index
:
delta/openssh-git.git
IBS
PRIVSEP
V_2_5_2
V_2_9_9
V_2_9_P1
V_3_0_2
V_3_2_3
V_3_3
V_3_5
V_3_6
V_3_6_1
V_3_7
V_3_8
V_3_8_1
V_3_9
V_4_0
V_4_1
V_4_2
V_4_3
V_4_4
V_4_5
V_4_6
V_4_7
V_4_9
V_5_3
V_5_4
V_5_6
V_5_8
V_5_9
V_6_0
V_6_2
V_6_3
V_6_4
V_6_5
V_6_6
V_6_7
V_6_8
V_6_9
V_7_0
V_7_1
V_7_2
V_7_3
V_7_4
V_7_5
V_7_6
V_7_7
V_7_8
V_7_9
V_8_0
V_8_1
V_8_2
V_8_3
V_8_4
V_8_5
V_8_6
V_8_7
V_8_8
V_8_9
V_9_0
V_9_1
V_9_2
V_9_3
baserock/6.7-musl
baserock/morph
baserock/tiagogomes/armv8l64
master
anongit.mindrot.org: openssh.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
myproposal.h
Commit message (
Expand
)
Author
Age
Files
Lines
*
upstream: select post-quantum KEX
djm@openbsd.org
2022-03-31
1
-2
/
+2
*
upstream: add the sntrup761x25519-sha512@openssh.com hybrid
djm@openbsd.org
2021-11-10
1
-1
/
+2
*
upstream: After years of forewarning, disable the RSA/SHA-1
djm@openbsd.org
2021-08-30
1
-4
/
+2
*
upstream: prefer ed25519 signature algorithm variants to ECDSA; ok
djm@openbsd.org
2020-10-03
1
-7
/
+7
*
upstream: remove ssh-rsa (SHA1) from the list of allowed CA
djm@openbsd.org
2020-01-25
1
-3
/
+2
*
upstream: Remove unsupported algorithms from list of defaults at run
dtucker@openbsd.org
2020-01-23
1
-115
/
+23
*
upstream: remove diffie-hellman-group14-sha1 from default kex to
tedu@openbsd.org
2020-01-22
1
-3
/
+2
*
upstream: sort sk-* methods behind their plain key methods cousins
djm@openbsd.org
2019-12-20
1
-1
/
+1
*
upstream: allow security keys to act as host keys as well as user
djm@openbsd.org
2019-12-16
1
-29
/
+11
*
upstream: add security key types to list of keys allowed to act as
djm@openbsd.org
2019-12-11
1
-2
/
+4
*
remove all EC algs from proposals, no just sk ones
Damien Miller
2019-11-19
1
-6
/
+2
*
filter PUBKEY_DEFAULT_PK_ALG for ECC algorithms
Damien Miller
2019-11-18
1
-13
/
+19
*
upstream: enable ed25519 support; ok djm
markus@openbsd.org
2019-11-13
1
-1
/
+3
*
upstream: remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL path
djm@openbsd.org
2019-11-01
1
-5
/
+1
*
upstream: Separate myproposal.h userauth pubkey types
djm@openbsd.org
2019-11-01
1
-1
/
+24
*
Wrap OpenSSL bits in WITH_OPENSSL.
Darren Tucker
2019-10-28
1
-0
/
+2
*
Use the correct macro for SSH_ALLOWED_CA_SIGALGS.
Darren Tucker
2019-05-17
1
-1
/
+1
*
Conditionalize ECDH methods in CA algos.
Darren Tucker
2019-05-17
1
-3
/
+1
*
upstream: openssh-7.9 accidentally reused the server's algorithm lists
djm@openbsd.org
2019-02-24
1
-10
/
+5
*
upstream: add SSH_ALLOWED_CA_SIGALGS - the default list of
djm@openbsd.org
2018-09-12
1
-1
/
+13
*
upstream: Improve strictness and control over RSA-SHA2 signature
djm@openbsd.org
2018-07-03
1
-1
/
+3
*
upstream commit
djm@openbsd.org
2017-05-08
1
-3
/
+2
*
upstream commit
djm@openbsd.org
2016-09-29
1
-2
/
+2
*
upstream commit
djm@openbsd.org
2016-09-24
1
-2
/
+5
*
upstream commit
djm@openbsd.org
2016-09-12
1
-2
/
+2
*
upstream commit
djm@openbsd.org
2016-05-02
1
-4
/
+11
*
upstream commit
djm@openbsd.org
2016-02-09
1
-15
/
+4
*
upstream commit
markus@openbsd.org
2015-12-07
1
-2
/
+2
*
upstream commit
markus@openbsd.org
2015-12-07
1
-2
/
+4
*
upstream commit
markus@openbsd.org
2015-07-15
1
-4
/
+2
*
upstream commit
djm@openbsd.org
2015-07-15
1
-3
/
+2
*
upstream commit
djm@openbsd.org
2015-07-15
1
-3
/
+1
*
fix merge botch that left ",," in KEX algs
Damien Miller
2015-05-29
1
-2
/
+2
*
upstream commit
dtucker@openbsd.org
2015-05-28
1
-5
/
+8
*
upstream commit
jsg@openbsd.org
2015-04-29
1
-2
/
+2
*
upstream commit
djm@openbsd.org
2015-03-27
1
-7
/
+7
*
- (djm) [myproposal.h] Make curve25519 KEX dependent on
Damien Miller
2014-08-19
1
-1
/
+1
*
- tedu@cvs.openbsd.org 2014/07/11 13:54:34
Damien Miller
2014-07-17
1
-8
/
+8
*
- (dtucker) [myprosal.h] Don't include curve25519-sha256@libssh.org in
Darren Tucker
2014-06-11
1
-2
/
+7
*
- naddy@cvs.openbsd.org 2014/04/30 19:07:48
Damien Miller
2014-05-15
1
-1
/
+5
*
- markus@cvs.openbsd.org 2014/04/29 18:01:49
Damien Miller
2014-05-15
1
-1
/
+26
*
Three commits in one (since they touch the same heavily-diverged file
Damien Miller
2014-04-20
1
-27
/
+42
*
- markus@cvs.openbsd.org 2013/12/06 13:39:49
Damien Miller
2013-12-07
1
-1
/
+3
*
- djm@cvs.openbsd.org 2013/11/21 00:45:44
Damien Miller
2013-11-21
1
-1
/
+2
*
- (dtucker) [configure.ac kex.c key.c myproposal.h] Test for the presence of
Darren Tucker
2013-11-09
1
-0
/
+12
*
- (dtucker) [myproposal.h] Conditionally enable CURVE25519_SHA256.
Darren Tucker
2013-11-08
1
-1
/
+4
*
- markus@cvs.openbsd.org 2013/11/02 21:59:15
Damien Miller
2013-11-04
1
-1
/
+2
*
- (dtucker) [myproposal.h] Make the conditional algorithm support consistent
Darren Tucker
2013-06-11
1
-8
/
+9
*
- (dtucker) [myproposal.h] Do not advertise AES GSM ciphers if we don't have
Darren Tucker
2013-06-11
1
-1
/
+8
*
- (dtucker) Enable sha256 kex methods based on the presence of the necessary
Darren Tucker
2013-06-05
1
-1
/
+1
[next]