDF", "rfc-6070-PBKDF2-SHA1.txt"), -
hashes.SHA1(),
tests/hazmat/primitives/test_pkcs12.py open ↗
-
(hashes.SHA1(), b"\x06\x05\x2b\x0e\x03\x02\x1a"), -
assert p12.count(cert.fingerprint(hashes.SHA1())) == count -
(hashes.SHA1(), b"\x06\x05\x2b\x0e\x03\x02\x1a"),
tests/hazmat/primitives/test_x963_vectors.py open ↗
-
"SHA-1": hashes.SHA1, -
"SHA-1": hashes.SHA1,
tests/hazmat/primitives/twofactor/test_hotp.py open ↗
-
from cryptography.hazmat.primitives.hashes import MD5, SHA1 -
from cryptography.hazmat.primitives.hashes import MD5, SHA1 -
only_if=lambda backend: backend.hmac_supported(hashes.SHA1()), -
skip_message="Does not support HMAC-SHA1.", -
HOTP(secret, 6, SHA1(), backend) -
HOTP(secret, 6, SHA1(), backend, enforce_key_length=False) -
HOTP(secret, 4, SHA1(), backend) -
HOTP(secret, 6, MD5(), backend) # type: ignore[arg-type] -
hotp = HOTP(secret, 6, SHA1(), backend) -
hotp = HOTP(secret, 6, SHA1(), backend) -
hotp = HOTP(secret, 6, SHA1(), backend) -
hotp = HOTP(secret, 6, SHA1(), backend) -
HOTP(secret, b"foo", SHA1(), backend) # type: ignore[arg-type] -
hotp = HOTP(secret, 6, SHA1(), backend) -
"GY3TQOJQGEZDGNBVGY3TQOJQ&algorithm=SHA1&counter=1" -
"GNBVGY3TQOJQGEZDGNBVGY3TQOJQ&algorithm=SHA1&issuer=Foo" -
hotp = HOTP(key, 6, SHA1(), backend) -
hotp = HOTP(key, 6, SHA1(), backend)
tests/hazmat/primitives/twofactor/test_totp.py open ↗
-
only_if=lambda backend: backend.hmac_supported(hashes.SHA1()), -
skip_message="Does not support HMAC-SHA1.", -
"params", [i for i in vectors if i["mode"] == b"SHA1"] -
totp = TOTP(secret, 8, hashes.SHA1(), 30, backend) -
only_if=lambda backend: backend.hmac_supported(hashes.SHA1()), -
skip_message="Does not support HMAC-SHA1.", -
"params", [i for i in vectors if i["mode"] == b"SHA1"] -
totp = TOTP(secret, 8, hashes.SHA1(), 30, backend) -
totp = TOTP(secret, 8, hashes.SHA1(), 30, backend) -
totp = TOTP(secret, 8, hashes.SHA1(), 30, backend) -
totp = TOTP(secret, 6, hashes.SHA1(), 30, backend=backend) -
"Y3TQOJQGEZDGNBVGY3TQOJQ&algorithm=SHA1&period=30" -
"DGNBVGY3TQOJQGEZDGNBVGY3TQOJQ&algorithm=SHA1&issuer=World" -
totp = TOTP(key, 8, hashes.SHA1(), 30, backend)
tests/test_utils.py open ↗
-
MODE = SHA1 -
"mode": b"SHA1", -
# SHA Algorithm selected:SHA1 SHA224 SHA256 SHA384 SHA512 -
SHAAlg = SHA1 -
"algorithm": "SHA1", -
# SHA Algorithm selected:SHA1 SHA224 SHA256 SHA384 SHA512 -
SHAAlg = SHA1 -
SHAAlg = SHA1 -
"algorithm": "SHA1", -
"algorithm": "SHA1", -
# SHA Algorithm selected:SHA1 SHA224 SHA256 SHA384 SHA512 -
SHAAlg = SHA1 -
"algorithm": "SHA1", -
# Mod sizes selected: SHA-1 L=1024, N=160,SHA-384 L=2048, N=256 -
[mod = L=1024, N=160, SHA-1] -
"digest_algorithm": "SHA-1", -
"digest_algorithm": "SHA-1", -
# Mod sizes selected: SHA-1 L=1024, N=160, SHA-256 L=2048, N=256 -
[mod = L=1024, N=160, SHA-1] -
"digest_algorithm": "SHA-1", -
"digest_algorithm": "SHA-1", -
[P-192,SHA-1] -
"digest_algorithm": "SHA-1", -
"digest_algorithm": "SHA-1", -
[FA - SHA1] -
[SHA(s) supported (Used for hashing Z): SHA1] -
[EA - SHA1] -
[SHA-1] -
"hash": "SHA-1", -
"hash": "SHA-1", -
# PRFs tested: CMAC with key sizes: AES128 AES192 AES256 TDES2 TDES3\ -
HMAC with key sizes: SHA1 SHA224 SHA256 SHA384 SHA512
tests/wycheproof/test_hkdf.py open ↗
-
"HKDF-SHA-1": hashes.SHA1(), -
"HKDF-SHA-1": hashes.SHA1(),
tests/wycheproof/test_hmac.py open ↗
-
"HMACSHA1": hashes.SHA1(),
tests/wycheproof/test_pbkdf2.py open ↗
-
"PBKDF2-HMACSHA1": hashes.SHA1(),
tests/x509/test_x509.py open ↗
-
fingerprint = binascii.hexlify(crl.fingerprint(hashes.SHA1())) -
fingerprint = binascii.hexlify(crl.fingerprint(hashes.SHA1())) -
assert isinstance(pss._mgf._algorithm, hashes.SHA1) -
assert isinstance(cert.signature_hash_algorithm, hashes.SHA1) -
fingerprint = binascii.hexlify(cert.fingerprint(hashes.SHA1())) -
assert isinstance(cert.signature_hash_algorithm, hashes.SHA1) -
assert isinstance(cert.signature_hash_algorithm, hashes.SHA1) -
fingerprint = binascii.hexlify(cert.fingerprint(hashes.SHA1())) -
hashes.SHA1() -
skip_message="Does not support SHA-1 signature.", -
fingerprint = binascii.hexlify(cert.fingerprint(hashes.SHA1())) -
fingerprint = binascii.hexlify(cert.fingerprint(hashes.SHA1())) -
fingerprint = binascii.hexlify(cert.fingerprint(hashes.SHA1())) -
assert isinstance(request.signature_hash_algorithm, hashes.SHA1) -
assert isinstance(request.signature_hash_algorithm, hashes.SHA1) -
assert isinstance(request.signature_hash_algorithm, hashes.SHA1) -
hashes.SHA1() -
skip_message="Does not support SHA-1 signature.", -
only_if=lambda backend: backend.hash_supported(hashes.MD5()), -
skip_message="Requires OpenSSL with MD5 support", -
hashes.MD5(), -
only_if=lambda backend: backend.hash_supported(hashes.MD5()), -
skip_message="Requires OpenSSL with MD5 support", -
hashes.MD5(), # type: ignore[arg-type] -
hashes.SHA1() -
skip_message="Does not support SHA-1 signature.", -
assert isinstance(cert.signature_hash_algorithm, hashes.SHA1) -
only_if=lambda backend: backend.signature_hash_supported(hashes.SHA1()), -
skip_message="Does not support SHA-1 signature.", -
assert isinstance(request.signature_hash_algorithm, hashes.SHA1)