summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh-add.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* add support for RSA to SSH2. please test.markus2000-11-121-18/+10
| | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-2/+27
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* enable ssh-add -d for DSA keysmarkus2000-09-051-3/+7
|
* print uid/gid as unsignedderaadt2000-08-281-2/+3
|
* add SSH2/DSA support to the agent and some other DSA related cleanups.markus2000-08-191-39/+42
| | | | (note that we cannot talk to ssh.com's ssh2 agents)
* make ssh-add accept dsa keys (the agent does not)markus2000-07-161-6/+12
|
* OpenBSD tagmarkus2000-06-201-1/+1
|
* add DSA pubkey auth and other SSH2 fixes. use ssh-keygen -[xX]markus2000-04-261-16/+21
| | | | | for trading keys with the real and the original SSH, directly from the people who invented the SSH protocol.
* document $SSH_ASKPASS, reasonable defaultmarkus1999-12-021-3/+7
|
* SSH_ASKPASS supportmarkus1999-11-241-6/+56
|
* much more KNFderaadt1999-11-241-14/+7
|
* KNF part 1markus1999-11-231-167/+156
|
* rsa key fingerprints, idea from Bjoern Groenvall <bg@sics.se>markus1999-11-161-18/+24
|
* the keysize of rsa-parameter 'n' is passed implizit,markus1999-11-151-19/+18
| | | | a few more checks and warnings about 'pretended' keysizes.
* change passphrase loop logic and remove ref to $DISPLAY, ok nielsmarkus1999-11-141-35/+25
|
* replace assert() with error, fatal or packet_disconnectmarkus1999-11-021-7/+13
|
* connect to agent before accepting input. ok niklas@markus1999-10-271-62/+26
|
* -Wall, get rid of unused headers/varsdugsong1999-10-171-4/+1
|
* we do not ship ssh-askpassmarkus1999-10-111-14/+1
|
* numerous sprintf, strncpy, strcpy cleanupsderaadt1999-09-291-3/+4
|
* test for RSA in the ssl library, real early onderaadt1999-09-291-1/+11
|
* convert all uses of gmp to SSL bignumprovos1999-09-281-31/+43
| | | | | | convert all used of rsa to SSL rsa functions remove all use of randomstate to OpenBSD arc4random() and arc4_stir() all this done at a long long night in Canada.
* i bet a lot of people didn't know what ssh 1.2.16 had a nice license.deraadt1999-09-261-0/+247
well, except for the patent issues. someone in sweden (forget their name at the moment) cleaned out most of the patented code, and now this code removes rsa code. when this is done, it will link against libssl, but the work isn't completely done yet. then we need to bring this up to modern days, featurewise.