kex: Make order of preferred signature algorithms consistent
The default order of preference for signature algorithms were not consistent. This makes the following order of preference to be the default order: * ssh-ed25519 * ecdsa-sha2-nistp521 * ecdsa-sha2-nistp384 * ecdsa-sha2-nistp256 * rsa-sha2-512 * rsa-sha2-256 * ssh-rsa * ssh-dss Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> Reviewed-by: Jakub Jelen <jjelen@redhat.com>
Этот коммит содержится в:
родитель
a8064cb0ca
Коммит
2db2a4e170
@ -107,12 +107,12 @@
|
||||
|
||||
#ifdef HAVE_ECDH
|
||||
#define ECDH "ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,"
|
||||
#define PUBLIC_KEY_ALGORITHMS "ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-rsa,rsa-sha2-512,rsa-sha2-256,ssh-dss"
|
||||
#define PUBLIC_KEY_ALGORITHMS "ssh-ed25519,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss"
|
||||
#else
|
||||
#ifdef HAVE_DSA
|
||||
#define PUBLIC_KEY_ALGORITHMS "ssh-ed25519,ssh-rsa,rsa-sha2-512,rsa-sha2-256,ssh-dss"
|
||||
#define PUBLIC_KEY_ALGORITHMS "ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-dss"
|
||||
#else
|
||||
#define PUBLIC_KEY_ALGORITHMS "ssh-ed25519,ssh-rsa,rsa-sha2-512,rsa-sha2-256"
|
||||
#define PUBLIC_KEY_ALGORITHMS "ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa"
|
||||
#endif
|
||||
#define ECDH ""
|
||||
#endif
|
||||
|
Загрузка…
x
Ссылка в новой задаче
Block a user