c-
nao encontrei uma lista precisa dos algoritmos em IPSec, TLS e SSH. E isso sempre muda com o tempo. o mais proximo que encontrei foi:
TLS:
ECDHE is the key exchange algorithm (Elliptic curve Diffie–Hellman)
ECDSA is the authentication algorithm (Elliptic Curve Digital Signature Algorithm)
AES_128_GCM is the data encryption algorithm (Advanced Encryption Standard 128 bit Galois/Counter Mode)
SHA256 is the Message Authentication Code (MAC) algorithm (Secure Hash Algorithm 256 bit)
___________________
IPSec:
Symmetric encryption algorithms
HMAC-SHA1/SHA2 for integrity protection and authenticity.
TripleDES-CBC for confidentiality
AES-CBC and AES-CTR for confidentiality.
AES-GCM and ChaCha20-Poly1305 providing confidentiality and authentication together efficiently.
Key exchange algorithms
Diffie–Hellman (RFC 3526)
ECDH (RFC 4753)
Authentication algorithms
RSA
ECDSA (RFC 4754)
PSK (RFC 6617)
____________________
SSH:
EdDSA, ECDSA, RSA and DSA for public-key cryptography.
ECDH and Diffie–Hellman for key exchange.
HMAC, AEAD and UMAC for MAC.
AES (and deprecated RC4, 3DES, DES) for symmetric encryption.
AES-GCM and ChaCha20-Poly1305 for AEAD encryption.
SHA (and deprecated MD5) for key fingerprint.
____________________
Nao encontrei informação de SHA-1 em mercurial:
https://www.mercurial-scm.org/wiki/FAQ/TechnicalDetails
____________________
Já Git confirma uso do SHA-1:
https://www.designveloper.com/blog/hash-values-sha-1-in-git/
GIT strongly relies on SHA-1 for the identification and integrity checking of all file objects and commits. It is essentially possible to create two GIT repositories with the same head commit hash and different contents, say a benign source code and a backdoored one.