Age | Commit message (Collapse) | Author |
|
[regress/modpipe.c]
use unsigned long long instead of u_int64_t here to avoid warnings
on some systems portable OpenSSH is built on.
|
|
[regress/krl.sh]
add some reminders for additional tests that I'd like to implement
|
|
[regress/forward-control.sh]
bump timeout to 10 seconds to allow slow machines (e.g. Alpha PC164)
to successfully run this; ok djm@
(ID sync only; our timeouts are already longer)
|
|
[Makefile.in PROTOCOL PROTOCOL.chacha20poly1305 authfile.c chacha.c]
[chacha.h cipher-chachapoly.c cipher-chachapoly.h cipher.c cipher.h]
[dh.c myproposal.h packet.c poly1305.c poly1305.h servconf.c ssh.1]
[ssh.c ssh_config.5 sshd_config.5] Add a new protocol 2 transport
cipher "chacha20-poly1305@openssh.com" that combines Daniel
Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an
authenticated encryption mode.
Inspired by and similar to Adam Langley's proposal for TLS:
http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03
but differs in layout used for the MAC calculation and the use of a
second ChaCha20 instance to separately encrypt packet lengths.
Details are in the PROTOCOL.chacha20poly1305 file.
Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC
ok markus@ naddy@
|
|
[canohost.c clientloop.c match.c readconf.c sftp.c]
unsigned casts for ctype macros where neccessary
ok guenther millert markus
|
|
[scp.c]
unsigned casts for ctype macros where neccessary
ok guenther millert markus
|
|
[sshd.c]
delay closure of in/out fds until after "Bad protocol version
identification..." message, as get_remote_ipaddr/get_remote_port
require them open.
|
|
[ssh-pkcs11.c]
add missing braces found by pedro
|
|
[bufaux.c bufbn.c buffer.c sftp-client.c sftp-common.c sftp-glob.c]
[uidswap.c] Include stdlib.h for free() as per the man page.
|
|
querying the ones that are compiled in.
|
|
|
|
|
|
|
|
NID_X9_62_prime256v1, NID_secp384r1 and NID_secp521r1 and test that the
latter actually works before using it. Fedora (at least) has NID_secp521r1
that doesn't work (see https://bugzilla.redhat.com/show_bug.cgi?id=1021897).
|
|
[regress/test-exec.sh regress/rekey.sh]
Use smaller test data files to speed up tests. Grow test datafiles
where necessary for a specific test.
|
|
rather than testing and generating each key, call ssh-keygen -A.
Patch from vinschen at redhat.com.
|
|
and pass in TEST_ENV. Unknown options cause stderr to get polluted
and the stderr-data test to fail.
|
|
warnings.
|
|
|
|
EVP_sha256.
|
|
arc4random_stir for platforms that have arc4random but don't have
arc4random_stir (right now this is only OpenBSD -current).
|
|
[contrib/suse/openssh.spec] Update version numbers following release.
|
|
[version.h]
openssh-6.4
|
|
[auth-options.c auth2-chall.c authfd.c channels.c cipher-3des1.c]
[clientloop.c gss-genr.c monitor_mm.c packet.c schnorr.c umac.c]
[sftp-client.c sftp-glob.c]
use calloc for all structure allocations; from markus@
|
|
[cipher.c cipher.h kex.c kex.h mac.c mac.h servconf.c ssh.c]
Output the effective values of Ciphers, MACs and KexAlgorithms when
the default has not been overridden. ok markus@
|
|
[regress/rekey.sh]
Rekey less frequently during tests to speed them up
|
|
variable. It's no longer used now that we get the supported MACs from
ssh -Q.
|
|
[regress/kextype.sh]
trailing space
|
|
[regress/kextype.sh]
Use ssh -Q to get kex types instead of a static list.
|
|
[regress/integrity.sh regress/cipher-speed.sh regress/try-ciphers.sh]
Use ssh -Q instead of hardcoding lists of ciphers or MACs.
|
|
[regress/rekey.sh]
Factor out the data transfer rekey tests
|
|
[regress/rekey.sh]
Test rekeying for every Cipher, MAC and KEX, plus test every KEX with
the GCM ciphers.
|
|
[regress/rekey.sh]
Test rekeying with all KexAlgorithms.
|
|
[regress/kextype.sh]
add curve25519-sha256@libssh.org
|
|
[regress/Makefile] (ID sync only)
regression test for sftp request white/blacklisting and readonly mode.
|
|
[ssh-pkcs11.c]
from portable: s/true/true_val/ to avoid name collisions on dump platforms
RCSID sync only
|
|
[monitor_wrap.c]
fix rekeying for AES-GCM modes; ok deraadt
|
|
[monitor.c]
fix rekeying for KEX_C25519_SHA256; noted by dtucker@
RCSID sync only; I thought this was a merge botch and fixed it already
|
|
that lack it but have arc4random_uniform()
|
|
|
|
|
|
that got lost in recent merge.
|
|
KEX/curve25519 change
|
|
[roaming_common.c]
fix a couple of function definitions foo() -> foo(void)
(-Wold-style-definition)
|
|
[ssh_config.5 sshd_config.5]
the default kex is now curve25519-sha256@libssh.org
|
|
[auth-options.c]
no need to include monitor_wrap.h and ssh-gss.h
|
|
[kexdhs.c kexecdhs.c]
no need to include ssh-gss.h
|
|
[kexdhs.c kexecdhs.c]
no need to include monitor_wrap.h
|
|
[kex.c kex.h myproposal.h ssh-keyscan.c sshconnect2.c sshd.c]
use curve25519 for default key exchange (curve25519-sha256@libssh.org);
initial patch from Aris Adamantiadis; ok djm@
|
|
[ssh-pkcs11.c]
support pkcs#11 tokes that only provide x509 zerts instead of raw pubkeys;
fixes bz#1908; based on patch from Laurent Barbe; ok djm
|