summaryrefslogtreecommitdiffhomepage
path: root/Makefile.in
AgeCommit message (Collapse)Author
2020-12-05fuzz: skip custom mutators with -fsanitize=memoryMatt Johnston
2020-11-13Add server postauth fuzzer, wrap connect_remote()Matt Johnston
2020-11-02fuzzing - fix some wrong types and -lcrypt on macosMatt Johnston
2020-10-29Use SSH packet mutator for preauth tooMatt Johnston
Get rid of separate client mutator. Have 0.1% chance of llvm random mutation Add comments
2020-10-26Preallocate memory for sshpacketmutator. Add fuzzer-client_mutator_nomathsMatt Johnston
2020-10-26Fix fuzz-sshpacketmutator to workMatt Johnston
2020-10-25Add first try at fuzzing custom mutatorMatt Johnston
2020-10-23Move fuzzing code to fuzz/ subdirectory, improve Makefile.inMatt Johnston
2020-10-20Don't sort objects, it breaks -lcrypt orderingMatt Johnston
2020-10-18Add fuzzer-client_nomaths, fix client fuzzerMatt Johnston
--HG-- branch : fuzz
2020-10-18Get client fuzzer building and starting (fails straight away)Matt Johnston
--HG-- branch : fuzz
2020-06-15Fix "make install" for manpages in out-of-tree buildsGabor Z. Papp
2020-05-26merge rsa-sha256Matt Johnston
2020-05-25Add Chacha20-Poly1305, AES128-GCM and AES256-GCM support (#93)Vladislav Grishenko
* Add Chacha20-Poly1305 authenticated encryption * Add general AEAD approach. * Add chacha20-poly1305@openssh.com algo using LibTomCrypt chacha and poly1305 routines. Chacha20-Poly1305 is generally faster than AES256 on CPU w/o dedicated AES instructions, having the same key size. Compiling in will add ~5,5kB to binary size on x86-64. function old new delta chacha_crypt - 1397 +1397 _poly1305_block - 608 +608 poly1305_done - 595 +595 dropbear_chachapoly_crypt - 457 +457 .rodata 26976 27392 +416 poly1305_process - 290 +290 poly1305_init - 221 +221 chacha_setup - 218 +218 encrypt_packet 1068 1270 +202 dropbear_chachapoly_getlength - 147 +147 decrypt_packet 756 897 +141 chacha_ivctr64 - 137 +137 read_packet 543 637 +94 dropbear_chachapoly_start - 94 +94 read_kex_algos 792 880 +88 chacha_keystream - 69 +69 dropbear_mode_chachapoly - 48 +48 sshciphers 280 320 +40 dropbear_mode_none 24 48 +24 dropbear_mode_ctr 24 48 +24 dropbear_mode_cbc 24 48 +24 dropbear_chachapoly_mac - 24 +24 dropbear_chachapoly - 24 +24 gen_new_keys 848 854 +6 ------------------------------------------------------------------------------ (add/remove: 14/0 grow/shrink: 10/0 up/down: 5388/0) Total: 5388 bytes * Add AES128-GCM and AES256-GCM authenticated encryption * Add general AES-GCM mode. * Add aes128-gcm@openssh.com and aes256-gcm@openssh.com algo using LibTomCrypt gcm routines. AES-GCM is combination of AES CTR mode and GHASH, slower than AES-CTR on CPU w/o dedicated AES/GHASH instructions therefore disabled by default. Compiling in will add ~6kB to binary size on x86-64. function old new delta gcm_process - 1060 +1060 .rodata 26976 27808 +832 gcm_gf_mult - 820 +820 gcm_add_aad - 660 +660 gcm_shift_table - 512 +512 gcm_done - 471 +471 gcm_add_iv - 384 +384 gcm_init - 347 +347 dropbear_gcm_crypt - 309 +309 encrypt_packet 1068 1270 +202 decrypt_packet 756 897 +141 gcm_reset - 118 +118 read_packet 543 637 +94 read_kex_algos 792 880 +88 sshciphers 280 360 +80 gcm_mult_h - 80 +80 dropbear_gcm_start - 62 +62 dropbear_mode_gcm - 48 +48 dropbear_mode_none 24 48 +24 dropbear_mode_ctr 24 48 +24 dropbear_mode_cbc 24 48 +24 dropbear_ghash - 24 +24 dropbear_gcm_getlength - 24 +24 gen_new_keys 848 854 +6 ------------------------------------------------------------------------------ (add/remove: 14/0 grow/shrink: 10/0 up/down: 6434/0) Total: 6434 bytes
2020-05-24Add linter for #ifdefMatt Johnston
2020-03-12Add Ed25519 support (#91)Vladislav Grishenko
* Add support for Ed25519 as a public key type Ed25519 is a elliptic curve signature scheme that offers better security than ECDSA and DSA and good performance. It may be used for both user and host keys. OpenSSH key import and fuzzer are not supported yet. Initially inspired by Peter Szabo. * Add curve25519 and ed25519 fuzzers * Add import and export of Ed25519 keys
2019-09-16update ltm to 1.1.0 and enable FIPS 186.4 compliant key-generation (#79)Steffen Jaeckel
* make key-generation compliant to FIPS 186.4 * fix includes in tommath_class.h * update fuzzcorpus instead of error-out * fixup fuzzing make-targets * update Makefile.in * apply necessary patches to ltm sources * clean-up not required ltm files * update to vanilla ltm 1.1.0 this already only contains the required files * remove set/get double
2019-05-15Rename EPKA -> PluginMatt Johnston
2019-05-15External Public-Key Authentication API (#72)fabriziobertocci
* Implemented dynamic loading of an external plug-in shared library to delegate public key authentication * Moved conditional compilation of the plugin infrastructure into the configure.ac script to be able to add -ldl to dropbear build only when the flag is enabled * Added tags file to the ignore list * Updated API to have the constructor to return function pointers in the pliugin instance. Added support for passing user name to the checkpubkey function. Added options to the session returned by the plugin and have dropbear to parse and process them * Added -rdynamic to the linker flags when EPKA is enabled * Changed the API to pass a previously created session to the checkPubKey function (created during preauth) * Added documentation to the API * Added parameter addrstring to plugin creation function * Modified the API to retrieve the auth options. Instead of having them as field of the EPKASession struct, they are stored internally (plugin-dependent) in the plugin/session and retrieved through a pointer to a function (in the session) * Changed option string to be a simple char * instead of unsigned char *
2018-03-05fix some linksMatt Johnston
2018-03-05Add kexdh and kexecdh fuzzersMatt Johnston
2018-03-04set up CXX for fuzzing buildMatt Johnston
2018-03-03add cryptlib for all targets in fuzz buildMatt Johnston
2018-02-28Fix to be able to compile normal(ish) binaries with --enable-fuzzMatt Johnston
--HG-- branch : fuzz
2018-02-28merge from mainMatt Johnston
--HG-- branch : fuzz
2018-02-26only clean libtom when using bundled librariesMatt Johnston
2018-02-26merge from mainMatt Johnston
--HG-- branch : fuzz
2018-02-19- Fix dependencies and remove old default_options.h from version controlMatt Johnston
- Rename default_options.h.in -> default_options.h, and default_options.h -> default_options_guard.h - Fix newlines in default_options.h
2018-02-17merge from mainMatt Johnston
--HG-- branch : fuzz
2018-02-16options: Complete the transition to numeric toggles (`#if')Michael Witten
For the sake of review, this commit alters only the code; the affiliated comments within the source files also need to be updated, but doing so now would obscure the operational changes that have been made here. * All on/off options have been switched to the numeric `#if' variant; that is the only way to make this `default_options.h.in' thing work in a reasonable manner. * There is now some very minor compile-time checking of the user's choice of options. * NO_FAST_EXPTMOD doesn't seem to be used, so it has been removed. * ENABLE_USER_ALGO_LIST was supposed to be renamed DROPBEAR_USER_ALGO_LIST, and this commit completes that work. * DROPBEAR_FUZZ seems to be a relatively new, as-yet undocumented option, which was added by the following commit: commit 6e0b539e9ca0b5628c6c5a3d118ad6a2e79e8039 Author: Matt Johnston <matt@ucc.asn.au> Date: Tue May 23 22:29:21 2017 +0800 split out checkpubkey_line() separately It has now been added to `sysoptions.h' and defined as `0' by default. * The configuration option `DROPBEAR_PASSWORD_ENV' is no longer listed in `default_options.h.in'; it is no longer meant to be set by the user, and is instead left to be defined in `sysoptions.h' (where it was already being defined) as merely the name of the environment variable in question: DROPBEAR_PASSWORD To enable or disable use of that environment variable, the user must now toggle `DROPBEAR_USE_DROPBEAR_PASSWORD'. * The sFTP support is now toggled by setting `DROPBEAR_SFTPSERVER', and the path of the sFTP server program is set independently through the usual SFTPSERVER_PATH.
2018-02-14update some dependenciesMatt Johnston
2018-02-11build: Remove unused constructs: `space' and `AC_PROG_MAKE_SET'Michael Witten
The makefile variable `space' is never used. The autoconf output variable `SET_MAKE' is never used, so the autoconf macro `AC_PROG_MAKE_SET' has been removed.
2018-02-11Fix building default_options.hMatt Johnston
2018-01-23add fuzzer-preauth_nomathsMatt Johnston
--HG-- branch : fuzz
2018-01-23merge up to dateMatt Johnston
--HG-- branch : fuzz
2017-06-27EXEEXT for a few more targets, dropbearmulti in particular for CygwinMatt Johnston
From William K. Foster.
2017-06-27document --enable-static in place of STATIC=1Matt Johnston
2017-06-27add --enable-static configure argument. disable conflicting harden flagsMatt Johnston
2017-05-26add fuzzer-verifyMatt Johnston
--HG-- branch : fuzz
2017-05-23create fuzzer .options filesMatt Johnston
--HG-- branch : fuzz
2017-05-23fuzzer-pubkeyMatt Johnston
--HG-- branch : fuzz
2017-05-21add dbmalloc epoch cleanupMatt Johnston
--HG-- branch : fuzz
2017-05-19add wrapfd. improve fuzzer in makefileMatt Johnston
--HG-- branch : fuzz
2017-05-18merge main to fuzzMatt Johnston
--HG-- branch : fuzz
2017-05-14rename fuzzer -> fuzz-target, add list-fuzz-targetsMatt Johnston
--HG-- branch : fuzz
2017-05-13Use CXX to link fuzzer, also link with $FUZZLIBMatt Johnston
--HG-- branch : fuzz
2017-05-13fuzz harnessMatt Johnston
--HG-- branch : fuzz
2017-05-12copy over some fuzzing code from AFL branchMatt Johnston
--HG-- branch : fuzz
2016-05-04Add generated header default_options.h to version control.Matt Johnston
This is a workaround since I cannot figure how to get dependencies to work properly with "make -j"
2016-05-04Convert #ifdef to #if, other build changesMatt Johnston