Blob Blame History Raw
--- lib/Net/SSH/Perl/Constants.pm
+++ lib/Net/SSH/Perl/Constants.pm
@@ -131,7 +131,7 @@ use vars qw( %CONSTANTS );
     'KEX_DH_GEX_SHA1' => 'diffie-hellman-group-exchange-sha1',
     'KEX_CURVE25519_SHA256' => 'curve25519-sha256@libssh.org',
     'KEX_CURVE25519_SHA256_ALIAS' => 'curve25519-sha256',
-    'KEX_DEFAULT_KEX' => 'curve25519-sha256@libssh.org,curve25519-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1',
+    'KEX_DEFAULT_KEX' => 'diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1',
     'KEX_ALL_KEX' => 'diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,curve25519-sha256@libssh.org,curve25519-sha256',
     'KEX_DEFAULT_PK_ALG' => 'ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,ssh-rsa',
     'KEX_ALL_PK_ALG' => 'ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256,ssh-rsa,ssh-dss',
--- lib/Net/SSH/Perl/Kex.pm
+++ lib/Net/SSH/Perl/Kex.pm
@@ -220,9 +220,6 @@ sub choose_kex {
     croak "No kex algorithm" unless $name;
     $kex->{algorithm} = $name;
     my %kexmap = (
-        &KEX_CURVE25519_SHA256 => 'C25519',
-        &KEX_CURVE25519_SHA256_ALIAS
-                               => 'C25519',
         &KEX_DH_GEX_SHA256     => 'DHGEXSHA256',
         &KEX_DH_GEX_SHA1       => 'DHGEXSHA1',
         &KEX_DH14_SHA1         => 'DH14SHA1',
--- lib/Net/SSH/Perl/Key.pm
+++ lib/Net/SSH/Perl/Key.pm
@@ -26,9 +26,6 @@ use vars qw( %KEY_TYPES );
     'ssh-dss' => 'DSA',
     'ssh-rsa' => 'RSA',
     'ssh-ed25519' => 'Ed25519',
-    'ecdsa-sha2-nistp256' => 'ECDSA256',
-    'ecdsa-sha2-nistp384' => 'ECDSA384',
-    'ecdsa-sha2-nistp521' => 'ECDSA521',
 );
 
 sub new_from_blob {
@@ -95,7 +92,6 @@ use vars qw( %OBJ_MAP );
     'SSH2 ENCRYPTED PRIVATE KEY' => [ 'DSA', [ 'SSH2' ] ],
     'RSA PRIVATE KEY'  => [ 'RSA' ],
     'OPENSSH PRIVATE KEY'  => [ 'Ed25519' ],
-    'EC PRIVATE KEY' => [ 'ECDSA' ],
 );
 
 sub read_private_pem {
@@ -167,8 +163,8 @@ Net::SSH::Perl::Key - Public or private
 =head1 DESCRIPTION
 
 I<Net::SSH::Perl::Key> implements an abstract base class interface
-to key objects (either DSA, RSA, ECDSA, or Ed25519 keys, currently).
-The underlying implementation for RSA, DSA, an ECDSA keys is the
+to key objects (either DSA, RSA, or Ed25519 keys, currently).
+The underlying implementation for RSA, and DSA keys is the
 CryptX module.  The Ed25519 implementation uses bundled XS and C code
 from the SUPERCOP ref10 implementation.
 
@@ -178,8 +174,7 @@ from the SUPERCOP ref10 implementation.
 
 Creates a new object of type I<Net::SSH::Perl::Key::$key_type>,
 after loading the class implementing I<$key_type>.
-should be C<DSA>, C<RSA1>, C<RSA>, C<ECDSA256>, C<ECDSA384>, C<ECDSA521>,
-or C<Ed25519>.  
+should be C<DSA>, C<RSA1>, C<RSA>, or C<Ed25519>.  
 
 I<$blob>, if present, should be a string representation of the key,
 from which the key object can be initialized. In fact, it should
@@ -209,11 +204,11 @@ passphrase, this might be a good time to
 actual passphrase. :)
 
 Returns the new key object, which is blessed into the subclass
-denoted by I<$key_type> (C<DSA>, C<RSA1>, C<ECDSA> or C<Ed25519>).
+denoted by I<$key_type> (C<DSA>, C<RSA1> or C<Ed25519>).
 
 =head2 Net::SSH::Perl::Key->keygen($key_type, $bits)
 
-$key_type is one of RSA, DSA, or ECDSA256/ECDSA384/ECDSA521.
+$key_type is one of RSA or DSA.
 Generates a new key and returns that key. The key returned is the 
 private key, which (presumably) contains all of the public key
 data, as well. I<$bits> is the number of bits in the key.
--- lib/Net/SSH/Perl.pm
+++ lib/Net/SSH/Perl.pm
@@ -492,7 +492,7 @@ of the SSH protocol, and makes use of ex
 the Crypt:: family of modules) to handle encryption of all data sent
 across the insecure network. It can also read your existing SSH
 configuration files (F</etc/ssh_config>, etc.), RSA identity files,
-ECDSA identity files, Ed25519 identity files, known hosts files, etc.
+Ed25519 identity files, known hosts files, etc.
 
 One advantage to using I<Net::SSH::Perl> over wrapper-style
 implementations of ssh clients is that it saves on process
--- MANIFEST
+++ MANIFEST
@@ -46,7 +46,6 @@ lib/Net/SSH/Perl/Constants.pm
 lib/Net/SSH/Perl/Handle/SSH1.pm
 lib/Net/SSH/Perl/Handle/SSH2.pm
 lib/Net/SSH/Perl/Handle.pm
-lib/Net/SSH/Perl/Kex/C25519.pm
 lib/Net/SSH/Perl/Kex/DH.pm
 lib/Net/SSH/Perl/Kex/DH1.pm
 lib/Net/SSH/Perl/Kex/DH14SHA1.pm
@@ -58,10 +57,6 @@ lib/Net/SSH/Perl/Kex/DHGEXSHA1.pm
 lib/Net/SSH/Perl/Kex/DHGEXSHA256.pm
 lib/Net/SSH/Perl/Kex.pm
 lib/Net/SSH/Perl/Key/DSA.pm
-lib/Net/SSH/Perl/Key/ECDSA.pm
-lib/Net/SSH/Perl/Key/ECDSA256.pm
-lib/Net/SSH/Perl/Key/ECDSA384.pm
-lib/Net/SSH/Perl/Key/ECDSA521.pm
 lib/Net/SSH/Perl/Key/Ed25519.pm
 lib/Net/SSH/Perl/Key/Ed25519.xs
 lib/Net/SSH/Perl/Key/RSA.pm