Show sign-only key algorithms by default

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



By default "ssh -Q key" doesn't show more secure rsa-sha2-512 and
rsa-sha2-256 key algorithms. This PR shows them unless the user
specifies that they only want key algorithms that support encryption.

ssh.c:
744c744
< cp = sshkey_alg_list(0, 0, 0, '\n');
---
> cp = sshkey_alg_list(0, 0, 1, '\n');
746c746
< cp = sshkey_alg_list(1, 0, 0, '\n');
---
> cp = sshkey_alg_list(1, 0, 1, '\n');
748c748,750
< cp = sshkey_alg_list(0, 1, 0, '\n');
---
> cp = sshkey_alg_list(0, 1, 1, '\n');
> else if (strcmp(optarg, "key-encrypt") == 0)
> cp = sshkey_alg_list(0, 0, 0, '\n');

Please set email of commit to koops1997+github@xxxxxxxxx and name to
Yegor Ievlev, so commit will be attributed to me on GitHub.
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux