tomaswolf opened a new pull request, #352:
URL: https://github.com/apache/mina-sshd/pull/352

   OpenSSH supports three AEAD algorithms for encrypting private keys: 
aes128-gcm, aes256-gcm, and chacha20-poly1305. For these encryptions the file 
format is a bit special: the MAC is just dumped after the encrypted private key 
data. OpenSSH uses no AAD for these encryptions, and for chacha20-poly1305, the 
IV is all zeroes (and not generated by the bcrypt KDF).
   
   See also [1] and [2].
   
   Adapt the code to handle both AES-GCM and ChaCha20-Poly1305, clean up a 
little, and add tests.
   
   [1] https://bugzilla.mindrot.org/show_bug.cgi?id=2366
   [2] https://bugzilla.mindrot.org/show_bug.cgi?id=3553


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org

Reply via email to