summaryrefslogtreecommitdiffstats
path: root/myproposal.h
AgeCommit message (Expand)Author
2022-03-31upstream: select post-quantum KEXdjm@openbsd.org
2021-11-10upstream: add the sntrup761x25519-sha512@openssh.com hybriddjm@openbsd.org
2021-08-30upstream: After years of forewarning, disable the RSA/SHA-1djm@openbsd.org
2020-10-03upstream: prefer ed25519 signature algorithm variants to ECDSA; okdjm@openbsd.org
2020-01-25upstream: remove ssh-rsa (SHA1) from the list of allowed CAdjm@openbsd.org
2020-01-23upstream: Remove unsupported algorithms from list of defaults at rundtucker@openbsd.org
2020-01-22upstream: remove diffie-hellman-group14-sha1 from default kex totedu@openbsd.org
2019-12-20upstream: sort sk-* methods behind their plain key methods cousinsdjm@openbsd.org
2019-12-16upstream: allow security keys to act as host keys as well as userdjm@openbsd.org
2019-12-11upstream: add security key types to list of keys allowed to act asdjm@openbsd.org
2019-11-19remove all EC algs from proposals, no just sk onesDamien Miller
2019-11-18filter PUBKEY_DEFAULT_PK_ALG for ECC algorithmsDamien Miller
2019-11-13upstream: enable ed25519 support; ok djmmarkus@openbsd.org
2019-11-01upstream: remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL pathdjm@openbsd.org
2019-11-01upstream: Separate myproposal.h userauth pubkey typesdjm@openbsd.org
2019-10-28Wrap OpenSSL bits in WITH_OPENSSL.Darren Tucker
2019-05-17Use the correct macro for SSH_ALLOWED_CA_SIGALGS.Darren Tucker
2019-05-17Conditionalize ECDH methods in CA algos.Darren Tucker
2019-02-24upstream: openssh-7.9 accidentally reused the server's algorithm listsdjm@openbsd.org
2018-09-12upstream: add SSH_ALLOWED_CA_SIGALGS - the default list ofdjm@openbsd.org
2018-07-03upstream: Improve strictness and control over RSA-SHA2 signaturedjm@openbsd.org
2017-05-08upstream commitdjm@openbsd.org
2016-09-29upstream commitdjm@openbsd.org
2016-09-24upstream commitdjm@openbsd.org
2016-09-12upstream commitdjm@openbsd.org
2016-05-02upstream commitdjm@openbsd.org
2016-02-09upstream commitdjm@openbsd.org
2015-12-07upstream commitmarkus@openbsd.org
2015-12-07upstream commitmarkus@openbsd.org
2015-07-15upstream commitmarkus@openbsd.org
2015-07-15upstream commitdjm@openbsd.org
2015-07-15upstream commitdjm@openbsd.org
2015-05-29fix merge botch that left ",," in KEX algsDamien Miller
2015-05-28upstream commitdtucker@openbsd.org
2015-04-29upstream commitjsg@openbsd.org
2015-03-27upstream commitdjm@openbsd.org
2014-08-19 - (djm) [myproposal.h] Make curve25519 KEX dependent onDamien Miller
2014-07-17 - tedu@cvs.openbsd.org 2014/07/11 13:54:34Damien Miller
2014-06-11 - (dtucker) [myprosal.h] Don't include curve25519-sha256@libssh.org inDarren Tucker
2014-05-15 - naddy@cvs.openbsd.org 2014/04/30 19:07:48Damien Miller
2014-05-15 - markus@cvs.openbsd.org 2014/04/29 18:01:49Damien Miller
2014-04-20Three commits in one (since they touch the same heavily-diverged fileDamien Miller
2013-12-07 - markus@cvs.openbsd.org 2013/12/06 13:39:49Damien Miller
2013-11-21 - djm@cvs.openbsd.org 2013/11/21 00:45:44Damien Miller
2013-11-09 - (dtucker) [configure.ac kex.c key.c myproposal.h] Test for the presence ofDarren Tucker
2013-11-08 - (dtucker) [myproposal.h] Conditionally enable CURVE25519_SHA256.Darren Tucker
2013-11-04 - markus@cvs.openbsd.org 2013/11/02 21:59:15Damien Miller
2013-06-11 - (dtucker) [myproposal.h] Make the conditional algorithm support consistentDarren Tucker
2013-06-11 - (dtucker) [myproposal.h] Do not advertise AES GSM ciphers if we don't haveDarren Tucker
2013-06-05 - (dtucker) Enable sha256 kex methods based on the presence of the necessaryDarren Tucker