summaryrefslogtreecommitdiff
path: root/umac.c
Commit message (Collapse)AuthorAgeFilesLines
* upstream: correct size for array argument when changingdjm@openbsd.org2023-03-071-2/+3
| | | | | | UMAC_OUTPUT_LEN Coverity CID 291845; ok dtucker@ OpenBSD-Commit-ID: 2eb017d10705bb623d4418691f961c930eafaec0
* upstream: spellingjsg@openbsd.org2022-01-041-2/+2
| | | | OpenBSD-Commit-ID: c63e43087a64d0727af13409c708938e05147b62
* upstream: typos in comments; GHPR#180 from Villdjm@openbsd.org2021-04-031-2/+2
| | | | | | | | | =?UTF-8?q?e=20Skytt=C3=A4?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit OpenBSD-Commit-ID: 93c732381ae0e2b680c79e67c40c1814b7ceed2c
* upstream: spelling errors in comments; no code change fromdjm@openbsd.org2020-03-141-2/+2
| | | | OpenBSD-Commit-ID: 166ea64f6d84f7bac5636dbd38968592cb5eb924
* upstream: change explicit_bzero();free() to freezero()jsg@openbsd.org2020-02-281-3/+2
| | | | | | | | | | While freezero() returns early if the pointer is NULL the tests for NULL in callers are left to avoid warnings about passing an uninitialised size argument across a function boundry. ok deraadt@ djm@ OpenBSD-Commit-ID: 2660fa334fcc7cd05ec74dd99cb036f9ade6384a
* upstream: stdarg.h required more broadly; ok djmderaadt@openbsd.org2019-11-151-1/+1
| | | | OpenBSD-Commit-ID: b5b15674cde1b54d6dbbae8faf30d47e6e5d6513
* Include stdarg.h for va_list in xmalloc.h.Darren Tucker2019-11-131-0/+1
|
* upstream: lots of typos in comments/docs. Patch from Karsten Weissdjm@openbsd.org2018-04-101-7/+7
| | | | | | | after checking with codespell tool (https://github.com/lucasdemarchi/codespell) OpenBSD-Commit-ID: 373222f12d7ab606598a2d36840c60be93568528
* upstream commitnaddy@openbsd.org2017-12-191-1/+1
| | | | | | | | Create a persistent umac128.c source file: #define the output size and the name of the entry points for UMAC-128 before including umac.c. Idea from FreeBSD. ok dtucker@ OpenBSD-Commit-ID: 463cfacfa07cb8060a4d4961e63dca307bf3f4b1
* upstream commitdjm@openbsd.org2017-11-281-6/+6
| | | | | | more whitespace errors OpenBSD-Commit-ID: 5e11c125378327b648940b90145e0d98beb05abb
* upstream commitdjm@openbsd.org@openbsd.org2017-11-281-41/+41
| | | | | | whitespace at EOL OpenBSD-Commit-ID: 76d3965202b22d59c2784a8df3a8bfa5ee67b96a
* upstream commitdjm@openbsd.org@openbsd.org2017-10-311-53/+53
| | | | | | whitespace at EOL (lots) OpenBSD-Commit-ID: 757257dd44116794ee1b5a45c6724973de181747
* upstream commitmarkus@openbsd.org2017-06-011-1/+7
| | | | | | clear session keys from memory; ok djm@ Upstream-ID: ecd178819868975affd5fd6637458b7c712b6a0f
* - guenther@cvs.openbsd.org 2014/07/22 07:13:42Darren Tucker2014-07-231-1/+1
| | | | | | | [umac.c] Convert from <sys/endian.h> to the shiney new <endian.h> ok dtucker@, who also confirmed that -portable handles this already (ID sync only, includes.h pulls in endian.h if available.)
* - naddy@cvs.openbsd.org 2014/04/30 19:07:48Damien Miller2014-05-151-1/+12
| | | | | | | [mac.c myproposal.h umac.c] UMAC can use our local fallback implementation of AES when OpenSSL isn't available. Glue code straight from Ted Krovetz's original umac.c. ok markus@
* - djm@cvs.openbsd.org 2014/04/20 02:30:25Damien Miller2014-04-201-35/+13
| | | | | | [misc.c misc.h umac.c] use get/put_u32 to load values rather than *((UINT32 *)p) that breaks on strict-alignment architectures; reported by and ok stsp@
* - djm@cvs.openbsd.org 2013/11/08 00:39:15Damien Miller2013-11-081-2/+2
| | | | | | | [auth-options.c auth2-chall.c authfd.c channels.c cipher-3des1.c] [clientloop.c gss-genr.c monitor_mm.c packet.c schnorr.c umac.c] [sftp-client.c sftp-glob.c] use calloc for all structure allocations; from markus@
* - djm@cvs.openbsd.org 2013/07/22 05:00:17Damien Miller2013-07-251-31/+31
| | | | | | [umac.c] make MAC key, data to be hashed and nonce for final hash const; checked with -Wcast-qual
* - djm@cvs.openbsd.org 2013/07/20 01:43:46Damien Miller2013-07-201-7/+9
| | | | | [umac.c] use a union to ensure correct alignment; ok deraadt
* - djm@cvs.openbsd.org 2013/05/17 00:13:13Darren Tucker2013-06-021-2/+2
| | | | | | | | | | | | | | | | | | [xmalloc.h cipher.c sftp-glob.c ssh-keyscan.c ssh.c sftp-common.c ssh-ecdsa.c auth2-chall.c compat.c readconf.c kexgexs.c monitor.c gss-genr.c cipher-3des1.c kex.c monitor_wrap.c ssh-pkcs11-client.c auth-options.c rsa.c auth2-pubkey.c sftp.c hostfile.c auth2.c servconf.c auth.c authfile.c xmalloc.c uuencode.c sftp-client.c auth2-gss.c sftp-server.c bufaux.c mac.c session.c jpake.c kexgexc.c sshconnect.c auth-chall.c auth2-passwd.c sshconnect1.c buffer.c kexecdhs.c kexdhs.c ssh-rsa.c auth1.c ssh-pkcs11.c auth2-kbdint.c kexdhc.c sshd.c umac.c ssh-dss.c auth2-jpake.c bufbn.c clientloop.c monitor_mm.c scp.c roaming_client.c serverloop.c key.c auth-rsa.c ssh-pkcs11-helper.c ssh-keysign.c ssh-keygen.c match.c channels.c sshconnect2.c addrmatch.c mux.c canohost.c kexecdhc.c schnorr.c ssh-add.c misc.c auth2-hostbased.c ssh-agent.c bufec.c groupaccess.c dns.c packet.c readpass.c authfd.c moduli.c] bye, bye xfree(); ok markus@
* - [umac.c] Enforce allowed umac output sizes. From djm@.Darren Tucker2012-10-051-0/+6
|
* - [Makefile umac.c] Add special-case target to build umac128.o.Darren Tucker2012-10-051-0/+2
|
* - djm@cvs.openbsd.org 2011/10/19 10:39:48Darren Tucker2011-11-041-2/+2
| | | | | [umac.c] typo in comment; patch from Michael W. Bombardieri
* - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;Damien Miller2008-07-141-3/+3
| | | | reported by cristian.ionescu-idbohrn AT axis.com
* - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never usedDarren Tucker2008-06-131-1/+3
| | | | | on big endian machines, so ifdef them for little endian only to prevent unused function warnings.
* - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20Damien Miller2008-05-191-3/+5
| | | | | | [umac.c] Ensure nh_result lies on a 64-bit boundary (fixes warnings observed on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
* - stevesk@cvs.openbsd.org 2007/09/12 19:39:19Damien Miller2007-09-171-3/+4
| | | | | [umac.c] use xmalloc() and xfree(); ok markus@ pvalchev@
* - (dtucker) [cipher-ctr.c umac.c openbsd-compat/openssl-compat.h] Move theDarren Tucker2007-06-141-1/+4
| | | | | | USE_BUILTIN_RIJNDAEL compat goop to openssl-compat.h so it can be shared with umac.c. Allows building with OpenSSL 0.9.5 again including umac support. With tim@ djm@, ok djm.
* - (djm) [configure.ac umac.c] If platform doesn't provide swap32(3), thenDamien Miller2007-06-111-7/+6
| | | | fallback to provided bit-swizzing functions
* - pvalchev@cvs.openbsd.org 2007/06/07 19:37:34Damien Miller2007-06-111-0/+1270
[kex.h mac.c mac.h monitor_wrap.c myproposal.h packet.c ssh.1] [ssh_config.5 sshd.8 sshd_config.5] Add a new MAC algorithm for data integrity, UMAC-64 (not default yet, must specify umac-64@openssh.com). Provides about 20% end-to-end speedup compared to hmac-md5. Represents a different approach to message authentication to that of HMAC that may be beneficial if HMAC based on one of its underlying hash algorithms is found to be vulnerable to a new attack. http://www.ietf.org/rfc/rfc4418.txt in conjunction with and OK djm@