scmno****@osdn*****
scmno****@osdn*****
2017年 11月 28日 (火) 10:18:22 JST
Revision: 6988 http://sourceforge.jp/projects/ttssh2/scm/svn/commits/6988 Author: doda Date: 2017-11-28 10:18:22 +0900 (Tue, 28 Nov 2017) Log Message: ----------- SSH2 暗号方式を小文字に統一 Modified Paths: -------------- trunk/doc/en/html/about/history.html trunk/doc/ja/html/about/history.html trunk/ttssh2/ttxssh/crypt.c trunk/ttssh2/ttxssh/ttxssh.c -------------- next part -------------- Modified: trunk/doc/en/html/about/history.html =================================================================== --- trunk/doc/en/html/about/history.html 2017-11-26 13:43:25 UTC (rev 6987) +++ trunk/doc/en/html/about/history.html 2017-11-28 01:18:22 UTC (rev 6988) @@ -2964,8 +2964,8 @@ <ul> <li>added support for SSH2 symmetric key cipher algorithms: <ul> - <li>AES12****@opens*****</li> - <li>AES25****@opens*****</li> + <li>aes12****@opens*****</li> + <li>aes25****@opens*****</li> </ul></li> <li>added support for SSH2 MAC algorithms:</li> <ul> Modified: trunk/doc/ja/html/about/history.html =================================================================== --- trunk/doc/ja/html/about/history.html 2017-11-26 13:43:25 UTC (rev 6987) +++ trunk/doc/ja/html/about/history.html 2017-11-28 01:18:22 UTC (rev 6988) @@ -2970,8 +2970,8 @@ <ul> <li>SSH2 \x82̋\xA4\x92ʌ\xAE\x88Í\x86\x95\xFB\x8E\xAE\x82Ƃ\xB5\x82Ĉȉ\xBA\x82\xF0\x83T\x83|\x81[\x83g\x82\xB5\x82\xBD\x81B <ul> - <li>AES12****@opens*****</li> - <li>AES25****@opens*****</li> + <li>aes12****@opens*****</li> + <li>aes25****@opens*****</li> </ul></li> <li>SSH2 \x82\xCC MAC \x83A\x83\x8B\x83S\x83\x8A\x83Y\x83\x80\x82Ƃ\xB5\x82Ĉȉ\xBA\x82\xF0\x83T\x83|\x81[\x83g\x82\xB5\x82\xBD\x81B <ul> Modified: trunk/ttssh2/ttxssh/crypt.c =================================================================== --- trunk/ttssh2/ttxssh/crypt.c 2017-11-26 13:43:25 UTC (rev 6987) +++ trunk/ttssh2/ttxssh/crypt.c 2017-11-28 01:18:22 UTC (rev 6988) @@ -1195,51 +1195,51 @@ // SSH2 case SSH2_CIPHER_3DES_CBC: - return "3DES-CBC"; + return "3des-cbc"; case SSH2_CIPHER_AES128_CBC: - return "AES128-CBC"; + return "aes128-cbc"; case SSH2_CIPHER_AES192_CBC: - return "AES192-CBC"; + return "aes192-cbc"; case SSH2_CIPHER_AES256_CBC: - return "AES256-CBC"; + return "aes256-cbc"; case SSH2_CIPHER_BLOWFISH_CBC: - return "Blowfish-CBC"; + return "blowfish-cbc"; case SSH2_CIPHER_AES128_CTR: - return "AES128-CTR"; + return "aes128-ctr"; case SSH2_CIPHER_AES192_CTR: - return "AES192-CTR"; + return "aes192-ctr"; case SSH2_CIPHER_AES256_CTR: - return "AES256-CTR"; + return "aes256-ctr"; case SSH2_CIPHER_ARCFOUR: - return "Arcfour"; + return "arcfour"; case SSH2_CIPHER_ARCFOUR128: - return "Arcfour128"; + return "arcfour128"; case SSH2_CIPHER_ARCFOUR256: - return "Arcfour256"; + return "arcfour256"; case SSH2_CIPHER_CAST128_CBC: - return "CAST-128-CBC"; + return "cast-128-cbc"; case SSH2_CIPHER_3DES_CTR: - return "3DES-CTR"; + return "3des-ctr"; case SSH2_CIPHER_BLOWFISH_CTR: - return "Blowfish-CTR"; + return "blowfish-ctr"; case SSH2_CIPHER_CAST128_CTR: - return "CAST-128-CTR"; + return "cast-128-ctr"; case SSH2_CIPHER_CAMELLIA128_CBC: - return "Camellia128-CBC"; + return "camellia128-cbc"; case SSH2_CIPHER_CAMELLIA192_CBC: - return "Camellia192-CBC"; + return "camellia192-cbc"; case SSH2_CIPHER_CAMELLIA256_CBC: - return "Camellia256-CBC"; + return "camellia256-cbc"; case SSH2_CIPHER_CAMELLIA128_CTR: - return "Camellia128-CTR"; + return "camellia128-ctr"; case SSH2_CIPHER_CAMELLIA192_CTR: - return "Camellia192-CTR"; + return "camellia192-ctr"; case SSH2_CIPHER_CAMELLIA256_CTR: - return "Camellia256-CTR"; + return "camellia256-ctr"; case SSH2_CIPHER_AES128_GCM: - return "AES12****@opens*****"; + return "aes12****@opens*****"; case SSH2_CIPHER_AES256_GCM: - return "AES25****@opens*****"; + return "aes25****@opens*****"; default: return "Unknown"; Modified: trunk/ttssh2/ttxssh/ttxssh.c =================================================================== --- trunk/ttssh2/ttxssh/ttxssh.c 2017-11-26 13:43:25 UTC (rev 6987) +++ trunk/ttssh2/ttxssh/ttxssh.c 2017-11-28 01:18:22 UTC (rev 6988) @@ -2564,51 +2564,51 @@ // for SSH2(yutaka) case SSH2_CIPHER_AES128_CBC: - return "AES128-CBC(SSH2)"; + return "aes128-cbc(SSH2)"; case SSH2_CIPHER_AES192_CBC: - return "AES192-CBC(SSH2)"; + return "aes192-cbc(SSH2)"; case SSH2_CIPHER_AES256_CBC: - return "AES256-CBC(SSH2)"; + return "aes256-cbc(SSH2)"; case SSH2_CIPHER_3DES_CBC: - return "3DES-CBC(SSH2)"; + return "3des-cbc(SSH2)"; case SSH2_CIPHER_BLOWFISH_CBC: - return "Blowfish-CBC(SSH2)"; + return "blowfish-cbc(SSH2)"; case SSH2_CIPHER_AES128_CTR: - return "AES128-CTR(SSH2)"; + return "aes128-ctr(SSH2)"; case SSH2_CIPHER_AES192_CTR: - return "AES192-CTR(SSH2)"; + return "aes192-ctr(SSH2)"; case SSH2_CIPHER_AES256_CTR: - return "AES256-CTR(SSH2)"; + return "aes256-ctr(SSH2)"; case SSH2_CIPHER_ARCFOUR: - return "Arcfour(SSH2)"; + return "arcfour(SSH2)"; case SSH2_CIPHER_ARCFOUR128: - return "Arcfour128(SSH2)"; + return "arcfour128(SSH2)"; case SSH2_CIPHER_ARCFOUR256: - return "Arcfour256(SSH2)"; + return "arcfour256(SSH2)"; case SSH2_CIPHER_CAST128_CBC: - return "CAST128-CBC(SSH2)"; + return "cast128-cbc(SSH2)"; case SSH2_CIPHER_3DES_CTR: - return "3DES-CTR(SSH2)"; + return "3des-ctr(SSH2)"; case SSH2_CIPHER_BLOWFISH_CTR: - return "Blowfish-CTR(SSH2)"; + return "blowfish-ctr(SSH2)"; case SSH2_CIPHER_CAST128_CTR: - return "CAST128-CTR(SSH2)"; + return "cast128-ctr(SSH2)"; case SSH2_CIPHER_CAMELLIA128_CBC: - return "Camellia128-CBC(SSH2)"; + return "camellia128-cbc(SSH2)"; case SSH2_CIPHER_CAMELLIA192_CBC: - return "Camellia192-CBC(SSH2)"; + return "camellia192-cbc(SSH2)"; case SSH2_CIPHER_CAMELLIA256_CBC: - return "Camellia256-CBC(SSH2)"; + return "camellia256-cbc(SSH2)"; case SSH2_CIPHER_CAMELLIA128_CTR: - return "Camellia128-CTR(SSH2)"; + return "camellia128-ctr(SSH2)"; case SSH2_CIPHER_CAMELLIA192_CTR: - return "Camellia192-CTR(SSH2)"; + return "camellia192-ctr(SSH2)"; case SSH2_CIPHER_CAMELLIA256_CTR: - return "Camellia256-CTR(SSH2)"; + return "camellia256-ctr(SSH2)"; case SSH2_CIPHER_AES128_GCM: - return "AES12****@opens*****(SSH2)"; + return "aes12****@opens*****(SSH2)"; case SSH2_CIPHER_AES256_GCM: - return "AES25****@opens*****(SSH2)"; + return "aes25****@opens*****(SSH2)"; default: return NULL;