summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/myproposal.h
AgeCommit message (Expand)Author
2016-02-09turn off more old crypto in the client: hmac-md5, ripemd, truncatedDamien Miller
2015-12-05prefer rsa-sha2-512 over -256 for hostkeys, too; noticed by naddy@Markus Friedl
2015-12-04implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)Markus Friedl
2015-07-10Turn off DSA by default; add HostKeyAlgorithms to the server andMarkus Friedl
2015-07-03turn off 1024 bit diffie-hellman-group1-sha1 key exchange methodDamien Miller
2015-07-03delete support for legacy v00 certificates; "sure" markus@ dtucker@Damien Miller
2015-05-27Reorder client proposal to prefer diffie-hellman-group-exchange-sha1 overDarren Tucker
2015-04-21Add back a backslash removed in rev 1.42 so KEX_SERVER_ENCRYPT willJonathan Gray
2015-03-24promote chacha20-poly1305@openssh.com to be the default cipher;Damien Miller
2014-07-11by popular demand, add back hamc-sha1 to server proposal for better compatTed Unangst
2014-04-30UMAC can use our local fallback implementation of AES when OpenSSL isn'tChristian Weisgerber
2014-04-29make compiling against OpenSSL optional (make OPENSSL=no);Markus Friedl
2014-03-27disable weak proposals in sshd, but keep them in ssh; ok djm@Markus Friedl
2014-03-26The current sharing of myproposal[] between both client and server codeTheo de Raadt
2014-03-25trimm default proposals.Markus Friedl
2013-12-06support ed25519 keys (hostkeys and user identities) using the public domainMarkus Friedl
2013-11-21Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com"Damien Miller
2013-11-02use curve25519 for default key exchange (curve25519-sha256@libssh.org);Markus Friedl
2013-01-08support AES-GCM as defined in RFC 5647 (but with simpler KEX handling)Markus Friedl
2012-12-11add encrypt-then-mac (EtM) modes to openssh by defining new mac algorithmsMarkus Friedl
2012-10-04add umac128 variant; ok djm@ at n2k12Markus Friedl
2012-06-28Remove hmac-sha2-256-96 and hmac-sha2-512-96 MACs since they were removedDarren Tucker
2011-08-02Add new SHA256 and SHA512 based HMAC modes fromDamien Miller
2010-09-01prefer ECDH in a 256 bit curve field; prompted by naddy@Damien Miller
2010-08-31Implement Elliptic Curve Cryptography modes for key exchange (ECDH) andDamien Miller
2010-04-16revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with theDamien Miller
2010-02-26Add support for certificate key types for users and hosts.Damien Miller
2009-01-23prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBCDamien Miller
2007-06-07Add a new MAC algorithm for data integrity, UMAC-64 (not default yet, mustPeter Valchev
2006-03-25standardise spacing in $OpenBSD$ tags; requested by deraadt@Damien Miller
2006-03-19spacingTheo de Raadt
2006-03-07Implement the diffie-hellman-group-exchange-sha256 key exchange methodDamien Miller
2005-07-25add a new compression method that delays compression until the userMarkus Friedl
2005-05-23add support for draft-harris-ssh-arcfour-fixes-02 improved arcfour modes;Damien Miller
2004-06-13implement diffie-hellman-group14-sha1 kex method (trivial extension toDamien Miller
2003-05-17experimental support for aes-ctr modes fromMarkus Friedl
2002-04-03re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.netMarkus Friedl
2002-01-21remove "rijndael-*", just use "aes-" since this how rijndael is calledMarkus Friedl
2001-03-05switch to aes128-cbc/hmac-md5 by default in SSH2 -- faster; provos & markus okTheo de Raadt
2001-02-111) clean up the MAC support for SSH-2Markus Friedl
2001-01-29$OpenBSD$Niklas Hallqvist
2000-11-12add support for RSA to SSH2. please test.Markus Friedl
2000-10-13prefer no compressionMarkus Friedl
2000-10-13rijndael/aes supportMarkus Friedl
2000-10-11new cipher frameworkMarkus Friedl
2000-10-11First rough implementation of the diffie-hellman group exchange. TheNiels Provos
2000-09-07cleanup copyright notices on all files. I have attempted to be accurate withTheo de Raadt
2000-05-25split kexinit/kexdh, factor out common codeMarkus Friedl
2000-05-08complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)Markus Friedl
2000-04-04ssh2 client implementation, interops w/ ssh.com and lsh servers.Markus Friedl