summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/umac.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Convert from <sys/endian.h> to the shiney new <endian.h>guenther2014-07-221-2/+2
| | | | ok dtucker@, who also confirmed that -portable handles this already
* UMAC can use our local fallback implementation of AES when OpenSSL isn'tnaddy2014-04-301-2/+12
| | | | | available. Glue code straight from Ted Krovetz's original umac.c. ok markus@
* use get/put_u32 to load values rather than *((UINT32 *)p) that breaks ondjm2014-04-201-29/+14
| | | | strict-alignment architectures; reported by and ok stsp@
* use calloc for all structure allocations; from markus@djm2013-11-081-2/+2
|
* make MAC key, data to be hashed and nonce for final hash const;djm2013-07-221-31/+31
| | | | checked with -Wcast-qual
* use a union to ensure correct alignment; ok deraadtdjm2013-07-201-7/+9
|
* bye, bye xfree(); ok markus@djm2013-05-171-2/+2
|
* typo in comment; patch from Michael W. Bombardieridjm2011-10-191-2/+2
|
* Ensure nh_result lies on a 64-bit boundary (fixes warnings observedpvalchev2008-05-121-3/+5
| | | | on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
* use xmalloc() and xfree(); ok markus@ pvalchev@stevesk2007-09-121-3/+4
|
* Add a new MAC algorithm for data integrity, UMAC-64 (not default yet, mustpvalchev2007-06-071-0/+1270
specify umac-64@openssh.com). Provides about 20% end-to-end speedup compared to hmac-md5. Represents a different approach to message authentication to that of HMAC that may be beneficial if HMAC based on one of its underlying hash algorithms is found to be vulnerable to a new attack. http://www.ietf.org/rfc/rfc4418.txt in conjunction with and OK djm@