summaryrefslogtreecommitdiff
path: root/servconf.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2013-11-21 14:12:23 +1100
committerDamien Miller <djm@mindrot.org>2013-11-21 14:12:23 +1100
commit0fde8acdad78a4d20cadae974376cc0165f645ee (patch)
tree6e6aa82b73163bcb412920050d98f82ca9f4e86e /servconf.c
parentfdb2306acdc3eb2bc46b6dfdaaf6005c650af22a (diff)
- djm@cvs.openbsd.org 2013/11/21 00:45:44
[Makefile.in PROTOCOL PROTOCOL.chacha20poly1305 authfile.c chacha.c] [chacha.h cipher-chachapoly.c cipher-chachapoly.h cipher.c cipher.h] [dh.c myproposal.h packet.c poly1305.c poly1305.h servconf.c ssh.1] [ssh.c ssh_config.5 sshd_config.5] Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com" that combines Daniel Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an authenticated encryption mode. Inspired by and similar to Adam Langley's proposal for TLS: http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03 but differs in layout used for the MAC calculation and the use of a second ChaCha20 instance to separately encrypt packet lengths. Details are in the PROTOCOL.chacha20poly1305 file. Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC ok markus@ naddy@
Diffstat (limited to 'servconf.c')
-rw-r--r--servconf.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/servconf.c b/servconf.c
index 3593223f7..cb21bd229 100644
--- a/servconf.c
+++ b/servconf.c
@@ -1,5 +1,5 @@
1 1
2/* $OpenBSD: servconf.c,v 1.245 2013/11/07 11:58:27 dtucker Exp $ */ 2/* $OpenBSD: servconf.c,v 1.246 2013/11/21 00:45:44 djm Exp $ */
3/* 3/*
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
5 * All rights reserved 5 * All rights reserved
@@ -2038,7 +2038,7 @@ dump_config(ServerOptions *o)
2038 dump_cfg_string(sPidFile, o->pid_file); 2038 dump_cfg_string(sPidFile, o->pid_file);
2039 dump_cfg_string(sXAuthLocation, o->xauth_location); 2039 dump_cfg_string(sXAuthLocation, o->xauth_location);
2040 dump_cfg_string(sCiphers, o->ciphers ? o->ciphers : 2040 dump_cfg_string(sCiphers, o->ciphers ? o->ciphers :
2041 cipher_alg_list(',')); 2041 cipher_alg_list(',', 0));
2042 dump_cfg_string(sMacs, o->macs ? o->macs : mac_alg_list(',')); 2042 dump_cfg_string(sMacs, o->macs ? o->macs : mac_alg_list(','));
2043 dump_cfg_string(sBanner, o->banner); 2043 dump_cfg_string(sBanner, o->banner);
2044 dump_cfg_string(sForceCommand, o->adm_forced_command); 2044 dump_cfg_string(sForceCommand, o->adm_forced_command);