summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/kexc25519s.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* use KEM API for vanilla c25519 KEXdjm2019-01-211-134/+0
|
* Add support for a PQC KEX/KEM: sntrup4591761x25519-sha512@tinyssh.orgdjm2019-01-211-4/+4
| | | | | | | | | using the Streamlined NTRU Prime 4591^761 implementation from SUPERCOP coupled with X25519 as a stop-loss. Not enabled by default. introduce KEM API; a simplified framework for DH-ish KEX methods. from markus@ feedback & ok djm@
* factor out kex_load_hostkey() - this is duplicated in both the client anddjm2019-01-211-14/+3
| | | | | | server implementations for most KEX methods. from markus@ ok djm@
* save the derived session id in kex_derive_keys() rather than making eachdjm2019-01-211-12/+1
| | | | | | kex method implementation do it. from markus@ ok djm@
* remove last references to active_statedjm2019-01-191-3/+3
| | | | with & ok markus@
* move client/server SSH-* banners to buffers under ssh->kex and factordjm2018-12-271-3/+3
| | | | | | | | | | | out the banner exchange. This eliminates some common code from the client and server. Also be more strict about handling \r characters - these should only be accepted immediately before \n (pointed out by Jann Horn). Inspired by a patch from Markus Schmidt. (lots of) feedback and ok markus@
* one more void *ctx => struct ssh *ssh conversiondjm2017-05-311-4/+3
|
* implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)markus2015-12-041-3/+3
| | | | | based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt; with & ok djm@
* Include stdio.h for FILE (used in sshkey.h) so it compiles with OPENSSL=no.dtucker2015-04-271-1/+2
|
* correctly match ECDSA subtype (== curve) for offered/recevieddjm2015-01-261-3/+5
| | | | | | | | host keys. Fixes connection-killing host key mismatches when a server offers multiple ECDSA keys with different curve type (an extremely unlikely configuration). ok markus, "looks mechanical" deraadt@
* fix hostkeys in agent; ok markus@djm2015-01-201-5/+4
|
* adapt kex to sshbuf and struct ssh; ok djm@markus2015-01-191-50/+81
|
* update packet.c & isolate, introduce struct sshmarkus2015-01-191-3/+3
| | | | | | | | a) switch packet.c to buffer api and isolate per-connection info into struct ssh b) (de)serialization of the state is moved from monitor to packet.c c) the old packet.c API is implemented in opacket.[ch] d) compress.c/h is removed and integrated into packet.c with and ok djm@
* avoid use of OpenSSL BIGNUM type and functions for KEX withdjm2014-01-121-6/+9
| | | | | | | Curve25519 by adding a buffer_put_bignum2_from_string() that stores a string using the bignum encoding rules. Will make it easier to build a reduced-feature OpenSSH without OpenSSL in the future; ok markus@
* Introduce digest API and use it to perform all hashing operationsdjm2014-01-091-2/+2
| | | | | | rather than calling OpenSSL EVP_Digest* directly. Will make it easier to build a reduced-feature OpenSSH without OpenSSL in future; feedback, ok markus@
* add missing $OpenBSD$ tagsmarkus2013-11-021-0/+1
|
* use curve25519 for default key exchange (curve25519-sha256@libssh.org);markus2013-11-021-0/+120
initial patch from Aris Adamantiadis; ok djm@