Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prefer AES-256 to AES-128.
Motivation:

The industry has been moving towards preferring larger key sizes in AES.
We should reflect that.

Modifications:

- Prefer AES-256 to AES-128.

Result:

More connections with larger key sizes.
  • Loading branch information
Lukasa committed May 29, 2020
commit 51a3dfe89edd95fa80e12a68ed4a615c730aa27a
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@ struct SSHConnectionStateMachine {
private var state: State

private static let defaultTransportProtectionSchemes: [NIOSSHTransportProtection.Type] = [
AES128GCMOpenSSHTransportProtection.self, AES256GCMOpenSSHTransportProtection.self,
AES256GCMOpenSSHTransportProtection.self, AES128GCMOpenSSHTransportProtection.self,
]

init(role: SSHConnectionRole, protectionSchemes: [NIOSSHTransportProtection.Type] = Self.defaultTransportProtectionSchemes) {
Expand Down