summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh-rsa.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* openssh_RSA_verify return type is int, so don't make it size_t withindjm2015-09-091-3/+3
* return failure on RSA signature error; reported by Albert Sdjm2015-06-151-2/+2
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-127/+133
* convert memset of potentially-private data to explicit_bzero()djm2014-02-021-7/+7
* Introduce digest API and use it to perform all hashing operationsdjm2014-01-091-24/+30
* refuse RSA keys from old proprietary clients/servers that use thedjm2013-12-301-20/+3
* correct commentdjm2013-12-271-3/+3
* make the original RSA and DSA signing/verification code look more likedjm2013-12-271-18/+21
* bye, bye xfree(); ok markus@djm2013-05-171-12/+11
* Add buffer_get_cstring() and related functions that verify that thedjm2010-08-311-2/+2
* more timing paranoia - compare all parts of the expected decrypteddjm2010-07-161-4/+6
* s/timing_safe_cmp/timingsafe_bcmp/gdjm2010-07-131-3/+3
* implement a timing_safe_cmp() function to compare memory without leakingdjm2010-07-131-3/+4
* revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with thedjm2010-04-161-7/+5
* Add support for certificate key types for users and hosts.djm2010-02-261-3/+7
* almost entirely get rid of the culture of ".h files that include .h files"deraadt2006-08-031-3/+3
* move #include <string.h> out of includes.hstevesk2006-07-221-1/+3
* Put $OpenBSD$ tags back (as comments) to replace the RCSID()s thatdjm2006-03-251-0/+1
* change OpenSSH's xrealloc() function from being xrealloc(p, new_size) todjm2006-03-251-1/+1
* annoying spacing fixes getting in the way of real diffsderaadt2006-03-201-0/+1
* in a switch (), break after return or goto is stupidderaadt2006-03-201-1/+0
* RCSID() can diederaadt2006-03-191-1/+0
* make this -Wsign-compare clean; ok avsm@ markus@djm2005-06-171-2/+2
* constify. ok markus@ & djm@jakob2003-11-101-5/+5
* backout last change, since it violates pkcs#1markus2003-06-181-23/+14
* make sure the signature has at least the expected length (don'tmarkus2003-06-161-3/+3
* merge ssh-dss.h ssh-rsa.h into key.h; ok deraadt@markus2003-02-121-2/+1
* KNFderaadt2002-11-211-2/+2
* RSA_public_decrypt() returns -1 on error so len must be signed; ok markus@stevesk2002-08-271-2/+3
* replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parsermarkus2002-08-021-7/+93
* diff is u_int (2x); ok deraadt/provosmarkus2002-08-021-3/+3
* don't allocate, copy, and discard if there is not interested in the data; ok deraadt@markus2002-07-041-10/+8
* patch memory leaks; grendel@zeitbombe.orgderaadt2002-07-041-1/+3
* various KNF and %d for unsignedderaadt2002-06-231-13/+11
* display minimum RSA modulus in error(); ok markus@stevesk2002-06-101-3/+3
* pad received signature with leading zeros, because RSA_verify expectsmarkus2002-05-311-2/+17
* ignore SSH_BUG_SIGBLOB for ssh-rsa; #187markus2002-04-021-9/+1
* make RSA modulus minimum #define; ok markus@stevesk2002-03-291-2/+3
* signed vs. unsigned: make size arguments u_int, ok stevesk@markus2002-02-241-5/+5
* use static EVP_MAX_MD_SIZE buffers for EVP_DigestFinal; ok stevesk@markus2002-01-251-13/+7
* minor KNFderaadt2001-12-051-2/+2
* KNF (unexpand)markus2001-11-101-3/+3
* missing free and sync dss/rsa code.markus2001-11-071-3/+3
* ssh_rsa_sign/verify: SSH_BUG_SIGBLOB not supportedmarkus2001-11-071-1/+9
* u_char*/char* cleanup; ok markus@stevesk2001-09-171-3/+3
* cleanup, remove old codemarkus2001-06-061-2/+1
* some older systems use NID_md5 instead of NID_sha1 for RSASSA-PKCS1-v1_5markus2001-03-271-3/+4
* use EVP_get_digestbynid, reorder some calls and fix missing free.markus2001-03-271-12/+22
* sync with netbsd tree changes.itojun2001-02-081-1/+2
* split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.markus2001-01-211-8/+5