Mercurial > dropbear
view filelist.txt @ 1672:3a97f14c0235
Add Chacha20-Poly1305, AES128-GCM and AES256-GCM support (#93)
* Add Chacha20-Poly1305 authenticated encryption
* Add general AEAD approach.
* Add [email protected] algo using LibTomCrypt chacha and
poly1305 routines.
Chacha20-Poly1305 is generally faster than AES256 on CPU w/o dedicated
AES instructions, having the same key size.
Compiling in will add ~5,5kB to binary size on x86-64.
function old new delta
chacha_crypt - 1397 +1397
_poly1305_block - 608 +608
poly1305_done - 595 +595
dropbear_chachapoly_crypt - 457 +457
.rodata 26976 27392 +416
poly1305_process - 290 +290
poly1305_init - 221 +221
chacha_setup - 218 +218
encrypt_packet 1068 1270 +202
dropbear_chachapoly_getlength - 147 +147
decrypt_packet 756 897 +141
chacha_ivctr64 - 137 +137
read_packet 543 637 +94
dropbear_chachapoly_start - 94 +94
read_kex_algos 792 880 +88
chacha_keystream - 69 +69
dropbear_mode_chachapoly - 48 +48
sshciphers 280 320 +40
dropbear_mode_none 24 48 +24
dropbear_mode_ctr 24 48 +24
dropbear_mode_cbc 24 48 +24
dropbear_chachapoly_mac - 24 +24
dropbear_chachapoly - 24 +24
gen_new_keys 848 854 +6
------------------------------------------------------------------------------
(add/remove: 14/0 grow/shrink: 10/0 up/down: 5388/0) Total: 5388 bytes
* Add AES128-GCM and AES256-GCM authenticated encryption
* Add general AES-GCM mode.
* Add [email protected] and [email protected] algo using
LibTomCrypt gcm routines.
AES-GCM is combination of AES CTR mode and GHASH, slower than AES-CTR on
CPU w/o dedicated AES/GHASH instructions therefore disabled by default.
Compiling in will add ~6kB to binary size on x86-64.
function old new delta
gcm_process - 1060 +1060
.rodata 26976 27808 +832
gcm_gf_mult - 820 +820
gcm_add_aad - 660 +660
gcm_shift_table - 512 +512
gcm_done - 471 +471
gcm_add_iv - 384 +384
gcm_init - 347 +347
dropbear_gcm_crypt - 309 +309
encrypt_packet 1068 1270 +202
decrypt_packet 756 897 +141
gcm_reset - 118 +118
read_packet 543 637 +94
read_kex_algos 792 880 +88
sshciphers 280 360 +80
gcm_mult_h - 80 +80
dropbear_gcm_start - 62 +62
dropbear_mode_gcm - 48 +48
dropbear_mode_none 24 48 +24
dropbear_mode_ctr 24 48 +24
dropbear_mode_cbc 24 48 +24
dropbear_ghash - 24 +24
dropbear_gcm_getlength - 24 +24
gen_new_keys 848 854 +6
------------------------------------------------------------------------------
(add/remove: 14/0 grow/shrink: 10/0 up/down: 6434/0) Total: 6434 bytes
author | Vladislav Grishenko <themiron@users.noreply.github.com> |
---|---|
date | Mon, 25 May 2020 20:50:25 +0500 |
parents | d32bcb5c557d |
children |
line wrap: on
line source
This file is out of date - it remains here in case it is still of use. The basic naming convention is svr- and cli- for seperate parts, then common- for common parts. Some files have no prefix. A brief rundown on which files do what, and their corresponding sections in the IETF drafts. The .c files usually have corresponding .h files. Transport layer draft-ietf-secsh-transport-16.txt =============== session.c Contains the main select() loop, and handles setting up/closing down ssh connections algo.c Framework for handling various ciphers/hashes/algos, and choosing between the lists of client/server preferred ones kex.c Key exchange routines, used at startup to negotiate which algorithms to use, and also to obtain session keys. This also runs when rekeying during the connection. packet.c Handles the basic packet encryption/decryption, and switching to the appropriate packet handlers. Called from session.c's main select loop. service.c Handles service requests (userauth or connection) Authentication draft-ietf-secsh-userauth-17.txt ============== auth.c General auth handling, including user checking etc, passes different auth types to auth{passwd,pubkey} authpasswd.c Handles /etc/passwd or /etc/shadow auth authpubkey.c Handles ~/.ssh/authorized_keys auth Connection draft-ietf-secsh-connect-17.txt ========== channel.c Channel handling routines - each shell/tcp conn/agent etc is a channel. chansession.c Handles shell/exec requests sshpty.c From OpenSSH, allocates PTYs etc termcodes.c Mapping of POSIX terminal codes to SSH terminal codes loginrec.c From OpenSSH, handles utmp/wtmp logging x11fwd.c Handles X11 forwarding agentfwd.c Handles auth-agent forwarding requests localtcpfwd.c Handles -L style tcp forwarding requests, setting up the listening port and also handling connections to that port (and subsequent channels) Program-related =============== dbmulti.c Combination binary chooser main() function dbutil.c Various utility functions, incl logging, memory etc dropbearconvert.c Conversion from dropbear<->openssh keys, uses keyimport.c to do most of the work dropbearkey.c Generates keys, calling gen{dss,rsa} keyimport.c Modified from PuTTY, converts between key types main.c dropbear's main(), handles listening, forking for new connections, child-process limits runopts.c Parses commandline options options.h Compile-time feature selection config.h Features selected from configure debug.h Compile-time selection of debug features includes.h Included system headers etc Generic Routines ================ signkey.c A generic handler for pubkeys, switches to dss or rsa depending on the key type rsa.c RSA asymmetric crypto routines dss.c DSS asymmetric crypto routines ed25519.c Ed25519 asymmetric crypto routines gened25519.c Ed25519 key generation gendss.c DSS key generation genrsa.c RSA key generation bignum.c Some bignum helper functions queue.c A queue, used to enqueue encrypted packets to send random.c PRNG, based on /dev/urandom or prngd atomicio.c From OpenSSH, does `blocking' IO on non-blocking fds buffer.c Buffer-usage routines, with size checking etc vim:set ts=8: