Commit 01ed424d authored by Niels Möller's avatar Niels Möller

*** empty log message ***

Rev: ChangeLog:1.117
Rev: NEWS:1.28
Rev: doc/TODO:1.62
Rev: src/crypto.h:1.16
Rev: src/dsa.c:1.5
Rev: src/lsh_keygen.c:1.18
Rev: src/lsh_writekey.c:1.15
Rev: src/publickey_crypto.c:1.36
Rev: src/randomness.c:1.17
parent ba036498
1999-11-07 Niels Mller <nisse@cuckoo.localdomain>
* src/exception.h (EXCEPTION_RAISE): Better tracing.
* src/ Added "md5" and "hash".
* src/algorithms.c (lookup_hash): New function.
* src/ (bin_PROGRAMS): Install sexp_conv.
(bin_SCRIPTS): Added lsh-authorize.
* src/spki.c (make_spki_hash): New function.
* src/sha.c (sha1_algorithm): Renamed from sha_algorithm.
* src/sexp_streamed_parser.c (do_parse_transport_sexp): Ignore
white space.
* src/sexp_conv.c (main_options): Added options --spki-hash,
--raw-hash, --hash and --once. Used by the lsh-authorize script.
* src/sexp_commands.c: Renamed print_sexp to sexp_print.
(sexp_print_raw_hash): New command.
* src/lsh-authorize: New script.
* src/lsh.c: New option --no-publickey to disable publickey user
* Bumped version to 0.1.15.
* src/lsh.c (do_lsh_default_handler): Report i/o exceptions, but
don't pass them on.
* src/lshd.c (main): Use sha1 for authorized keys.
* src/server_userauth.h (user_db): New class (not used for
anything yet).
News for the lsh-0.1.15 release
Support for publickey user authentication.
A new script lsh-authorize.
News for the lsh-0.1.14 release
First try on daemonization support.
......@@ -121,6 +121,12 @@ reasonable place? Then we only have to figure out when to install that
On the server side, make userauthentication more robust by serializing
handling of USERAUTH_REQUESTs. Use some user_db abstraction.
Dying children must be handled. For example like this: Use a signal
......@@ -50,7 +50,7 @@ struct crypto_algorithm *make_cast(void);
extern struct crypto_algorithm idea_algorithm;
extern struct hash_algorithm sha_algorithm;
extern struct hash_algorithm sha1_algorithm;
extern struct hash_algorithm md5_algorithm;
struct mac_algorithm *make_hmac_algorithm(struct hash_algorithm *h);
......@@ -87,7 +87,7 @@
static void dsa_hash(mpz_t h, UINT32 length, UINT8 *msg)
/* Compute hash */
struct hash_instance *hash = MAKE_HASH(&sha_algorithm);
struct hash_instance *hash = MAKE_HASH(&sha1_algorithm);
UINT8 *digest = alloca(hash->hash_size);
HASH_UPDATE(hash, length, msg);
HASH_DIGEST(hash, digest);
......@@ -179,7 +179,7 @@ int main(int argc, char **argv)
r = make_poor_random(&sha_algorithm, NULL);
r = make_poor_random(&sha1_algorithm, NULL);
dsa_nist_gen(public.p, public.q, r, options->level);
......@@ -47,11 +47,11 @@ static struct read_sexp_command read_sexp
#define READ_SEXP (&read_sexp.super.super)
static struct print_sexp_command write_canonical
static struct sexp_print_command write_canonical
#define CANONICAL (&write_canonical.super.super.super)
static struct print_sexp_command write_transport
static struct sexp_print_command write_transport
#define TRANSPORT (&write_transport.super.super.super)
......@@ -180,7 +180,7 @@ struct diffie_hellman_method *make_dh1(struct randomness *r)
mpz_init_set_ui(res->generator, 2);
res->H = &sha_algorithm;
res->H = &sha1_algorithm;
res->random = r;
return res;
......@@ -193,7 +193,7 @@ struct randomness *make_reasonably_random(void)
werror("Warning: Falling back to an insecure pseudorandom generator.\n");
r = make_poor_random(&sha_algorithm, NULL);
r = make_poor_random(&sha1_algorithm, NULL);
return r;
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment