summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh_api.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* merge kexkem[cs] into kexgendjm2019-01-211-17/+17
| | | | from markus@ ok djm@
* use KEM API for vanilla ECDHdjm2019-01-211-3/+3
| | | | from markus@ ok djm@
* use KEM API for vanilla DH KEXdjm2019-01-211-11/+11
| | | | from markus@ ok djm@
* use KEM API for vanilla c25519 KEXdjm2019-01-211-3/+3
|
* Add support for a PQC KEX/KEM: sntrup4591761x25519-sha512@tinyssh.orgdjm2019-01-211-1/+3
| | | | | | | | | using the Streamlined NTRU Prime 4591^761 implementation from SUPERCOP coupled with X25519 as a stop-loss. Not enabled by default. introduce KEM API; a simplified framework for DH-ish KEX methods. from markus@ feedback & ok djm@
* remove last references to active_statedjm2019-01-191-7/+8
| | | | with & ok markus@
* move client/server SSH-* banners to buffers under ssh->kex and factordjm2018-12-271-55/+70
| | | | | | | | | | | out the banner exchange. This eliminates some common code from the client and server. Also be more strict about handling \r characters - these should only be accepted immediately before \n (pointed out by Jann Horn). Inspired by a patch from Markus Schmidt. (lots of) feedback and ok markus@
* remove compat20/compat13/compat15 variablesdjm2017-04-301-2/+1
| | | | ok markus@
* move SSH_MSG_NONE, so we don't have to include ssh1.h; ok deraadt@markus2016-05-041-3/+1
|
* add support for additional fixed DH groups fromdjm2016-05-021-1/+7
| | | | | | | | | | | draft-ietf-curdle-ssh-kex-sha2-03 diffie-hellman-group14-sha256 (2K group) diffie-hellman-group16-sha512 (4K group) diffie-hellman-group18-sha512 (8K group) based on patch from Mark D. Baushke and Darren Tucker ok markus@
* implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)markus2015-12-041-8/+8
| | | | | based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt; with & ok djm@
* Revise hostkeys@openssh.com hostkey learning extension.djm2015-02-161-3/+4
| | | | | | | | | | The client will not ask the server to prove ownership of the private halves of any hitherto-unseen hostkeys it offers to the client. Allow UpdateHostKeys option to take an 'ask' argument to let the user manually review keys offered. ok markus@
* avoid more fatal/exit in the packet.c paths that ssh-keyscandjm2015-01-301-2/+3
| | | | uses; feedback and "looks good" markus@
* correctly match ECDSA subtype (== curve) for offered/recevieddjm2015-01-261-7/+9
| | | | | | | | host keys. Fixes connection-killing host key mismatches when a server offers multiple ECDSA keys with different curve type (an extremely unlikely configuration). ok markus, "looks mechanical" deraadt@
* add experimental api for packet layer; ok djm@markus2015-01-191-0/+525