summaryrefslogtreecommitdiff
path: root/umac.h
Commit message (Collapse)AuthorAgeFilesLines
* upstream: spelling ok dtucker@jsg@openbsd.org2022-01-011-2/+2
| | | | OpenBSD-Commit-ID: bfc7ba74c22c928de2e257328b3f1274a3dfdf19
* upstream: Typo and spelling fixes in comments and error messages.dtucker@openbsd.org2019-06-081-3/+3
| | | | | | Patch from knweiss at gmail.com via -portable. OpenBSD-Commit-ID: 2577465442f761a39703762c4f87a8dfcb918b4b
* - djm@cvs.openbsd.org 2013/07/22 12:20:02Damien Miller2013-07-251-7/+7
| | | | | | [umac.h] oops, forgot to commit corresponding header change; spotted by jsg and jasper
* - markus@cvs.openbsd.org 2012/10/04 13:21:50Darren Tucker2012-10-051-1/+7
| | | | | | [myproposal.h ssh_config.5 umac.h sshd_config.5 ssh.1 sshd.8 mac.c] add umac128 variant; ok djm@ at n2k12 (note: further Makefile work is required)
* - pvalchev@cvs.openbsd.org 2007/06/07 19:37:34Damien Miller2007-06-111-0/+123
[kex.h mac.c mac.h monitor_wrap.c myproposal.h packet.c ssh.1] [ssh_config.5 sshd.8 sshd_config.5] Add a new MAC algorithm for data integrity, UMAC-64 (not default yet, must specify umac-64@openssh.com). Provides about 20% end-to-end speedup compared to hmac-md5. Represents a different approach to message authentication to that of HMAC that may be beneficial if HMAC based on one of its underlying hash algorithms is found to be vulnerable to a new attack. http://www.ietf.org/rfc/rfc4418.txt in conjunction with and OK djm@