summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh-rsa.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* hold our collective noses and use the openssl-1.1.x API in OpenSSH;djm2018-09-131-14/+35
* Improve strictness and control over RSA-SHA2 signature types:djm2018-07-031-15/+45
* Ensure that D mod (P-1) and D mod (Q-1) are calculated in constant time.jsing2018-02-141-8/+10
* Convert some explicit_bzero()/free() calls to freezero().jsing2018-02-071-15/+6
* log mismatched RSA signature types; ok markus@djm2017-12-181-1/+4
* pass negotiated signing algorithm though to sshkey_verify() anddjm2017-12-181-6/+13
* remove post-SSHv1 removal dead code from rsa.c and merge thedjm2017-07-011-1/+36
* Refuse RSA keys <1024 bits in length. Improve reporting for keys thatdjm2017-05-071-4/+6
* handle certs in rsa_hash_alg_from_ident(), saving an unnecessarydjm2016-09-121-4/+4
* make argument == NULL tests more consistentdjm2016-04-211-2/+3
* Remove NULL-checks before sshbuf_free().mmcc2015-12-111-5/+3
* Remove NULL-checks before free().mmcc2015-12-101-3/+2
* stricter encoding type checks for ssh-rsa; ok djm@markus2015-12-071-6/+6
* implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)markus2015-12-041-23/+113
* openssh_RSA_verify return type is int, so don't make it size_t withindjm2015-09-091-3/+3
* return failure on RSA signature error; reported by Albert Sdjm2015-06-151-2/+2
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-127/+133
* convert memset of potentially-private data to explicit_bzero()djm2014-02-021-7/+7
* Introduce digest API and use it to perform all hashing operationsdjm2014-01-091-24/+30
* refuse RSA keys from old proprietary clients/servers that use thedjm2013-12-301-20/+3
* correct commentdjm2013-12-271-3/+3
* make the original RSA and DSA signing/verification code look more likedjm2013-12-271-18/+21
* bye, bye xfree(); ok markus@djm2013-05-171-12/+11
* Add buffer_get_cstring() and related functions that verify that thedjm2010-08-311-2/+2
* more timing paranoia - compare all parts of the expected decrypteddjm2010-07-161-4/+6
* s/timing_safe_cmp/timingsafe_bcmp/gdjm2010-07-131-3/+3
* implement a timing_safe_cmp() function to compare memory without leakingdjm2010-07-131-3/+4
* revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with thedjm2010-04-161-7/+5
* Add support for certificate key types for users and hosts.djm2010-02-261-3/+7
* almost entirely get rid of the culture of ".h files that include .h files"deraadt2006-08-031-3/+3
* move #include <string.h> out of includes.hstevesk2006-07-221-1/+3
* Put $OpenBSD$ tags back (as comments) to replace the RCSID()s thatdjm2006-03-251-0/+1
* change OpenSSH's xrealloc() function from being xrealloc(p, new_size) todjm2006-03-251-1/+1
* annoying spacing fixes getting in the way of real diffsderaadt2006-03-201-0/+1
* in a switch (), break after return or goto is stupidderaadt2006-03-201-1/+0
* RCSID() can diederaadt2006-03-191-1/+0
* make this -Wsign-compare clean; ok avsm@ markus@djm2005-06-171-2/+2
* constify. ok markus@ & djm@jakob2003-11-101-5/+5
* backout last change, since it violates pkcs#1markus2003-06-181-23/+14
* make sure the signature has at least the expected length (don'tmarkus2003-06-161-3/+3
* merge ssh-dss.h ssh-rsa.h into key.h; ok deraadt@markus2003-02-121-2/+1
* KNFderaadt2002-11-211-2/+2
* RSA_public_decrypt() returns -1 on error so len must be signed; ok markus@stevesk2002-08-271-2/+3
* replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parsermarkus2002-08-021-7/+93
* diff is u_int (2x); ok deraadt/provosmarkus2002-08-021-3/+3
* don't allocate, copy, and discard if there is not interested in the data; ok deraadt@markus2002-07-041-10/+8
* patch memory leaks; grendel@zeitbombe.orgderaadt2002-07-041-1/+3
* various KNF and %d for unsignedderaadt2002-06-231-13/+11
* display minimum RSA modulus in error(); ok markus@stevesk2002-06-101-3/+3
* pad received signature with leading zeros, because RSA_verify expectsmarkus2002-05-311-2/+17