summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/compat.h
diff options
context:
space:
mode:
authorDamien Miller <djm@cvs.openbsd.org>2013-12-30 23:52:29 +0000
committerDamien Miller <djm@cvs.openbsd.org>2013-12-30 23:52:29 +0000
commite514b87438697c32ab3cbb50e5e346fd11d72074 (patch)
treebefed29d63a592d86f8887f456ccf779061610af /usr.bin/ssh/compat.h
parentd09c14e9c51a476c97026881388d6fa14b1148cd (diff)
refuse RSA keys from old proprietary clients/servers that use the
obsolete RSA+MD5 signature scheme. it will still be possible to connect with these clients/servers but only DSA keys will be accepted, and we'll deprecate them entirely in a future release. ok markus@
Diffstat (limited to 'usr.bin/ssh/compat.h')
-rw-r--r--usr.bin/ssh/compat.h3
1 files changed, 2 insertions, 1 deletions
diff --git a/usr.bin/ssh/compat.h b/usr.bin/ssh/compat.h
index 3ae5d9c7836..b174fa1719c 100644
--- a/usr.bin/ssh/compat.h
+++ b/usr.bin/ssh/compat.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: compat.h,v 1.43 2011/09/23 07:45:05 markus Exp $ */
+/* $OpenBSD: compat.h,v 1.44 2013/12/30 23:52:27 djm Exp $ */
/*
* Copyright (c) 1999, 2000, 2001 Markus Friedl. All rights reserved.
@@ -65,6 +65,7 @@ void enable_compat20(void);
void compat_datafellows(const char *);
int proto_spec(const char *);
char *compat_cipher_proposal(char *);
+char *compat_pkalg_proposal(char *);
extern int compat13;
extern int compat20;