summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/rsa.h
diff options
context:
space:
mode:
authormarkus <markus@openbsd.org>2000-11-12 19:50:37 +0000
committermarkus <markus@openbsd.org>2000-11-12 19:50:37 +0000
commit34713819b5dc9d8159a1bb9c8a84be3b251d101b (patch)
tree622ede4c7997c9ffa8a38ae41ae74bd17e74be64 /usr.bin/ssh/rsa.h
parentFix XFree86/console mouse transparency for serial mice. Tested with both a (diff)
downloadwireguard-openbsd-34713819b5dc9d8159a1bb9c8a84be3b251d101b.tar.xz
wireguard-openbsd-34713819b5dc9d8159a1bb9c8a84be3b251d101b.zip
add support for RSA to SSH2. please test.
there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
Diffstat (limited to 'usr.bin/ssh/rsa.h')
-rw-r--r--usr.bin/ssh/rsa.h13
1 files changed, 1 insertions, 12 deletions
diff --git a/usr.bin/ssh/rsa.h b/usr.bin/ssh/rsa.h
index 93a2dac85cc..57d72cc7892 100644
--- a/usr.bin/ssh/rsa.h
+++ b/usr.bin/ssh/rsa.h
@@ -11,7 +11,7 @@
* called by a name other than "ssh" or "Secure Shell".
*/
-/* RCSID("$OpenBSD: rsa.h,v 1.8 2000/09/07 20:27:53 deraadt Exp $"); */
+/* RCSID("$OpenBSD: rsa.h,v 1.9 2000/11/12 19:50:38 markus Exp $"); */
#ifndef RSA_H
#define RSA_H
@@ -19,17 +19,6 @@
#include <openssl/bn.h>
#include <openssl/rsa.h>
-/* Calls SSL RSA_generate_key, only copies to prv and pub */
-void rsa_generate_key(RSA * prv, RSA * pub, unsigned int bits);
-
-/*
- * Indicates whether the rsa module is permitted to show messages on the
- * terminal.
- */
-void rsa_set_verbose __P((int verbose));
-
-int rsa_alive __P((void));
-
void rsa_public_encrypt __P((BIGNUM * out, BIGNUM * in, RSA * prv));
void rsa_private_decrypt __P((BIGNUM * out, BIGNUM * in, RSA * prv));