summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/cipher.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Make zlib optional. This adds a "ZLIB" build time option that allowsdtucker2020-01-231-1/+2
| | | | | building without zlib compression and associated options. With feedback from markus@, ok djm@
* fixes for !WITH_OPENSSL compilation; ok dtucker@djm2019-09-061-1/+3
|
* hold our collective noses and use the openssl-1.1.x API in OpenSSH;djm2018-09-131-3/+3
| | | | feedback and ok tb@ jsing@ markus@
* As promised in last release announcement: remove support fordjm2017-05-071-3/+1
| | | | Blowfish, RC4 and CAST ciphers. ok markus@ deraadt@
* another tentacle: cipher_set_key_string() was only ever used for SSHv1djm2017-05-041-3/+1
|
* remove SSHv1 ciphers; ok markus@djm2017-04-301-24/+1
|
* small refactor of cipher.c: make ciphercontext opaque to callersdjm2016-08-031-13/+10
| | | | feedback and ok markus@
* typedefs for Cipher&CipherContext are unusedmarkus2015-07-081-4/+1
|
* remove unneeded includes, sync my copyright across files & whitespace; ok djm@markus2015-01-141-4/+4
|
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-27/+30
| | | | | | | | | existing API is offered as a set of wrappers. with and ok markus@ Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew Dempsky and Ron Bowes for a detailed review a few months ago.
* make compiling against OpenSSL optional (make OPENSSL=no);markus2014-04-291-1/+3
| | | | | reduces algorithms to curve25519, aes-ctr, chacha, ed25519; allows us to explore further options; with and ok djm
* Add a special case for the DH group size for 3des-cbc, which has andtucker2014-01-251-1/+2
| | | | | | | | effective strength much lower than the key size. This causes problems with some cryptlib implementations, which don't support group sizes larger than 4k but also don't use the largest group size it does support as specified in the RFC. Based on a patch from Petr Lautrbach at Redhat, reduced by me with input from Markus. ok djm@ markus@
* new private key format, bcrypt as KDF by default; details in PROTOCOL.key;markus2013-12-061-2/+2
| | | | feedback and lots help from djm; ok djm@
* Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com"djm2013-11-211-3/+8
| | | | | | | | | | | | | | that combines Daniel Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an authenticated encryption mode. Inspired by and similar to Adam Langley's proposal for TLS: http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03 but differs in layout used for the MAC calculation and the use of a second ChaCha20 instance to separately encrypt packet lengths. Details are in the PROTOCOL.chacha20poly1305 file. Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC ok markus@ naddy@
* Output the effective values of Ciphers, MACs and KexAlgorithms whendtucker2013-11-071-2/+2
| | | | the default has not been overridden. ok markus@
* add the ability to query supported ciphers, MACs, key type and KEXdjm2013-04-191-6/+7
| | | | | algorithms to ssh. Includes some refactoring of KEX and key type handling to be table-driven; ok markus@
* support AES-GCM as defined in RFC 5647 (but with simpler KEX handling)markus2013-01-081-2/+6
| | | | ok and feedback djm@
* add encrypt-then-mac (EtM) modes to openssh by defining new mac algorithmsmarkus2012-12-111-2/+2
| | | | | | | that change the packet format and compute the MAC over the encrypted message (including the packet size) instead of the plaintext data; these EtM modes are considered more secure and used by default. feedback and ok djm@
* Work around the CPNI-957037 Plaintext Recovery Attack by alwaysmarkus2009-01-261-1/+2
| | | | | | reading 256K of data on packet size or HMAC errors (in CBC mode only). Help, feedback and ok djm@ Feedback from Martin Albrecht and Paterson Kenny
* standardise spacing in $OpenBSD$ tags; requested by deraadt@djm2006-03-251-1/+1
|
* more s/illegal/invalid/markus2004-07-281-2/+2
|
* constify. ok markus@ & djm@jakob2003-11-101-6/+6
|
* export/import cipher states; needed by ssh-privsepmarkus2002-03-181-1/+8
|
* $OpenBSD$ and RCSID() cleanup: don't use RCSID() in .h files; addstevesk2002-03-041-2/+2
| | | | | missing RCSID() to .c files and remove dup /*$OpenBSD$*/ from .c files. ok markus@
* switch to EVP, ok djm@ deraadt@markus2002-02-181-35/+3
|
* hide some more implementation details of cipher.[ch] and prepares for movemarkus2002-02-141-16/+13
| | | | to EVP, ok deraadt@
* switch to the optimised AES reference code frommarkus2001-08-231-2/+2
| | | | http://www.esat.kuleuven.ac.be/~rijmen/rijndael/rijndael-fst-3.0.zip
* remove comments from .h, since they are cut&paste from the .c filesmarkus2001-06-261-11/+11
| | | | and out of sync
* prototype pedant. not very creative...itojun2001-06-261-11/+12
| | | | | - () -> (void) - no variable names
* simpler 3des for ssh1markus2001-05-281-2/+3
|
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-2/+2
| | | | with u_char.
* undo rijndael changesmarkus2000-12-091-6/+4
|
* new rijndael implementation. fixes endian bugsmarkus2000-12-061-4/+6
|
* rijndael/aes supportmarkus2000-10-131-1/+7
|
* enable DES in SSH-1 clients onlymarkus2000-10-121-2/+2
|
* new cipher frameworkmarkus2000-10-111-63/+60
|
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-7/+6
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* OpenBSD tagmarkus2000-06-201-1/+1
|
* complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)markus2000-05-081-1/+2
|
* whitespace cleanupmarkus2000-04-141-12/+12
|
* #include <ssl/foo.h> -> <openssh/foo.h>markus2000-04-121-5/+5
|
* add Cipher and Protocol options to ssh/sshd, e.g.:markus2000-04-121-1/+4
| | | | ssh -o 'Protocol 1,2' if you prefer proto 1, ssh -o 'Ciphers arcfour,3des-cbc'
* remove unused argument, split cipher_mask()markus2000-04-041-3/+5
|
* support ssh2 ciphersmarkus2000-03-281-1/+19
|
* remove unused cipher_attack_detected codemarkus2000-03-221-7/+1
|
* KNF, final part 3markus1999-11-241-13/+23
|
* much more KNFderaadt1999-11-241-47/+50
|
* remove support for cipher RC4markus1999-11-151-4/+4
|
* remove local blowfish codederaadt1999-10-021-2/+2
|
* <des.h>deraadt1999-09-301-2/+2
|