Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | make "ssh-rsa" key format for ssh2 confirm to the ietf-drafts; from galb@vandyke.com. | 2001-01-16 | 1 | -1/+6 | ||
| | | | | | | | | note that you have to delete older ssh2-rsa keys, since they are in the wrong format, too. they must be removed from .ssh/authorized_keys2 and .ssh/known_hosts2, etc. (cd; grep -v ssh-rsa .ssh/authorized_keys2 > TMP && mv TMP .ssh/authorized_keys2) additionally, we now check that BN_num_bits(rsa->n) >= 768. | |||||
* | remove unused | 2001-01-06 | 1 | -4/+1 | ||
| | ||||||
* | replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned' | 2000-12-19 | 1 | -10/+10 | ||
| | | | | with u_char. | |||||
* | add support for RSA to SSH2. please test. | 2000-11-12 | 1 | -0/+163 | ||
there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication. |