Displaying 7 results from an estimated 7 matches for "chachapoly".
2020 Jan 16
3
[patch 1/2] use chacha20 from openssl (1.1.0+) when possible
...e IV of 96 b [1], while OpenSSL
uses 128 bits (including the 32b counter) [2]. Otherwise, I did not
notice any differences.
I have really no experience with OpenBSD so I do not have simple way to
test my changes, but I believe something like this should address the
difference:
diff --git a/cipher-chachapoly.c b/cipher-chachapoly.c
index a58616fb..7e6995f6 100644
--- a/cipher-chachapoly.c
+++ b/cipher-chachapoly.c
@@ -109,7 +109,14 @@ chachapoly_crypt(struct chachapoly_ctx *ctx, u_int
seqnr, u_char *dest,
const u_char *src, u_int len, u_int aadlen, u_int authlen, int
do_encrypt)
{
#if defined(WI...
2019 Jan 17
3
[patch 1/2] use chacha20 from openssl (1.1.0+) when possible
On some cpu's optimized chacha implementation in openssl (1.1.0+) is
notably faster (and on others it is just faster) than generic C
implementation in openssh.
Sadly, openssl's chacha20-poly1305 (EVP_chacha20_poly1305) uses
different scheme (with padding/etc - see rfc8439) and it looks it is not
possible to use in openssh.
OpenSSL 1.1.1+ also exports "raw" poly1305 primitive,
2018 Jun 08
4
vanilla build of 7.7p1 release on linux/4.17 fails with gcc8 @ "/usr/bin/ld: unrecognized option '-Wl,-z,retpolineplt'"
On 8 June 2018 at 11:21, PGNet Dev <pgnet.dev at gmail.com> wrote:
> fyi
>
> add'l -- and looks unrelated -- issue
> /usr/include/pthread.h:251:12: note: previous declaration of ?pthread_join? was here
> extern int pthread_join (pthread_t __th, void **__thread_return);
What included pthread.h? That's explicitly not supported by sshd:
$ grep THREAD
2024 Aug 06
1
[PATCH] Add SM3 secure hash algorithm
...git a/Makefile.in b/Makefile.in
index e1b77ebc6495..40bca10cba54 100644
--- a/Makefile.in
+++ b/Makefile.in
@@ -107,7 +107,7 @@ LIBSSH_OBJS=${LIBOPENSSH_OBJS} \
msg.o progressmeter.o dns.o entropy.o gss-genr.o umac.o umac128.o \
ssh-pkcs11.o smult_curve25519_ref.o \
poly1305.o chacha.o cipher-chachapoly.o cipher-chachapoly-libcrypto.o \
- ssh-ed25519.o digest-openssl.o digest-libc.o \
+ ssh-ed25519.o digest-openssl.o digest-libc.o sm3.o \
hmac.o ed25519.o hash.o \
kex.o kex-names.o kexdh.o kexgex.o kexecdh.o kexc25519.o \
kexgexc.o kexgexs.o \
diff --git a/configure.ac b/configure.ac
index 0...
2015 Feb 28
3
SAP-2015-3-1 issues
...rsa.o ttymodes.o xmalloc.o addrmatch.o atomicio.o key.o dispatch.o mac.o uidswap.o uuencode.o misc.o monitor_fdpass.o rijndael.o ssh-dss.o ssh-ecdsa.o ssh-rsa.o dh.o msg.o progressmeter.o dns.o entropy.o gss-genr.o umac.o umac128.o ssh-pkcs11.o smult_curve25519_ref.o poly1305.o chacha.o cipher-chachapoly.o ssh-ed25519.o digest-openssl.o digest-libc.o hmac.o sc25519.o ge25519.o fe25519.o ed25519.o verify.o hash.o blocks.o kex.o kexdh.o kexgex.o kexecdh.o kexc25519.o kexdhc.o kexgexc.o kexecdhc.o kexc25519c.o kexdhs.o kexgexs.o kexecdhs.o kexc25519s.o
r - ssh_api.o
r - ssherr.o
r - sshbuf.o
r -...
2024 Aug 07
1
[PATCH] Add SM3 secure hash algorithm
...; index e1b77ebc6495..40bca10cba54 100644
> --- a/Makefile.in
> +++ b/Makefile.in
> @@ -107,7 +107,7 @@ LIBSSH_OBJS=${LIBOPENSSH_OBJS} \
> msg.o progressmeter.o dns.o entropy.o gss-genr.o umac.o umac128.o \
> ssh-pkcs11.o smult_curve25519_ref.o \
> poly1305.o chacha.o cipher-chachapoly.o cipher-chachapoly-libcrypto.o \
> - ssh-ed25519.o digest-openssl.o digest-libc.o \
> + ssh-ed25519.o digest-openssl.o digest-libc.o sm3.o \
> hmac.o ed25519.o hash.o \
> kex.o kex-names.o kexdh.o kexgex.o kexecdh.o kexc25519.o \
> kexgexc.o kexgexs.o \
> diff --git a/confi...
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |