summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/kex.c
AgeCommit message (Expand)Author
2018-07-09Revert previous two commitsStefan Fritsch
2018-07-06Rename COMP_DELAYED to COMP_ZLIBStefan Fritsch
2018-07-06Remove leftovers from pre-authentication compressionStefan Fritsch
2018-07-04repair PubkeyAcceptedKeyTypes (and friends) after RSA signature work -Damien Miller
2018-07-03Improve strictness and control over RSA-SHA2 signature types:Damien Miller
2018-02-07Remove all guards for calls to OpenSSL free functions - all of theseJoel Sing
2018-01-23Drop compatibility hacks for some ancient SSH implementations, includingDamien Miller
2017-06-13Do not require that unknown EXT_INFO extension values not containDamien Miller
2017-05-30protocol handlers all get struct ssh passed; ok djm@Markus Friedl
2017-04-30unifdef WITH_SSH1Damien Miller
2017-03-15disallow KEXINIT before NEWKEYS; ok djm; report by vegard.nossum at oracle.comMarkus Friedl
2017-03-10fix regression in 7.4 server-sig-algs, where we were accidentallyDamien Miller
2017-03-10Plug some mem leaks mostly on error paths. From jjelen at redhat.comDarren Tucker
2017-02-03support =- for removing methods from algorithms lists, e.g.Damien Miller
2016-10-10Unregister the KEXINIT handler after message has been received.Markus Friedl
2016-09-28put back some pre-auth zlib bits that I shouldn't have removed -Damien Miller
2016-09-28restore pre-auth compression support in the client -- the previousDamien Miller
2016-09-22support plain curve25519-sha256 KEX algorithm now that it isDamien Miller
2016-09-21correctly return errors from kex_send_ext_info(). Fix from Sami FarinDamien Miller
2016-09-19move inbound NEWKEYS handling to kex layer; otherwise early NEWKEYS causesMarkus Friedl
2016-09-12list all supported signature algorithms in the server-sig-algsDamien Miller
2016-09-12Add MAXIMUM(), MINIMUM(), and ROUNDUP() to misc.h, then use those definitionsTheo de Raadt
2016-09-06update ext_info_c every time we receive a kexinit msg; fixes sending ofMarkus Friedl
2016-05-02add support for additional fixed DH groups fromDamien Miller
2016-02-08refactor activation of rekeyingDamien Miller
2016-01-14remove roaming support; ok djm@Markus Friedl
2015-12-13unbreak connections with peers that set first_kex_follows;Damien Miller
2015-12-10Remove NULL-checks before free().mmcc
2015-12-04implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)Markus Friedl
2015-11-13send SSH2_MSG_UNIMPLEMENTED replies to unexpected messages duringDamien Miller
2015-10-13free the correct IV length, don't assume it's always the cipherDamien Miller
2015-08-21Improve printing of KEX offers and decisionsDamien Miller
2015-07-30Allow ssh_config and sshd_config kex parameters options be prefixedDamien Miller
2015-07-29fix bug in previous; was printing incorrect string for failedDamien Miller
2015-07-29include the peer's offer when logging a failure to negotiate aDamien Miller
2015-04-17don't try to cleanup NULL KEX proposals in kex_prop_free();Damien Miller
2015-01-30fix ssh protocol 1, spotted by miod@Damien Miller
2015-01-26correctly match ECDSA subtype (== curve) for offered/receviedDamien Miller
2015-01-20Reduce use of <sys/param.h> and transition to <limits.h> throughout.Theo de Raadt
2015-01-19adapt kex to sshbuf and struct ssh; ok djm@Markus Friedl
2015-01-19move dispatch to struct ssh; ok djm@Markus Friedl
2015-01-19update packet.c & isolate, introduce struct sshMarkus Friedl
2014-04-29make compiling against OpenSSL optional (make OPENSSL=no);Markus Friedl
2014-02-02convert memset of potentially-private data to explicit_bzero()Damien Miller
2014-01-25dh_need needs to be set to max(seclen, blocksize, ivlen, mac_len)Markus Friedl
2014-01-25Add a special case for the DH group size for 3des-cbc, which has anDarren Tucker
2014-01-12avoid use of OpenSSL BIGNUM type and functions for KEX withDamien Miller
2014-01-09Introduce digest API and use it to perform all hashing operationsDamien Miller
2013-11-07Output the effective values of Ciphers, MACs and KexAlgorithms whenDarren Tucker
2013-11-02use curve25519 for default key exchange (curve25519-sha256@libssh.org);Markus Friedl