diff options
author | Damien Miller <djm@cvs.openbsd.org> | 2010-09-09 10:45:46 +0000 |
---|---|---|
committer | Damien Miller <djm@cvs.openbsd.org> | 2010-09-09 10:45:46 +0000 |
commit | e95a6f7d7cd8a1e25672a23ea1aae0884e77bb23 (patch) | |
tree | 9fe91132aec22983cc1b6017f3e7a323ee67ffbb /sys | |
parent | 970787f7373758663abfd863435f27ac03b51fb4 (diff) |
ECDH/ECDSA compliance fix: these methods vary the hash function they use
(SHA256/384/512) depending on the length of the curve in use. The previous
code incorrectly used SHA256 in all cases.
This fix will cause authentication failure when using 384 or 521-bit curve
keys if one peer hasn't been upgraded and the other has. (256-bit curve
keys work ok). In particular you may need to specify HostkeyAlgorithms
when connecting to a server that has not been upgraded from an upgraded
client.
ok naddy@
Diffstat (limited to 'sys')
0 files changed, 0 insertions, 0 deletions