Skip to content

Commit

Permalink
Merge pull request wolfSSL#637 from ejohnstown/release-v1.4.15-2
Browse files Browse the repository at this point in the history
Release v1.4.15: Last Second Fixes
  • Loading branch information
douzzer authored Dec 23, 2023
2 parents c5d3704 + 271e560 commit 60a2960
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 2 deletions.
4 changes: 2 additions & 2 deletions ChangeLog.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
been observed in wolfSSH, the fix is now implemented. The RSA signature
is verified before sending to the peer.
- Keegan Ryan, Kaiwen He, George Arnold Sullivan, and Nadia Heninger. 2023.
Passive SSH Key Compormise via Lattices. Cryptology ePrint Archive,
Passive SSH Key Compromise via Lattices. Cryptology ePrint Archive,
Report 2023/1711. https://eprint.iacr.org/2023/1711.

## Notes
Expand Down Expand Up @@ -46,7 +46,7 @@
* Speed improvements for SFTP. (Fixed unnecessary waiting.)
* Windows wolfSSHd improvements.
* The functions `wolfSSH_ReadKey_file()` and `wolfSSH_ReadKey_buffer()`
handles more encodings.
handle more encodings.
* Add function to supply new protocol ID string.
* Support larger RSA keys.
* MinGW support updates.
Expand Down
3 changes: 3 additions & 0 deletions apps/wolfsshd/auth.c
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,10 @@
#include <unistd.h>
#else
/* avoid macro redefinition warnings on STATUS values when include ntstatus.h */
#undef UMDF_USING_NTSTATUS
#define UMDF_USING_NTSTATUS
#undef UNICODE
#define UNICODE
#endif

#include <wolfssh/ssh.h>
Expand Down

0 comments on commit 60a2960

Please sign in to comment.