summaryrefslogtreecommitdiffhomepage
path: root/common-algo.c
AgeCommit message (Collapse)Author
2018-02-20add curve25519-sha256 without @libssh.orgMatt Johnston
2018-02-18group14-sha256 should be higher than group14-sha1Matt Johnston
2018-02-09Remove none cipherMatt Johnston
2017-08-19Pointer parameter could be declared as pointing to constFrancois Perrad
2016-07-21merge 2016.74Matt Johnston
2016-05-04Convert #ifdef to #if, other build changesMatt Johnston
2016-05-02options for disabling "normal" DHMatt Johnston
2016-07-11improve algorithm list parsingMatt Johnston
2016-03-16const variablesFrancois Perrad
2016-03-12Get rid of group15, move group16 to sha512.Matt Johnston
New groups are disabled by default pending draft-ietf-curdle-ssh-kex-sha2-02 being finalised
2016-01-15add dh group15 and group16, disabled by defaultMatt Johnston
2016-01-14Move dh group constants to a separate fileMatt Johnston
2015-12-11diffie-hellman-group14-sha256Matt Johnston
2015-06-04buf_getstring and buf_putstring now use non-unsigned char*Matt Johnston
2015-06-04Merge pull request #13 from gazoo74/fix-warningsMatt Johnston
Fix warnings
2015-06-03Disable twofish-ctr by default, add config optionMatt Johnston
2015-05-05Turn Algo_Type's name attribute into const char *Gaël PORTAY
2015-05-05Fix pointer differ in signess warnings [-Werror=pointer-sign]Gaël PORTAY
2015-02-24Fix for old compilers, variable declarations at beginning of functionsThorsten Horstmann
and /**/ comments
2015-02-13mergeMatt Johnston
2015-02-04twofish ctr modesMatt Johnston
2015-01-28Keep sha1 defaultMatt Johnston
2015-01-28Disable non-delayed zlib for serverMatt Johnston
2015-01-23Prefer stronger algorithms in algorithm negotiation.Fedor Brunner
Prefer diffie-hellman-group14-sha1 (2048 bit) over diffie-hellman-group1-sha1 (1024 bit). Due to meet-in-the-middle attacks the effective key length of three key 3DES is 112 bits. AES is stronger and faster then 3DES. Prefer to delay the start of compression until after authentication has completed. This avoids exposing compression code to attacks from unauthenticated users. (github pull request #9)
2015-01-23Add config option to disable cbc. Disable twofish by defaultMatt Johnston
2013-11-14use oldstyle commentsMatt Johnston
2013-11-12Various cleanups and fixes for warningsMatt Johnston
--HG-- branch : ecc
2013-11-08curve25519Matt Johnston
--HG-- branch : ecc
2013-10-31Default to some larger key sizesMatt Johnston
--HG-- branch : ecc
2013-05-21merge in HEADMatt Johnston
--HG-- branch : ecc
2013-05-03ecdsa is workingMatt Johnston
--HG-- branch : ecc
2013-04-09start on ecdsa keysMatt Johnston
--HG-- branch : ecc
2013-04-08- Fix various hardcoded uses of SHA1Matt Johnston
- rename curves to nistp256 etc - fix svr-auth.c TRACE problem --HG-- branch : ecc
2013-04-07ecc kind of works, needs fixing/testingMatt Johnston
--HG-- branch : ecc
2013-04-03merge kexguess branchMatt Johnston
2013-04-03Put some #ifdef options around first-follows options in case theyMatt Johnston
need to be disabled --HG-- branch : kexguess
2013-04-03Don't usually need to recalculate dh_e for the repeated kexdh_init packetMatt Johnston
--HG-- branch : kexguess
2013-03-30Get rid of client/server specific buf_match_algo, use singleMatt Johnston
function with a couple of if statements instead --HG-- branch : kexguess
2013-03-29Add kexguess2 behaviourMatt Johnston
--HG-- branch : kexguess
2013-03-29More changes for KEX and ECDH. Set up hash descriptors, make ECC code work,Matt Johnston
ses.hash and ses.session_id are now buffers (doesn't compile) --HG-- branch : ecc
2013-03-27more bits on ecc branchMatt Johnston
--HG-- branch : ecc
2013-03-26refactor kexdh code a bit, start working on ecdh etcMatt Johnston
--HG-- branch : ecc
2013-03-21Make hmac-sha2-256 and hmac-sha2-512 workMatt Johnston
2012-05-17- Only request "none" cipher after auth has succeededMatt Johnston
--HG-- branch : insecure-nocrypto
2012-05-17Merge in "-m"/"-c" codeMatt Johnston
--HG-- branch : insecure-nocrypto
2012-05-17ENABLE_USER_ALGO_LIST should work for the clientMatt Johnston
2012-05-17Add rough support for choosing ciphers/hashes with "-c" or "-m"Matt Johnston
2012-05-16Update insecure-nocrypto to current headMatt Johnston
--HG-- branch : insecure-nocrypto
2012-05-10- Add hmac-sha2-256 and hmac-sha2-512. Needs debugging, seems to beMatt Johnston
getting keyed incorrectly --HG-- branch : sha2
2011-02-24Add diffie-hellman-group14-sha1 KEX methodMatt Johnston
--HG-- extra : convert_revision : 5b9c394ad43745e48c42d671cefac7a5c346082f