summaryrefslogtreecommitdiff
path: root/sys
diff options
context:
space:
mode:
authorDamien Miller <djm@cvs.openbsd.org>2010-09-09 10:45:46 +0000
committerDamien Miller <djm@cvs.openbsd.org>2010-09-09 10:45:46 +0000
commite95a6f7d7cd8a1e25672a23ea1aae0884e77bb23 (patch)
tree9fe91132aec22983cc1b6017f3e7a323ee67ffbb /sys
parent970787f7373758663abfd863435f27ac03b51fb4 (diff)
ECDH/ECDSA compliance fix: these methods vary the hash function they use
(SHA256/384/512) depending on the length of the curve in use. The previous code incorrectly used SHA256 in all cases. This fix will cause authentication failure when using 384 or 521-bit curve keys if one peer hasn't been upgraded and the other has. (256-bit curve keys work ok). In particular you may need to specify HostkeyAlgorithms when connecting to a server that has not been upgraded from an upgraded client. ok naddy@
Diffstat (limited to 'sys')
0 files changed, 0 insertions, 0 deletions