summaryrefslogtreecommitdiff
path: root/schnorr.c
Commit message (Collapse)AuthorAgeFilesLines
* - (dtucker) [schnorr.c openbsd-compat/openssl-compat.{c,h}] AddDarren Tucker2009-03-071-0/+2
| | | | | EVP_DigestUpdate to the OLD_EVP compatibility functions and tell schnorr.c to use them. Allows building with older OpenSSL versions.
* - djm@cvs.openbsd.org 2009/03/05 07:18:19Damien Miller2009-03-061-68/+306
| | | | | | | [auth2-jpake.c jpake.c jpake.h monitor_wrap.c monitor_wrap.h schnorr.c] [sshconnect2.c] refactor the (disabled) Schnorr proof code to make it a little more generally useful
* - djm@cvs.openbsd.org 2009/02/18 04:31:21Damien Miller2009-02-211-2/+4
| | | | | | [schnorr.c] signature should hash over the entire group, not just the generator (this is still disabled code)
* - djm@cvs.openbsd.org 2008/11/04 08:22:13Damien Miller2008-11-051-0/+407
[auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h] [readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5] [sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c] [Makefile.in] Add support for an experimental zero-knowledge password authentication method using the J-PAKE protocol described in F. Hao, P. Ryan, "Password Authenticated Key Exchange by Juggling", 16th Workshop on Security Protocols, Cambridge, April 2008. This method allows password-based authentication without exposing the password to the server. Instead, the client and server exchange cryptographic proofs to demonstrate of knowledge of the password while revealing nothing useful to an attacker or compromised endpoint. This is experimental, work-in-progress code and is presently compiled-time disabled (turn on -DJPAKE in Makefile.inc). "just commit it. It isn't too intrusive." deraadt@