| Commit message (Expand) | Author | Age | Files | Lines |
* | hold our collective noses and use the openssl-1.1.x API in OpenSSH; |  djm | 2018-09-13 | 1 | -14/+35 |
* | Improve strictness and control over RSA-SHA2 signature types: |  djm | 2018-07-03 | 1 | -15/+45 |
* | Ensure that D mod (P-1) and D mod (Q-1) are calculated in constant time. |  jsing | 2018-02-14 | 1 | -8/+10 |
* | Convert some explicit_bzero()/free() calls to freezero(). |  jsing | 2018-02-07 | 1 | -15/+6 |
* | log mismatched RSA signature types; ok markus@ |  djm | 2017-12-18 | 1 | -1/+4 |
* | pass negotiated signing algorithm though to sshkey_verify() and |  djm | 2017-12-18 | 1 | -6/+13 |
* | remove post-SSHv1 removal dead code from rsa.c and merge the |  djm | 2017-07-01 | 1 | -1/+36 |
* | Refuse RSA keys <1024 bits in length. Improve reporting for keys that |  djm | 2017-05-07 | 1 | -4/+6 |
* | handle certs in rsa_hash_alg_from_ident(), saving an unnecessary |  djm | 2016-09-12 | 1 | -4/+4 |
* | make argument == NULL tests more consistent |  djm | 2016-04-21 | 1 | -2/+3 |
* | Remove NULL-checks before sshbuf_free(). |  mmcc | 2015-12-11 | 1 | -5/+3 |
* | Remove NULL-checks before free(). |  mmcc | 2015-12-10 | 1 | -3/+2 |
* | stricter encoding type checks for ssh-rsa; ok djm@ |  markus | 2015-12-07 | 1 | -6/+6 |
* | implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth) |  markus | 2015-12-04 | 1 | -23/+113 |
* | openssh_RSA_verify return type is int, so don't make it size_t within |  djm | 2015-09-09 | 1 | -3/+3 |
* | return failure on RSA signature error; reported by Albert S |  djm | 2015-06-15 | 1 | -2/+2 |
* | New key API: refactor key-related functions to be more library-like, |  djm | 2014-06-24 | 1 | -127/+133 |
* | convert memset of potentially-private data to explicit_bzero() |  djm | 2014-02-02 | 1 | -7/+7 |
* | Introduce digest API and use it to perform all hashing operations |  djm | 2014-01-09 | 1 | -24/+30 |
* | refuse RSA keys from old proprietary clients/servers that use the |  djm | 2013-12-30 | 1 | -20/+3 |
* | correct comment |  djm | 2013-12-27 | 1 | -3/+3 |
* | make the original RSA and DSA signing/verification code look more like |  djm | 2013-12-27 | 1 | -18/+21 |
* | bye, bye xfree(); ok markus@ |  djm | 2013-05-17 | 1 | -12/+11 |
* | Add buffer_get_cstring() and related functions that verify that the |  djm | 2010-08-31 | 1 | -2/+2 |
* | more timing paranoia - compare all parts of the expected decrypted |  djm | 2010-07-16 | 1 | -4/+6 |
* | s/timing_safe_cmp/timingsafe_bcmp/g |  djm | 2010-07-13 | 1 | -3/+3 |
* | implement a timing_safe_cmp() function to compare memory without leaking |  djm | 2010-07-13 | 1 | -3/+4 |
* | revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with the |  djm | 2010-04-16 | 1 | -7/+5 |
* | Add support for certificate key types for users and hosts. |  djm | 2010-02-26 | 1 | -3/+7 |
* | almost entirely get rid of the culture of ".h files that include .h files" |  deraadt | 2006-08-03 | 1 | -3/+3 |
* | move #include <string.h> out of includes.h |  stevesk | 2006-07-22 | 1 | -1/+3 |
* | Put $OpenBSD$ tags back (as comments) to replace the RCSID()s that |  djm | 2006-03-25 | 1 | -0/+1 |
* | change OpenSSH's xrealloc() function from being xrealloc(p, new_size) to |  djm | 2006-03-25 | 1 | -1/+1 |
* | annoying spacing fixes getting in the way of real diffs |  deraadt | 2006-03-20 | 1 | -0/+1 |
* | in a switch (), break after return or goto is stupid |  deraadt | 2006-03-20 | 1 | -1/+0 |
* | RCSID() can die |  deraadt | 2006-03-19 | 1 | -1/+0 |
* | make this -Wsign-compare clean; ok avsm@ markus@ |  djm | 2005-06-17 | 1 | -2/+2 |
* | constify. ok markus@ & djm@ |  jakob | 2003-11-10 | 1 | -5/+5 |
* | backout last change, since it violates pkcs#1 |  markus | 2003-06-18 | 1 | -23/+14 |
* | make sure the signature has at least the expected length (don't |  markus | 2003-06-16 | 1 | -3/+3 |
* | merge ssh-dss.h ssh-rsa.h into key.h; ok deraadt@ |  markus | 2003-02-12 | 1 | -2/+1 |
* | KNF |  deraadt | 2002-11-21 | 1 | -2/+2 |
* | RSA_public_decrypt() returns -1 on error so len must be signed; ok markus@ |  stevesk | 2002-08-27 | 1 | -2/+3 |
* | replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser |  markus | 2002-08-02 | 1 | -7/+93 |
* | diff is u_int (2x); ok deraadt/provos |  markus | 2002-08-02 | 1 | -3/+3 |
* | don't allocate, copy, and discard if there is not interested in the data; ok deraadt@ |  markus | 2002-07-04 | 1 | -10/+8 |
* | patch memory leaks; grendel@zeitbombe.org |  deraadt | 2002-07-04 | 1 | -1/+3 |
* | various KNF and %d for unsigned |  deraadt | 2002-06-23 | 1 | -13/+11 |
* | display minimum RSA modulus in error(); ok markus@ |  stevesk | 2002-06-10 | 1 | -3/+3 |
* | pad received signature with leading zeros, because RSA_verify expects |  markus | 2002-05-31 | 1 | -2/+17 |