summaryrefslogtreecommitdiffstats
path: root/myproposal.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* upstream: Turn off finite field (a.k.a modp) Diffie-Hellman keydjm@openbsd.org2024-10-141-4/+4
* upstream: pull post-quantum ML-KEM/x25519 key exchange out fromdjm@openbsd.org2024-09-091-1/+2
* upstream: sntrup761x25519-sha512 now has an IANA codepoint assigned, sodjm@openbsd.org2024-08-231-1/+2
* upstream: select post-quantum KEXdjm@openbsd.org2022-03-301-2/+2
* upstream: add the sntrup761x25519-sha512@openssh.com hybriddjm@openbsd.org2021-11-101-1/+2
* upstream: After years of forewarning, disable the RSA/SHA-1djm@openbsd.org2021-08-301-4/+2
* upstream: prefer ed25519 signature algorithm variants to ECDSA; okdjm@openbsd.org2020-10-031-7/+7
* upstream: remove ssh-rsa (SHA1) from the list of allowed CAdjm@openbsd.org2020-01-251-3/+2
* upstream: Remove unsupported algorithms from list of defaults at rundtucker@openbsd.org2020-01-231-115/+23
* upstream: remove diffie-hellman-group14-sha1 from default kex totedu@openbsd.org2020-01-221-3/+2
* upstream: sort sk-* methods behind their plain key methods cousinsdjm@openbsd.org2019-12-201-1/+1
* upstream: allow security keys to act as host keys as well as userdjm@openbsd.org2019-12-161-29/+11
* upstream: add security key types to list of keys allowed to act asdjm@openbsd.org2019-12-111-2/+4
* remove all EC algs from proposals, no just sk onesDamien Miller2019-11-181-6/+2
* filter PUBKEY_DEFAULT_PK_ALG for ECC algorithmsDamien Miller2019-11-181-13/+19
* upstream: enable ed25519 support; ok djmmarkus@openbsd.org2019-11-121-1/+3
* upstream: remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL pathdjm@openbsd.org2019-11-011-5/+1
* upstream: Separate myproposal.h userauth pubkey typesdjm@openbsd.org2019-10-311-1/+24
* Wrap OpenSSL bits in WITH_OPENSSL.Darren Tucker2019-10-281-0/+2
* Use the correct macro for SSH_ALLOWED_CA_SIGALGS.Darren Tucker2019-05-171-1/+1
* Conditionalize ECDH methods in CA algos.Darren Tucker2019-05-171-3/+1
* upstream: openssh-7.9 accidentally reused the server's algorithm listsdjm@openbsd.org2019-02-241-10/+5
* upstream: add SSH_ALLOWED_CA_SIGALGS - the default list ofdjm@openbsd.org2018-09-121-1/+13
* upstream: Improve strictness and control over RSA-SHA2 signaturedjm@openbsd.org2018-07-031-1/+3
* upstream commitdjm@openbsd.org2017-05-081-3/+2
* upstream commitdjm@openbsd.org2016-09-281-2/+2
* upstream commitdjm@openbsd.org2016-09-231-2/+5
* upstream commitdjm@openbsd.org2016-09-121-2/+2
* upstream commitdjm@openbsd.org2016-05-021-4/+11
* upstream commitdjm@openbsd.org2016-02-091-15/+4
* upstream commitmarkus@openbsd.org2015-12-071-2/+2
* upstream commitmarkus@openbsd.org2015-12-071-2/+4
* upstream commitmarkus@openbsd.org2015-07-151-4/+2
* upstream commitdjm@openbsd.org2015-07-151-3/+2
* upstream commitdjm@openbsd.org2015-07-151-3/+1
* fix merge botch that left ",," in KEX algsDamien Miller2015-05-291-2/+2
* upstream commitdtucker@openbsd.org2015-05-281-5/+8
* upstream commitjsg@openbsd.org2015-04-291-2/+2
* upstream commitdjm@openbsd.org2015-03-271-7/+7
* - (djm) [myproposal.h] Make curve25519 KEX dependent onDamien Miller2014-08-191-1/+1
* - tedu@cvs.openbsd.org 2014/07/11 13:54:34Damien Miller2014-07-171-8/+8
* - (dtucker) [myprosal.h] Don't include curve25519-sha256@libssh.org inDarren Tucker2014-06-101-2/+7
* - naddy@cvs.openbsd.org 2014/04/30 19:07:48Damien Miller2014-05-151-1/+5
* - markus@cvs.openbsd.org 2014/04/29 18:01:49Damien Miller2014-05-151-1/+26
* Three commits in one (since they touch the same heavily-diverged fileDamien Miller2014-04-201-27/+42
* - markus@cvs.openbsd.org 2013/12/06 13:39:49Damien Miller2013-12-071-1/+3
* - djm@cvs.openbsd.org 2013/11/21 00:45:44Damien Miller2013-11-211-1/+2
* - (dtucker) [configure.ac kex.c key.c myproposal.h] Test for the presence ofDarren Tucker2013-11-091-0/+12
* - (dtucker) [myproposal.h] Conditionally enable CURVE25519_SHA256.Darren Tucker2013-11-081-1/+4
* - markus@cvs.openbsd.org 2013/11/02 21:59:15Damien Miller2013-11-031-1/+2