Damien Miller
f62ecef993
- (djm) [configure.ac] Fix detection of capsicum sandbox on FreeBSD
2014-01-25 12:34:38 +11:00
Damien Miller
b0e0f760b8
- (djm) [Makefile.in regress/scp-ssh-wrapper.sh regress/scp.sh] Make
...
the scp regress test actually test the built scp rather than the one
in $PATH. ok dtucker@
2014-01-24 14:27:04 +11:00
Darren Tucker
42a0925301
- (dtucker) [configure.ac] NetBSD's (and FreeBSD's) strnvis is gratuitously
...
incompatible with OpenBSD's despite post-dating it by more than a decade.
Declare it as broken, and document FreeBSD's as the same. ok djm@
2014-01-23 23:14:39 +11:00
Tim Rice
617da33c20
- (tim) [session.c] Improve error reporting on set_id().
2014-01-22 19:16:10 -08:00
Damien Miller
5c2ff5e31f
- (djm) [configure.ac aclocal.m4] More tests to detect fallout from
...
platform hardening options: include some long long int arithmatic
to detect missing support functions for -ftrapv in libgcc and
equivalents, actually test linking when -ftrapv is supplied and
set either both -pie/-fPIE or neither. feedback and ok dtucker@
2014-01-22 21:30:12 +11:00
Damien Miller
852472a54b
- (djm) [configure.ac] Unless specifically requested, only attempt
...
to build Position Independent Executables on gcc >= 4.x; ok dtucker
2014-01-22 16:31:18 +11:00
Damien Miller
ee87838786
- (djm) [openbsd-compat/setproctitle.c] Don't fail to compile if a
...
platform that is expected to use the reuse-argv style setproctitle
hack surprises us by providing a setproctitle in libc; ok dtucker
2014-01-22 16:30:15 +11:00
Damien Miller
5c96a154c7
- (djm) [aclocal.m4] Flesh out the code run in the OSSH_CHECK_CFLAG_COMPILE
...
and OSSH_CHECK_LDFLAG_LINK tests to give them a better chance of
detecting toolchain-related problems; ok dtucker
2014-01-21 13:10:26 +11:00
Tim Rice
9464ba6fb3
- (tim) [platform.c session.c] Fix bug affecting SVR5 platforms introduced
...
with sftp chroot support. Move set_id call after chroot.
2014-01-20 17:59:28 -08:00
Darren Tucker
a6d573caa1
- (dtucker) [aclocal.m4] Differentiate between compile-time and link-time
...
tests in the configure output. ok djm.
2014-01-21 12:50:46 +11:00
Darren Tucker
096118dc73
- (dtucker) [configure.ac] Make PIE a configure-time option which defaults
...
to on platforms where it's known to be reliably detected and off elsewhere.
Works around platforms such as FreeBSD 9.1 where it does not interop with
-ftrapv (it seems to work but fails when trying to link ssh). ok djm@
2014-01-21 12:48:51 +11:00
Damien Miller
f9df7f6f47
- (djm) [regress/cert-hostkey.sh] Fix regress failure on platforms that
...
skip one or more key types (e.g. RHEL/CentOS 6.5); ok dtucker@
2014-01-20 20:07:15 +11:00
Darren Tucker
c74e70eb52
- (dtucker) [gss-serv-krb5.c] Fall back to krb5_cc_gen_new if the Kerberos
...
implementation does not have krb5_cc_new_unique, similar to what we do
in auth-krb5.c.
2014-01-20 13:18:09 +11:00
Damien Miller
3510979e83
- djm@cvs.openbsd.org 2014/01/20 00:08:48
...
[digest.c]
memleak; found by Loganaden Velvindron @ AfriNIC; ok markus@
2014-01-20 12:41:53 +11:00
Darren Tucker
7eee358d7a
- dtucker@cvs.openbsd.org 2014/01/19 11:21:51
...
[addrmatch.c]
Cast the sizeof to socklen_t so it'll work even if the supplied len is
negative. Suggested by and ok djm, ok deraadt.
2014-01-19 22:37:02 +11:00
Darren Tucker
b7e01c09b5
- djm@cvs.openbsd.org 2014/01/19 04:48:08
...
[ssh_config.5]
fix inverted meaning of 'no' and 'yes' for CanonicalizeFallbackLocal
2014-01-19 22:36:13 +11:00
Darren Tucker
7b1ded04ad
- dtucker@cvs.openbsd.org 2014/01/19 04:17:29
...
[canohost.c addrmatch.c]
Cast socklen_t when comparing to size_t and use socklen_t to iterate over
the ip options, both to prevent signed/unsigned comparison warnings.
Patch from vinschen at redhat via portable openssh, begrudging ok deraadt.
2014-01-19 15:30:02 +11:00
Darren Tucker
293ee3c9f0
- dtucker@cvs.openbsd.org 2014/01/18 09:36:26
...
[session.c]
explicitly define USE_PIPES to 1 to prevent redefinition warnings in
portable on platforms that use pipes for everything. From redhat @
redhat.
2014-01-19 15:28:01 +11:00
Darren Tucker
2aca159d05
- dtucker@cvs.openbsd.org 2014/01/17 06:23:24
...
[sftp-server.c]
fix log message statvfs. ok djm
2014-01-19 15:25:34 +11:00
Darren Tucker
841f7da89a
- (dtucker) [sandbox-capsicum.c] Correct some error messages and make the
...
return value check for cap_enter() consistent with the other uses in
FreeBSD. From by Loganaden Velvindron @ AfriNIC via bz#2140.
2014-01-18 22:12:15 +11:00
Darren Tucker
fdce373166
- (dtucker) [configure.ac] On Cygwin the getopt variables (like optargs,
...
optind) are defined in getopt.h already. Unfortunately they are defined as
"declspec(dllimport)" for historical reasons, because the GNU linker didn't
allow auto-import on PE/COFF targets way back when. The problem is the
dllexport attributes collide with the definitions in the various source
files in OpenSSH, which obviousy define the variables without
declspec(dllimport). The least intrusive way to get rid of these warnings
is to disable warnings for GCC compiler attributes when building on Cygwin.
Patch from vinschen at redhat.com.
2014-01-18 21:12:42 +11:00
Darren Tucker
1411c9263f
- (dtucker) [openbsd-compat/bsd-cygwin_util.h] Add missing function
...
declarations that stopped being included when we stopped including
<windows.h> from openbsd-compat/bsd-cygwin_util.h. Patch from vinschen at
redhat.com.
2014-01-18 21:03:59 +11:00
Darren Tucker
89c532d843
- (dtucker) [uidswap.c] Prevent unused variable warnings on Cygwin. Patch
...
from vinschen at redhat.com
2014-01-18 20:43:49 +11:00
Darren Tucker
355f861022
- (dtucker) [defines.h] Move our definitions of uintXX_t types down to after
...
they're defined if we have to define them ourselves. Fixes builds on old
AIX.
2014-01-18 00:12:38 +11:00
Darren Tucker
a3357661ee
- (dtucker) [readconf.c] Wrap paths.h inside an ifdef. Allows building on
...
Solaris.
2014-01-18 00:03:57 +11:00
Darren Tucker
9edcbff46f
- (dtucker) [configure.ac] Have --without-toolchain-hardening not turn off
...
stack-protector since that has a separate flag that's been around a while.
2014-01-17 21:54:32 +11:00
Darren Tucker
6d725687c4
- (dtucker) [configure.ac] Also look in inttypes.h for uintXX_t types.
2014-01-17 19:17:34 +11:00
Darren Tucker
5055699c7f
- (dtucker) [openbsd-compat/bsd-statvfs.h] Only start including headers if we
...
need them to cut down on the name collisions.
2014-01-17 18:48:22 +11:00
Darren Tucker
a5cf1e220d
- (dtucker) [configure.ac openbsd-compat/bsd-statvfs.c
...
openbsd-compat/bsd-statvfs.h] Implement enough of statvfs on top of statfs
to be useful (and for the regression tests to pass) on platforms that
have statfs and fstatfs. ok djm@
2014-01-17 18:10:58 +11:00
Darren Tucker
1357d71d7b
- (dtucker) Fix typo in #ifndef.
2014-01-17 18:00:40 +11:00
Darren Tucker
d23a91ffb2
- (dtucker) [configure.ac digest.c openbsd-compat/openssl-compat.c
...
openbsd-compat/openssl-compat.h] Add compatibility layer for older
openssl versions. ok djm@
2014-01-17 17:32:30 +11:00
Damien Miller
868ea1ea1c
- (djm) [Makefile.in configure.ac sandbox-capsicum.c sandbox-darwin.c]
...
[sandbox-null.c sandbox-rlimit.c sandbox-seccomp-filter.c]
[sandbox-systrace.c ssh-sandbox.h sshd.c] Support preauth sandboxing
using the Capsicum API introduced in FreeBSD 10. Patch by Dag-Erling
Smorgrav, updated by Loganaden Velvindron @ AfriNIC; ok dtucker@
2014-01-17 16:47:04 +11:00
Darren Tucker
a9d186a8b5
- dtucker@cvs.openbsd.org 2014/01/17 05:26:41
...
[digest.c]
remove unused includes. ok djm@
2014-01-17 16:30:49 +11:00
Darren Tucker
5f1c57a7a7
- djm@cvs.openbsd.org 2014/01/17 00:21:06
...
[sftp-client.c]
signed/unsigned comparison warning fix; from portable (Id sync only)
2014-01-17 16:29:45 +11:00
Darren Tucker
c548722361
- (dtucker) [configure.ac] Split AC_CHECK_FUNCS for OpenSSL functions into
...
separate lines and alphabetize for easier diffing of changes.
2014-01-17 15:12:16 +11:00
Darren Tucker
acad351a5b
- (dtucker) [defines.h] Add typedefs for uintXX_t types for platforms that
...
don't have them.
2014-01-17 14:20:05 +11:00
Darren Tucker
c3ed065ce8
- (dtucker) [openbsd-compat/bcrypt_pbkdf.c] Wrap stdlib.h include inside
...
#ifdef HAVE_STDINT_H.
2014-01-17 14:18:45 +11:00
Darren Tucker
f45f78ae43
- (dtucker) [blocks.c fe25519.c ge25519.c hash.c sc25519.c verify.c] Include
...
includes.h to pull in all of the compatibility stuff.
2014-01-17 12:43:43 +11:00
Darren Tucker
99df369d03
- (dtucker) [poly1305.c] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.
2014-01-17 12:42:17 +11:00
Darren Tucker
ac413b62ea
- (dtucker) [crypto_api.h] Wrap stdlib.h include inside #ifdef HAVE_STDINT_H.
2014-01-17 12:31:33 +11:00
Darren Tucker
1c4a011e9c
- (dtucker) [loginrec.c] Cast to the types specfied in the format
...
specification to prevent warnings.
2014-01-17 12:23:23 +11:00
Damien Miller
c3d483f9a8
- (djm) [sftp-client.c] signed/unsigned comparison fix
2014-01-17 11:20:26 +11:00
Darren Tucker
fd994379dd
- (dtucker) [aclocal.m4 configure.ac] Add some additional compiler/toolchain
...
hardening flags including -fstack-protector-strong. These default to on
if the toolchain supports them, but there is a configure-time knob
(--without-hardening) to disable them if necessary. ok djm@
2014-01-17 09:53:24 +11:00
Damien Miller
366224d217
- (djm) [README] update release notes URL.
2014-01-16 18:51:44 +11:00
Damien Miller
2ae77e64f8
- (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
...
[contrib/suse/openssh.spec] Crank RPM spec version numbers.
2014-01-16 18:51:07 +11:00
Damien Miller
0fa29e6d77
- djm@cvs.openbsd.org 2014/01/16 07:32:00
...
[version.h]
openssh-6.5
2014-01-16 18:42:31 +11:00
Damien Miller
52c371cd6d
- djm@cvs.openbsd.org 2014/01/16 07:31:09
...
[sftp-client.c]
needless and incorrect cast to size_t can break resumption of
large download; patch from tobias@
2014-01-16 18:42:10 +11:00
Damien Miller
91b580e4be
- djm@cvs.openbsd.org 2014/01/12 08:13:13
...
[bufaux.c buffer.h kex.c kex.h kexc25519.c kexc25519c.c kexc25519s.c]
[kexdhc.c kexdhs.c kexecdhc.c kexecdhs.c kexgexc.c kexgexs.c]
avoid use of OpenSSL BIGNUM type and functions for KEX with
Curve25519 by adding a buffer_put_bignum2_from_string() that stores
a string using the bignum encoding rules. Will make it easier to
build a reduced-feature OpenSSH without OpenSSL in the future;
ok markus@
2014-01-12 19:21:22 +11:00
Damien Miller
af5d4481f4
- djm@cvs.openbsd.org 2014/01/10 05:59:19
...
[sshd_config]
the /etc/ssh/ssh_host_ed25519_key is loaded by default too
2014-01-12 19:20:47 +11:00
Damien Miller
58cd63bc63
- djm@cvs.openbsd.org 2014/01/09 23:26:48
...
[sshconnect.c sshd.c]
ban clients/servers that suffer from SSH_BUG_DERIVEKEY, they are ancient,
deranged and might make some attacks on KEX easier; ok markus@
2014-01-10 10:59:24 +11:00
Damien Miller
b3051d01e5
- djm@cvs.openbsd.org 2014/01/09 23:20:00
...
[digest.c digest.h hostfile.c kex.c kex.h kexc25519.c kexc25519c.c]
[kexc25519s.c kexdh.c kexecdh.c kexecdhc.c kexecdhs.c kexgex.c kexgexc.c]
[kexgexs.c key.c key.h roaming_client.c roaming_common.c schnorr.c]
[schnorr.h ssh-dss.c ssh-ecdsa.c ssh-rsa.c sshconnect2.c]
Introduce digest API and use it to perform all hashing operations
rather than calling OpenSSL EVP_Digest* directly. Will make it easier
to build a reduced-feature OpenSSH without OpenSSL in future;
feedback, ok markus@
2014-01-10 10:58:53 +11:00
Damien Miller
e00e413dd1
- guenther@cvs.openbsd.org 2014/01/09 03:26:00
...
[sftp-common.c]
When formating the time for "ls -l"-style output, show dates in the future
with the year, and rearrange a comparison to avoid a potentional signed
arithmetic overflow that would give the wrong result.
ok djm@
2014-01-10 10:40:45 +11:00
Damien Miller
3e49853650
- tedu@cvs.openbsd.org 2014/01/04 17:50:55
...
[mac.c monitor_mm.c monitor_mm.h xmalloc.c]
use standard types and formats for size_t like variables. ok dtucker
2014-01-10 10:37:05 +11:00
Damien Miller
a9c1e500ef
- (djm) [regress/.cvsignore] Ignore regress test droppings; ok dtucker@
2014-01-08 16:13:12 +11:00
Damien Miller
324541e526
- djm@cvs.openbsd.org 2013/12/30 23:52:28
...
[auth2-hostbased.c auth2-pubkey.c compat.c compat.h ssh-rsa.c]
[sshconnect.c sshconnect2.c sshd.c]
refuse RSA keys from old proprietary clients/servers that use the
obsolete RSA+MD5 signature scheme. it will still be possible to connect
with these clients/servers but only DSA keys will be accepted, and we'll
deprecate them entirely in a future release. ok markus@
2013-12-31 12:25:40 +11:00
Damien Miller
9f4c8e797e
- (djm) [regress/Makefile] Add some generated files for cleaning
2013-12-29 17:57:46 +11:00
Damien Miller
106bf1ca3c
- djm@cvs.openbsd.org 2013/12/29 05:57:02
...
[sshconnect.c]
when showing other hostkeys, don't forget Ed25519 keys
2013-12-29 17:54:03 +11:00
Damien Miller
0fa47cfb32
- djm@cvs.openbsd.org 2013/12/29 05:42:16
...
[ssh.c]
don't forget to load Ed25519 certs too
2013-12-29 17:53:39 +11:00
Damien Miller
b9a95490da
- djm@cvs.openbsd.org 2013/12/29 04:35:50
...
[authfile.c]
don't refuse to load Ed25519 certificates
2013-12-29 17:50:15 +11:00
Damien Miller
f72cdde6e6
- djm@cvs.openbsd.org 2013/12/29 04:29:25
...
[authfd.c]
allow deletion of ed25519 keys from the agent
2013-12-29 17:49:55 +11:00
Damien Miller
29ace1cb68
- djm@cvs.openbsd.org 2013/12/29 04:20:04
...
[key.c]
to make sure we don't omit any key types as valid CA keys again,
factor the valid key type check into a key_type_is_valid_ca()
function
2013-12-29 17:49:31 +11:00
Damien Miller
9de4fcdc5a
- djm@cvs.openbsd.org 2013/12/29 02:49:52
...
[key.c]
correct comment for key_drop_cert()
2013-12-29 17:49:13 +11:00
Damien Miller
5baeacf8a8
- djm@cvs.openbsd.org 2013/12/29 02:37:04
...
[key.c]
correct comment for key_to_certified()
2013-12-29 17:48:55 +11:00
Damien Miller
83f2fe26cb
- djm@cvs.openbsd.org 2013/12/29 02:28:10
...
[key.c]
allow ed25519 keys to appear as certificate authorities
2013-12-29 17:48:38 +11:00
Damien Miller
06122e9a74
- djm@cvs.openbsd.org 2013/12/27 22:37:18
...
[ssh-rsa.c]
correct comment
2013-12-29 17:48:15 +11:00
Damien Miller
3e19295c3a
- djm@cvs.openbsd.org 2013/12/27 22:30:17
...
[ssh-dss.c ssh-ecdsa.c ssh-rsa.c]
make the original RSA and DSA signing/verification code look more like
the ECDSA/Ed25519 ones: use key_type_plain() when checking the key type
rather than tediously listing all variants, use __func__ for debug/
error messages
2013-12-29 17:47:50 +11:00
Damien Miller
137977180b
- tedu@cvs.openbsd.org 2013/12/21 07:10:47
...
[ssh-keygen.1]
small typo
2013-12-29 17:47:14 +11:00
Damien Miller
339a48fe7f
- djm@cvs.openbsd.org 2013/12/19 22:57:13
...
[poly1305.c poly1305.h]
use full name for author, with his permission
2013-12-29 17:46:49 +11:00
Damien Miller
0b36c83148
- djm@cvs.openbsd.org 2013/12/19 01:19:41
...
[ssh-agent.c]
bz#2186: don't crash (NULL deref) when deleting PKCS#11 keys from an agent
that has a mix of normal and PKCS#11 keys; fix from jay AT slushpupie.com;
ok dtucker
2013-12-29 17:45:51 +11:00
Damien Miller
4def184e9b
- djm@cvs.openbsd.org 2013/12/19 01:04:36
...
[channels.c]
bz#2147: fix multiple remote forwardings with dynamically assigned
listen ports. In the s->c message to open the channel we were sending
zero (the magic number to request a dynamic port) instead of the actual
listen port. The client therefore had no way of discriminating between
them.
Diagnosis and fix by ronf AT timeheart.net
2013-12-29 17:45:26 +11:00
Damien Miller
bf25d114e2
- djm@cvs.openbsd.org 2013/12/19 00:27:57
...
[auth-options.c]
simplify freeing of source-address certificate restriction
2013-12-29 17:44:56 +11:00
Damien Miller
bb3dafe702
- dtucker@cvs.openbsd.org 2013/12/19 00:19:12
...
[serverloop.c]
Cast client_alive_interval to u_int64_t before assinging to
max_time_milliseconds to avoid potential integer overflow in the timeout.
bz#2170, patch from Loganaden Velvindron, ok djm@
2013-12-29 17:44:29 +11:00
Damien Miller
ef275ead3d
- djm@cvs.openbsd.org 2013/12/19 00:10:30
...
[ssh-add.c]
skip requesting smartcard PIN when removing keys from agent; bz#2187
patch from jay AT slushpupie.com; ok dtucker
2013-12-29 17:44:07 +11:00
Damien Miller
7d97fd9a1c
- (djm) [loginrec.c] Check for username truncation when looking up lastlog
...
entries
2013-12-29 17:40:18 +11:00
Darren Tucker
77244afe3b
20131221
...
- (dtucker) [regress/keytype.sh] Actually test ecdsa key types.
2013-12-21 17:02:39 +11:00
Darren Tucker
53f8e784dc
- (dtucker) [auth-pam.c] bz#2163: check return value from pam_get_item().
...
Patch from Loganaden Velvindron.
2013-12-19 11:31:44 +11:00
Darren Tucker
1fcec9d4f2
- (dtucker) [configure.ac] bz#2178: Don't try to use BSM on Solaris versions
...
greater than 11 either rather than just 11. Patch from Tomas Kuthan.
2013-12-19 11:00:12 +11:00
Damien Miller
6674eb9683
- markus@cvs.openbsd.org 2013/12/17 10:36:38
...
[crypto_api.h]
I've assempled the header file by cut&pasting from generated headers
and the source files.
2013-12-18 17:50:39 +11:00
Damien Miller
d58a596442
- djm@cvs.openbsd.org 2013/12/15 21:42:35
...
[cipher-chachapoly.c]
add some comments and constify a constant
2013-12-18 17:50:13 +11:00
Damien Miller
059321d19a
- pascal@cvs.openbsd.org 2013/12/15 18:17:26
...
[ssh-add.c]
Make ssh-add also add .ssh/id_ed25519; fixes lie in manual page.
ok markus@
2013-12-18 17:49:48 +11:00
Damien Miller
155b5a5bf1
- markus@cvs.openbsd.org 2013/12/09 11:08:17
...
[crypto_api.h]
remove unused defines
2013-12-18 17:48:32 +11:00
Damien Miller
8a56dc2b6b
- markus@cvs.openbsd.org 2013/12/09 11:03:45
...
[blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]
[ge25519_base.data hash.c sc25519.c sc25519.h verify.c]
Add Authors for the public domain ed25519/nacl code.
see also http://nacl.cr.yp.to/features.html
All of the NaCl software is in the public domain.
and http://ed25519.cr.yp.to/software.html
The Ed25519 software is in the public domain.
2013-12-18 17:48:11 +11:00
Damien Miller
6575c3acf3
- dtucker@cvs.openbsd.org 2013/12/08 09:53:27
...
[sshd_config.5]
Use a literal for the default value of KEXAlgorithms. ok deraadt jmc
2013-12-18 17:47:02 +11:00
Damien Miller
8ba0ead698
- naddy@cvs.openbsd.org 2013/12/07 11:58:46
...
[ssh-add.1 ssh-agent.1 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8 ssh.1]
[ssh_config.5 sshd.8 sshd_config.5]
add missing mentions of ed25519; ok djm@
2013-12-18 17:46:27 +11:00
Damien Miller
4f752cf71c
- djm@cvs.openbsd.org 2013/12/07 08:08:26
...
[ssh-keygen.1]
document -a and -o wrt new key format
2013-12-18 17:45:35 +11:00
Damien Miller
6d6fcd14e2
- (djm) [Makefile.in regress/Makefile regress/agent-ptrace.sh]
...
[regress/setuid-allowed.c] Check that ssh-agent is not on a no-setuid
filesystem before running agent-ptrace.sh; ok dtucker
2013-12-08 15:53:28 +11:00
Damien Miller
7e6e42fb53
- (djm) [openbsd-compat/bsd-setres_id.c] Missing header; from Corinna
...
Vinschen
2013-12-08 08:23:08 +11:00
Damien Miller
da3ca351b4
- (djm) [Makefile.in] PATHSUBS and keygen bits for Ed25519; from
...
Loganaden Velvindron @ AfriNIC in bz#2179
2013-12-07 21:43:46 +11:00
Damien Miller
eb401585bb
- (djm) [regress/cert-hostkey.sh] Fix merge botch
2013-12-07 17:07:15 +11:00
Damien Miller
f54542af3a
- markus@cvs.openbsd.org 2013/12/06 13:52:46
...
[regress/Makefile regress/agent.sh regress/cert-hostkey.sh]
[regress/cert-userkey.sh regress/keytype.sh]
test ed25519 support; from djm@
2013-12-07 16:32:44 +11:00
Damien Miller
f104da263d
- (djm) [ed25519.c ssh-ed25519.c openbsd-compat/Makefile.in]
...
[openbsd-compat/bcrypt_pbkdf.c] Make ed25519/new key format compile on
Linux
2013-12-07 12:37:53 +11:00
Damien Miller
1ff130dac9
- [configure.ac openbsd-compat/Makefile.in openbsd-compat/bcrypt_pbkdf.c]
...
[openbsd-compat/blf.h openbsd-compat/blowfish.c]
[openbsd-compat/openbsd-compat.h] Start at supporting bcrypt_pbkdf in
portable.
2013-12-07 11:51:51 +11:00
Damien Miller
4260828a29
- [authfile.c] Conditionalise inclusion of util.h
2013-12-07 11:38:03 +11:00
Damien Miller
a913442bac
- [Makefile.in] Add ed25519 sources
2013-12-07 11:35:36 +11:00
Damien Miller
ca570a519c
- djm@cvs.openbsd.org 2013/12/07 00:19:15
...
[key.c]
set k->cert = NULL after freeing it
2013-12-07 11:29:09 +11:00
Damien Miller
3cccc0e155
- [blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]
...
[ge25519_base.data hash.c sc25519.c sc25519.h verify.c] Fix RCS idents
2013-12-07 11:27:47 +11:00
Damien Miller
a7827c11b3
- jmc@cvs.openbsd.org 2013/12/06 15:29:07
...
[sshd.8]
missing comma;
2013-12-07 11:24:30 +11:00
Damien Miller
5be9d9e3cb
- markus@cvs.openbsd.org 2013/12/06 13:39:49
...
[authfd.c authfile.c key.c key.h myproposal.h pathnames.h readconf.c]
[servconf.c ssh-agent.c ssh-keygen.c ssh-keyscan.1 ssh-keyscan.c]
[ssh-keysign.c ssh.c ssh_config.5 sshd.8 sshd.c verify.c ssh-ed25519.c]
[sc25519.h sc25519.c hash.c ge25519_base.data ge25519.h ge25519.c]
[fe25519.h fe25519.c ed25519.c crypto_api.h blocks.c]
support ed25519 keys (hostkeys and user identities) using the public
domain ed25519 reference code from SUPERCOP, see
http://ed25519.cr.yp.to/software.html
feedback, help & ok djm@
2013-12-07 11:24:01 +11:00
Damien Miller
bcd00abd84
- markus@cvs.openbsd.org 2013/12/06 13:34:54
...
[authfile.c authfile.h cipher.c cipher.h key.c packet.c ssh-agent.c]
[ssh-keygen.c PROTOCOL.key] new private key format, bcrypt as KDF by
default; details in PROTOCOL.key; feedback and lots help from djm;
ok djm@
2013-12-07 10:41:55 +11:00
Damien Miller
f0e9060d23
- markus@cvs.openbsd.org 2013/12/06 13:30:08
...
[authfd.c key.c key.h ssh-agent.c]
move private key (de)serialization to key.c; ok djm
2013-12-07 10:40:26 +11:00