Commit History

Autor SHA1 Mensaxe Data
  Simon Tatham 42cf086b6b Add a key-length field to 'struct ssh_mac'. %!s(int64=9) %!d(string=hai) anos
  Simon Tatham 1df12e3915 Add copy and free methods to 'struct ssh_hash'. %!s(int64=9) %!d(string=hai) anos
  Chris Staite 705f159255 Allow a cipher to override the SSH KEX's choice of MAC. %!s(int64=9) %!d(string=hai) anos
  Simon Tatham 79fe96155a Const-correctness in struct ssh_hash. %!s(int64=9) %!d(string=hai) anos
  Simon Tatham 16c46ecdaf Add smemclrs of all hash states we destroy. %!s(int64=9) %!d(string=hai) anos
  Simon Tatham 9d5a164021 Use a timing-safe memory compare to verify MACs. %!s(int64=9) %!d(string=hai) anos
  Simon Tatham 183a9ee98b Support OpenSSH encrypt-then-MAC protocol extension. %!s(int64=9) %!d(string=hai) anos
  Simon Tatham 808df44e54 Add an assortment of missing consts I've just noticed. %!s(int64=11) %!d(string=hai) anos
  Simon Tatham 8966f7c1ea Add some conditionally-compilable diagnostics to the RNG. I got %!s(int64=11) %!d(string=hai) anos
  Ben Harris 3045a9ac8c Take advantage of PUT_32BIT_MSB_FIRST when constructing sequence numbers %!s(int64=12) %!d(string=hai) anos
  Simon Tatham aa5bae8916 Introduce a new utility function smemclr(), which memsets things to %!s(int64=12) %!d(string=hai) anos
  Ben Harris 86c183f8e8 Mitigation for VU#958563: When using a CBC-mode server-to-client cipher %!s(int64=16) %!d(string=hai) anos
  Jacob Nevins 2cf27e43bb Log the hash used for DH kex (now there's a choice). %!s(int64=19) %!d(string=hai) anos
  Ben Harris c0d36aa00a Implement hmac-sha1-96. It's RECOMMENDED in the current transport draft, %!s(int64=19) %!d(string=hai) anos
  Ben Harris a59356aa74 Add infrastructure for supporting multiple hashes in key exchange. %!s(int64=19) %!d(string=hai) anos
  Ben Harris 11d5c791ac Rename ssh_md5 and ssh_sha1 to ssh_hmac_md5 and ssh_hmac_sha1 respectively. %!s(int64=19) %!d(string=hai) anos
  Jacob Nevins 5aa719d16e Consistently use a single notation to refer to SSH protocol versions, as %!s(int64=20) %!d(string=hai) anos
  Jacob Nevins fb92f118bd Mention the negotiated SSH-2 MAC algorithm(s) in the Event Log. %!s(int64=20) %!d(string=hai) anos
  Simon Tatham d36a4c3685 Introduced wrapper macros snew(), snewn() and sresize() for the %!s(int64=22) %!d(string=hai) anos
  Ben Harris 2d86617f31 Make SHA_Core_Init() (only used in this file) static. %!s(int64=22) %!d(string=hai) anos
  Simon Tatham 8f91f07599 SSH2 MACs now use dynamically allocated contexts. %!s(int64=22) %!d(string=hai) anos
  Simon Tatham d345ebc2a5 Add support for DSA authentication in SSH2, following clever ideas %!s(int64=23) %!d(string=hai) anos
  Simon Tatham 3730ada5ce Run entire source base through GNU indent to tidy up the varying %!s(int64=24) %!d(string=hai) anos
  Simon Tatham 28b1fc766c Preliminary support for RSA user authentication in SSH2! Most of the %!s(int64=24) %!d(string=hai) anos
  Simon Tatham 3e83d75154 Add a config option to emulate the HMAC bug in commercial SSH v2.3.x %!s(int64=24) %!d(string=hai) anos
  Simon Tatham e48981def4 Miscellaneous fixes to try to make other compilers happier %!s(int64=24) %!d(string=hai) anos
  Simon Tatham d9af8f4b90 RSA key authentication in ssh1 works; SSH2 is nearly there %!s(int64=24) %!d(string=hai) anos
  Simon Tatham 0f1e449189 SSH2 transport layer now enables encryption and MAC successfully for 3DES %!s(int64=24) %!d(string=hai) anos
  Simon Tatham 36a499a7f1 Second attempt. Can successfully decrypt the _first block_ of a packet. %!s(int64=24) %!d(string=hai) anos
  Simon Tatham 35205e5cb7 SSH 2 support, phase 1, debugging. Currently does Diffie-Hellman and gets %!s(int64=24) %!d(string=hai) anos