tomaswolf opened a new pull request, #352: URL: https://github.com/apache/mina-sshd/pull/352
OpenSSH supports three AEAD algorithms for encrypting private keys: aes128-gcm, aes256-gcm, and chacha20-poly1305. For these encryptions the file format is a bit special: the MAC is just dumped after the encrypted private key data. OpenSSH uses no AAD for these encryptions, and for chacha20-poly1305, the IV is all zeroes (and not generated by the bcrypt KDF). See also [1] and [2]. Adapt the code to handle both AES-GCM and ChaCha20-Poly1305, clean up a little, and add tests. [1] https://bugzilla.mindrot.org/show_bug.cgi?id=2366 [2] https://bugzilla.mindrot.org/show_bug.cgi?id=3553 -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org For additional commands, e-mail: dev-h...@mina.apache.org