Release v1.4.15: Last Second Fixes

1. Added a UNICODE define to the Windows build of the wolfSSHd auth
   module so it picked the correct strings.
2. Fixed a typo in the ChangeLog.
pull/637/head
John Safranek 2023-12-22 15:28:21 -08:00
parent c5d37047f0
commit 271e560045
No known key found for this signature in database
GPG Key ID: 8CE817DE0D3CCB4A
2 changed files with 5 additions and 2 deletions

View File

@ -7,7 +7,7 @@
been observed in wolfSSH, the fix is now implemented. The RSA signature
is verified before sending to the peer.
- Keegan Ryan, Kaiwen He, George Arnold Sullivan, and Nadia Heninger. 2023.
Passive SSH Key Compormise via Lattices. Cryptology ePrint Archive,
Passive SSH Key Compromise via Lattices. Cryptology ePrint Archive,
Report 2023/1711. https://eprint.iacr.org/2023/1711.
## Notes
@ -46,7 +46,7 @@
* Speed improvements for SFTP. (Fixed unnecessary waiting.)
* Windows wolfSSHd improvements.
* The functions `wolfSSH_ReadKey_file()` and `wolfSSH_ReadKey_buffer()`
handles more encodings.
handle more encodings.
* Add function to supply new protocol ID string.
* Support larger RSA keys.
* MinGW support updates.

View File

@ -41,7 +41,10 @@
#include <unistd.h>
#else
/* avoid macro redefinition warnings on STATUS values when include ntstatus.h */
#undef UMDF_USING_NTSTATUS
#define UMDF_USING_NTSTATUS
#undef UNICODE
#define UNICODE
#endif
#include <wolfssh/ssh.h>