summaryrefslogtreecommitdiffstats
path: root/umac.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* - guenther@cvs.openbsd.org 2014/07/22 07:13:42Darren Tucker2014-07-231-1/+1
| | | | | | | [umac.c] Convert from <sys/endian.h> to the shiney new <endian.h> ok dtucker@, who also confirmed that -portable handles this already (ID sync only, includes.h pulls in endian.h if available.)
* - naddy@cvs.openbsd.org 2014/04/30 19:07:48Damien Miller2014-05-151-1/+12
| | | | | | | [mac.c myproposal.h umac.c] UMAC can use our local fallback implementation of AES when OpenSSL isn't available. Glue code straight from Ted Krovetz's original umac.c. ok markus@
* - djm@cvs.openbsd.org 2014/04/20 02:30:25Damien Miller2014-04-201-35/+13
| | | | | | [misc.c misc.h umac.c] use get/put_u32 to load values rather than *((UINT32 *)p) that breaks on strict-alignment architectures; reported by and ok stsp@
* - djm@cvs.openbsd.org 2013/11/08 00:39:15Damien Miller2013-11-081-2/+2
| | | | | | | [auth-options.c auth2-chall.c authfd.c channels.c cipher-3des1.c] [clientloop.c gss-genr.c monitor_mm.c packet.c schnorr.c umac.c] [sftp-client.c sftp-glob.c] use calloc for all structure allocations; from markus@
* - djm@cvs.openbsd.org 2013/07/22 05:00:17Damien Miller2013-07-251-31/+31
| | | | | | [umac.c] make MAC key, data to be hashed and nonce for final hash const; checked with -Wcast-qual
* - djm@cvs.openbsd.org 2013/07/20 01:43:46Damien Miller2013-07-201-7/+9
| | | | | [umac.c] use a union to ensure correct alignment; ok deraadt
* - djm@cvs.openbsd.org 2013/05/17 00:13:13Darren Tucker2013-06-011-2/+2
| | | | | | | | | | | | | | | | | | [xmalloc.h cipher.c sftp-glob.c ssh-keyscan.c ssh.c sftp-common.c ssh-ecdsa.c auth2-chall.c compat.c readconf.c kexgexs.c monitor.c gss-genr.c cipher-3des1.c kex.c monitor_wrap.c ssh-pkcs11-client.c auth-options.c rsa.c auth2-pubkey.c sftp.c hostfile.c auth2.c servconf.c auth.c authfile.c xmalloc.c uuencode.c sftp-client.c auth2-gss.c sftp-server.c bufaux.c mac.c session.c jpake.c kexgexc.c sshconnect.c auth-chall.c auth2-passwd.c sshconnect1.c buffer.c kexecdhs.c kexdhs.c ssh-rsa.c auth1.c ssh-pkcs11.c auth2-kbdint.c kexdhc.c sshd.c umac.c ssh-dss.c auth2-jpake.c bufbn.c clientloop.c monitor_mm.c scp.c roaming_client.c serverloop.c key.c auth-rsa.c ssh-pkcs11-helper.c ssh-keysign.c ssh-keygen.c match.c channels.c sshconnect2.c addrmatch.c mux.c canohost.c kexecdhc.c schnorr.c ssh-add.c misc.c auth2-hostbased.c ssh-agent.c bufec.c groupaccess.c dns.c packet.c readpass.c authfd.c moduli.c] bye, bye xfree(); ok markus@
* - [umac.c] Enforce allowed umac output sizes. From djm@.Darren Tucker2012-10-051-0/+6
|
* - [Makefile umac.c] Add special-case target to build umac128.o.Darren Tucker2012-10-051-0/+2
|
* - djm@cvs.openbsd.org 2011/10/19 10:39:48Darren Tucker2011-11-041-2/+2
| | | | | [umac.c] typo in comment; patch from Michael W. Bombardieri
* - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;Damien Miller2008-07-141-3/+3
| | | | reported by cristian.ionescu-idbohrn AT axis.com
* - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never usedDarren Tucker2008-06-131-1/+3
| | | | | on big endian machines, so ifdef them for little endian only to prevent unused function warnings.
* - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20Damien Miller2008-05-191-3/+5
| | | | | | [umac.c] Ensure nh_result lies on a 64-bit boundary (fixes warnings observed on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
* - stevesk@cvs.openbsd.org 2007/09/12 19:39:19Damien Miller2007-09-171-3/+4
| | | | | [umac.c] use xmalloc() and xfree(); ok markus@ pvalchev@
* - (dtucker) [cipher-ctr.c umac.c openbsd-compat/openssl-compat.h] Move theDarren Tucker2007-06-141-1/+4
| | | | | | USE_BUILTIN_RIJNDAEL compat goop to openssl-compat.h so it can be shared with umac.c. Allows building with OpenSSL 0.9.5 again including umac support. With tim@ djm@, ok djm.
* - (djm) [configure.ac umac.c] If platform doesn't provide swap32(3), thenDamien Miller2007-06-111-7/+6
| | | | fallback to provided bit-swizzing functions
* - pvalchev@cvs.openbsd.org 2007/06/07 19:37:34Damien Miller2007-06-111-0/+1270
[kex.h mac.c mac.h monitor_wrap.c myproposal.h packet.c ssh.1] [ssh_config.5 sshd.8 sshd_config.5] Add a new MAC algorithm for data integrity, UMAC-64 (not default yet, must specify umac-64@openssh.com). Provides about 20% end-to-end speedup compared to hmac-md5. Represents a different approach to message authentication to that of HMAC that may be beneficial if HMAC based on one of its underlying hash algorithms is found to be vulnerable to a new attack. http://www.ietf.org/rfc/rfc4418.txt in conjunction with and OK djm@