Displaying 6 results from an estimated 6 matches for "kexc25519c".
Did you mean:
kexc25519
2013 Nov 01
1
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...server_dh_pub[CURVE25519_PUBKEY_SIZE],
> + const BIGNUM *shared_secret,
> ...
> + buffer_put_bignum2(&b, shared_secret);
>
> It would be simpler to pass the shared_secret as a const u_char* and
> length here - saving a round-trip to BIGNUM and back.
>
> diff --git a/kexc25519c.c b/kexc25519c.c
> new file mode 100644
> index 0000000..b2000f0
> --- /dev/null
> +++ b/kexc25519c.c
> ...
> +void
> +kexc25519_client(Kex *kex)
> +{
> ...
> + /* generate private key */
> + for (i = 0; i < sizeof(client_key); i++) {
> + if (i % 4 == 0)
>...
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...01
From: Aris Adamantiadis <aris at 0xbadc0de.be>
Date: Tue, 24 Sep 2013 21:59:36 +0200
Subject: [PATCH] kex: implement curve25519-sha256 at libssh.org
---
Makefile.in | 4 +-
kex.c | 1 +
kex.h | 9 ++++
kexc25519.c | 96 +++++++++++++++++++++++++++++++++++++
kexc25519c.c | 149 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++
kexc25519s.c | 144 +++++++++++++++++++++++++++++++++++++++++++++++++++++++
myproposal.h | 1 +
ssh-keyscan.c | 1 +
sshconnect2.c | 1 +
sshd.c | 1 +
10 files changed, 405 insertions(+), 2 deletions(-)
cre...
2018 Jun 08
4
vanilla build of 7.7p1 release on linux/4.17 fails with gcc8 @ "/usr/bin/ld: unrecognized option '-Wl,-z,retpolineplt'"
On 8 June 2018 at 11:21, PGNet Dev <pgnet.dev at gmail.com> wrote:
> fyi
>
> add'l -- and looks unrelated -- issue
> /usr/include/pthread.h:251:12: note: previous declaration of ?pthread_join? was here
> extern int pthread_join (pthread_t __th, void **__thread_return);
What included pthread.h? That's explicitly not supported by sshd:
$ grep THREAD
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex
2015 Feb 28
3
SAP-2015-3-1 issues
...s-genr.o umac.o umac128.o ssh-pkcs11.o smult_curve25519_ref.o poly1305.o chacha.o cipher-chachapoly.o ssh-ed25519.o digest-openssl.o digest-libc.o hmac.o sc25519.o ge25519.o fe25519.o ed25519.o verify.o hash.o blocks.o kex.o kexdh.o kexgex.o kexecdh.o kexc25519.o kexdhc.o kexgexc.o kexecdhc.o kexc25519c.o kexdhs.o kexgexs.o kexecdhs.o kexc25519s.o
r - ssh_api.o
r - ssherr.o
r - sshbuf.o
r - sshkey.o
r - sshbuf-getput-basic.o
r - sshbuf-misc.o
r - sshbuf-getput-crypto.o
r - krl.o
r - bitmap.o
r - authfd.o
r - authfile.o
r - bufaux.o
r - bufbn.o
r - bufec.o
r - buffer.o
r - canohost.o
r - channels....
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |