summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/auth-rsa.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* remove ssh1 server code; ok djm@markus2016-08-131-342/+0
* update to new API (key_fingerprint => sshkey_fingerprint)djm2015-01-281-3/+4
* Add FingerprintHash option to control algorithm used for keydjm2014-12-211-2/+3
* Add support for Unix domain socket forwarding. A remote TCP portmillert2014-07-151-2/+2
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-2/+3
* replace openssl MD5 with our ssh_digest_*; ok djm@markus2014-01-271-9/+13
* fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@djm2013-07-121-4/+3
* for hostbased authentication, print the client host and user ondjm2013-06-211-2/+2
* Standardise logging of supplemental information during userauth. Keysdjm2013-05-191-8/+8
* bye, bye xfree(); ok markus@djm2013-05-171-3/+3
* new sshd_config option AuthorizedKeysCommand to support fetchingdjm2012-10-301-1/+3
* allow AuthorizedKeysFile to specify multiple files, separated by spaces.djm2011-05-231-31/+39
* move check for revoked keys to run earlier (in auth_rsa_key_allowed)djm2010-12-031-4/+5
* s/timing_safe_cmp/timingsafe_bcmp/gdjm2010-07-131-2/+2
* implement a timing_safe_cmp() function to compare memory without leakingdjm2010-07-131-2/+2
* don't accept certificates marked as "cert-authority" here; ok markus@djm2010-05-111-2/+3
* revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with thedjm2010-04-161-2/+2
* Add a TrustedUserCAKeys option to sshd_config to specify CA keys thatdjm2010-03-041-1/+4
* Merge duplicate host key file checks, based in part on a patch from Robdtucker2008-07-021-21/+2
* add missing checks for openssl return codes; with & ok djm@markus2006-11-061-4/+6
* almost entirely get rid of the culture of ".h files that include .h files"deraadt2006-08-031-5/+8
* move #include <stdio.h> out of includes.hstevesk2006-08-011-1/+2
* move #include <string.h> out of includes.hstevesk2006-07-221-1/+2
* move #include <pwd.h> out of includes.h; ok markus@stevesk2006-07-061-1/+3
* needed casts (always will be needed)deraadt2006-03-251-2/+2
* Put $OpenBSD$ tags back (as comments) to replace the RCSID()s thatdjm2006-03-251-0/+1
* RCSID() can diederaadt2006-03-191-1/+0
* move #include <sys/stat.h> out of includes.h; ok markus@stevesk2006-02-201-1/+4
* make this -Wsign-compare clean; ok avsm@ markus@djm2005-06-171-2/+4
* Fix debug call in error path of authorized_keys processing and fix relateddtucker2004-12-111-1/+2
* Discard over-length authorized_keys entries rather than complaining whendtucker2004-12-061-6/+4
* make ssh -Wshadow clean, no functional changesavsm2004-06-211-5/+5
* kill some more tiny files; ok deraadt@djm2004-05-091-2/+1
* standardise arguments to auth methods - they should all take authctxt.djm2003-11-041-3/+4
* rename log() into logit() to avoid name conflict. markus ok, from netbsditojun2003-04-081-3/+3
* display minimum RSA modulus in error(); ok markus@stevesk2002-06-101-3/+3
* make RSA modulus minimum #define; ok markus@stevesk2002-03-291-2/+3
* disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)markus2002-03-261-1/+8
* return 0 (not NULL); tomh@po.crl.go.jpmarkus2002-03-251-4/+4
* integrate privilege separated openssh; its turned off by default for now.provos2002-03-181-8/+9
* split auth_rsa() for better readability and privsep; ok provos@markus2002-03-141-85/+117
* packet_read* no longer return the packet length, since it's not used.markus2001-12-281-3/+3
* s/packet_done/packet_check_eom/ (end-of-message); ok djm@markus2001-12-281-2/+2
* get rid of packet_integrity_check, use packet_done() instead.markus2001-12-271-2/+2
* call fatal() for openssl allocation failuresmarkus2001-12-271-4/+7
* log fingerprint on successful public key authentication, simplify usage of key structs; ok markus@jakob2001-12-181-11/+17
* fix protocol error: send 'failed' message instead of a 2nd challengemarkus2001-11-291-2/+6
* use %lu; ok markus@stevesk2001-07-231-2/+2
* terminate secure_filename checking after checking homedir. that way itprovos2001-06-251-2/+2
* merge authorized_keys2 into authorized_keys.markus2001-06-221-4/+2