Commit c848e28f authored by Niels Möller's avatar Niels Möller
Browse files

*** empty log message ***

Rev: ChangeLog:1.457
Rev: NEWS:1.90
Rev: doc/TODO:1.124
Rev: src/nettle/ChangeLog:1.70
Rev: src/nettle/asm.m4:1.6
Rev: src/nettle/rsa.h:1.11
parent 00f0592a
2002-02-19 Niels Mller <nisse@cuckoo.hack.org>
* src/crypto.c (make_aes_cbc_instance): Use aes_set_encrypt_key
and aes_set_decrypt_key. aes_set_key is obsolete.
2002-02-07 Niels Mller <nisse@cuckoo.hack.org> 2002-02-07 Niels Mller <nisse@cuckoo.hack.org>
* src/sftp/.bootstrap: Added -a flag to automake invocation.
* src/sftp/sftp_c.c: Constness fixes. * src/sftp/sftp_c.c: Constness fixes.
* src/sftp/sftp_bind.c (lsftp_open_connection): Bugfix, don't use * src/sftp/sftp_bind.c (lsftp_open_connection): Bugfix, don't use
......
News for the 1.3.7 release
New client option --subsystem for starting a subsystem such as
sftp on the server. Appeared already in 1.3.6, but wasn't
mentioned in NEWS.
News for the 1.3.6 release News for the 1.3.6 release
New randomness generator based on Yarrow-256. Initial seeding New randomness generator based on Yarrow-256. Initial seeding
......
...@@ -465,3 +465,6 @@ warnings by lsh: ...@@ -465,3 +465,6 @@ warnings by lsh:
To fix this, we must put some resources on the lsh's To fix this, we must put some resources on the lsh's
gateway-connection's resource list, that closes the chained gateway-connection's resource list, that closes the chained
connections. connections.
According to rms, lsh is significantly slower than ssh when logging in
over a slow connection. Figure out why.
2002-02-19 Niels Möller <nisse@cuckoo.hack.org>
* configure.in (asm_path): Renamed "path" to "asm_path". Also look
for a machine.m4.
2002-02-16 Niels Möller <nisse@cuckoo.hack.org> 2002-02-16 Niels Möller <nisse@cuckoo.hack.org>
* sparc/aes.asm: Use that IDX2(j) == j ^ 2 * sparc/aes.asm: Use that IDX2(j) == j ^ 2
......
...@@ -25,7 +25,7 @@ define(AES_SBOX_SIZE, 256)dnl ...@@ -25,7 +25,7 @@ define(AES_SBOX_SIZE, 256)dnl
define(AES_IDX_SIZE, 16)dnl define(AES_IDX_SIZE, 16)dnl
define(AES_TABLE_SIZE, 1024)dnl define(AES_TABLE_SIZE, 1024)dnl
STRUCT(AES) STRUCTURE(AES)
STRUCT(SBOX, AES_SBOX_SIZE) STRUCT(SBOX, AES_SBOX_SIZE)
STRUCT(IDX1, AES_IDX_SIZE) STRUCT(IDX1, AES_IDX_SIZE)
......
...@@ -162,8 +162,8 @@ int ...@@ -162,8 +162,8 @@ int
rsa_encrypt(struct rsa_public_key *key, rsa_encrypt(struct rsa_public_key *key,
/* For padding */ /* For padding */
void *random_ctx, nettle_random_func random, void *random_ctx, nettle_random_func random,
unsigned length, const uint8_t *message, unsigned length, const uint8_t *cleartext,
mpz_t gibbberish); mpz_t cipher);
/* Message must point to a buffer of size *LENGTH. KEY->size is enough /* Message must point to a buffer of size *LENGTH. KEY->size is enough
* for all valid messages. On success, *LENGTH is updated to reflect * for all valid messages. On success, *LENGTH is updated to reflect
...@@ -172,8 +172,8 @@ rsa_encrypt(struct rsa_public_key *key, ...@@ -172,8 +172,8 @@ rsa_encrypt(struct rsa_public_key *key,
* didn't fit. */ * didn't fit. */
int int
rsa_decrypt(struct rsa_private_key *key, rsa_decrypt(struct rsa_private_key *key,
unsigned *length, uint8_t *message, unsigned *length, uint8_t *cleartext,
const mpz_t gibberish); const mpz_t ciphertext);
/* Compute x, the e:th root of m. Calling it with x == m is allowed. */ /* Compute x, the e:th root of m. Calling it with x == m is allowed. */
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment