Age | Commit message (Collapse) | Author | |
---|---|---|---|
2018-02-20 | add curve25519-sha256 without @libssh.org | Matt Johnston | |
2018-02-18 | group14-sha256 should be higher than group14-sha1 | Matt Johnston | |
2018-02-09 | Remove none cipher | Matt Johnston | |
2017-08-19 | Pointer parameter could be declared as pointing to const | Francois Perrad | |
2016-07-21 | merge 2016.74 | Matt Johnston | |
2016-05-04 | Convert #ifdef to #if, other build changes | Matt Johnston | |
2016-05-02 | options for disabling "normal" DH | Matt Johnston | |
2016-07-11 | improve algorithm list parsing | Matt Johnston | |
2016-03-16 | const variables | Francois Perrad | |
2016-03-12 | Get rid of group15, move group16 to sha512. | Matt Johnston | |
New groups are disabled by default pending draft-ietf-curdle-ssh-kex-sha2-02 being finalised | |||
2016-01-15 | add dh group15 and group16, disabled by default | Matt Johnston | |
2016-01-14 | Move dh group constants to a separate file | Matt Johnston | |
2015-12-11 | diffie-hellman-group14-sha256 | Matt Johnston | |
2015-06-04 | buf_getstring and buf_putstring now use non-unsigned char* | Matt Johnston | |
2015-06-04 | Merge pull request #13 from gazoo74/fix-warnings | Matt Johnston | |
Fix warnings | |||
2015-06-03 | Disable twofish-ctr by default, add config option | Matt Johnston | |
2015-05-05 | Turn Algo_Type's name attribute into const char * | Gaël PORTAY | |
2015-05-05 | Fix pointer differ in signess warnings [-Werror=pointer-sign] | Gaël PORTAY | |
2015-02-24 | Fix for old compilers, variable declarations at beginning of functions | Thorsten Horstmann | |
and /**/ comments | |||
2015-02-13 | merge | Matt Johnston | |
2015-02-04 | twofish ctr modes | Matt Johnston | |
2015-01-28 | Keep sha1 default | Matt Johnston | |
2015-01-28 | Disable non-delayed zlib for server | Matt Johnston | |
2015-01-23 | Prefer stronger algorithms in algorithm negotiation. | Fedor Brunner | |
Prefer diffie-hellman-group14-sha1 (2048 bit) over diffie-hellman-group1-sha1 (1024 bit). Due to meet-in-the-middle attacks the effective key length of three key 3DES is 112 bits. AES is stronger and faster then 3DES. Prefer to delay the start of compression until after authentication has completed. This avoids exposing compression code to attacks from unauthenticated users. (github pull request #9) | |||
2015-01-23 | Add config option to disable cbc. Disable twofish by default | Matt Johnston | |
2013-11-14 | use oldstyle comments | Matt Johnston | |
2013-11-12 | Various cleanups and fixes for warnings | Matt Johnston | |
--HG-- branch : ecc | |||
2013-11-08 | curve25519 | Matt Johnston | |
--HG-- branch : ecc | |||
2013-10-31 | Default to some larger key sizes | Matt Johnston | |
--HG-- branch : ecc | |||
2013-05-21 | merge in HEAD | Matt Johnston | |
--HG-- branch : ecc | |||
2013-05-03 | ecdsa is working | Matt Johnston | |
--HG-- branch : ecc | |||
2013-04-09 | start on ecdsa keys | Matt Johnston | |
--HG-- branch : ecc | |||
2013-04-08 | - Fix various hardcoded uses of SHA1 | Matt Johnston | |
- rename curves to nistp256 etc - fix svr-auth.c TRACE problem --HG-- branch : ecc | |||
2013-04-07 | ecc kind of works, needs fixing/testing | Matt Johnston | |
--HG-- branch : ecc | |||
2013-04-03 | merge kexguess branch | Matt Johnston | |
2013-04-03 | Put some #ifdef options around first-follows options in case they | Matt Johnston | |
need to be disabled --HG-- branch : kexguess | |||
2013-04-03 | Don't usually need to recalculate dh_e for the repeated kexdh_init packet | Matt Johnston | |
--HG-- branch : kexguess | |||
2013-03-30 | Get rid of client/server specific buf_match_algo, use single | Matt Johnston | |
function with a couple of if statements instead --HG-- branch : kexguess | |||
2013-03-29 | Add kexguess2 behaviour | Matt Johnston | |
--HG-- branch : kexguess | |||
2013-03-29 | More changes for KEX and ECDH. Set up hash descriptors, make ECC code work, | Matt Johnston | |
ses.hash and ses.session_id are now buffers (doesn't compile) --HG-- branch : ecc | |||
2013-03-27 | more bits on ecc branch | Matt Johnston | |
--HG-- branch : ecc | |||
2013-03-26 | refactor kexdh code a bit, start working on ecdh etc | Matt Johnston | |
--HG-- branch : ecc | |||
2013-03-21 | Make hmac-sha2-256 and hmac-sha2-512 work | Matt Johnston | |
2012-05-17 | - Only request "none" cipher after auth has succeeded | Matt Johnston | |
--HG-- branch : insecure-nocrypto | |||
2012-05-17 | Merge in "-m"/"-c" code | Matt Johnston | |
--HG-- branch : insecure-nocrypto | |||
2012-05-17 | ENABLE_USER_ALGO_LIST should work for the client | Matt Johnston | |
2012-05-17 | Add rough support for choosing ciphers/hashes with "-c" or "-m" | Matt Johnston | |
2012-05-16 | Update insecure-nocrypto to current head | Matt Johnston | |
--HG-- branch : insecure-nocrypto | |||
2012-05-10 | - Add hmac-sha2-256 and hmac-sha2-512. Needs debugging, seems to be | Matt Johnston | |
getting keyed incorrectly --HG-- branch : sha2 | |||
2011-02-24 | Add diffie-hellman-group14-sha1 KEX method | Matt Johnston | |
--HG-- extra : convert_revision : 5b9c394ad43745e48c42d671cefac7a5c346082f |