summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh-rsa.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* ignore SSH_BUG_SIGBLOB for ssh-rsa; #187markus2002-04-021-9/+1
|
* make RSA modulus minimum #define; ok markus@stevesk2002-03-291-2/+3
|
* signed vs. unsigned: make size arguments u_int, ok stevesk@markus2002-02-241-5/+5
|
* use static EVP_MAX_MD_SIZE buffers for EVP_DigestFinal; ok stevesk@markus2002-01-251-13/+7
| | | | don't use evp_md->md_size, it's not public.
* minor KNFderaadt2001-12-051-2/+2
|
* KNF (unexpand)markus2001-11-101-3/+3
|
* missing free and sync dss/rsa code.markus2001-11-071-3/+3
|
* ssh_rsa_sign/verify: SSH_BUG_SIGBLOB not supportedmarkus2001-11-071-1/+9
|
* u_char*/char* cleanup; ok markus@stevesk2001-09-171-3/+3
|
* cleanup, remove old codemarkus2001-06-061-2/+1
|
* some older systems use NID_md5 instead of NID_sha1 for RSASSA-PKCS1-v1_5markus2001-03-271-3/+4
| | | | signatures in SSH protocol 2, ok djm@
* use EVP_get_digestbynid, reorder some calls and fix missing free.markus2001-03-271-12/+22
|
* sync with netbsd tree changes.itojun2001-02-081-1/+2
| | | | | | - more strict prototypes, include necessary headers - use paths.h/pathnames.h decls - size_t typecase to int -> u_long
* split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.markus2001-01-211-8/+5
| | | | rename util.[ch] -> misc.[ch]
* make "ssh-rsa" key format for ssh2 confirm to the ietf-drafts; from galb@vandyke.com.markus2001-01-161-1/+6
| | | | | | | | note that you have to delete older ssh2-rsa keys, since they are in the wrong format, too. they must be removed from .ssh/authorized_keys2 and .ssh/known_hosts2, etc. (cd; grep -v ssh-rsa .ssh/authorized_keys2 > TMP && mv TMP .ssh/authorized_keys2) additionally, we now check that BN_num_bits(rsa->n) >= 768.
* remove unusedmarkus2001-01-061-4/+1
|
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-10/+10
| | | | with u_char.
* add support for RSA to SSH2. please test.markus2000-11-121-0/+163
there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.