summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/auth-rsa.c
AgeCommit message (Collapse)Author
2000-10-14do not send RSA challenge if key is not allowed by key-options; from ↵Markus Friedl
eivind@ThinkSec.com
2000-10-11clear auth options unless auth sucessfullMarkus Friedl
2000-10-03move fake-auth from auth1.c to individual auth methods, disables s/key in ↵Markus Friedl
debug-msg
2000-09-07some more Copyright fixesMarkus Friedl
2000-09-07cleanup copyright notices on all files. I have attempted to be accurate withTheo de Raadt
the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
2000-07-07clean code is good codeTodd T. Fries
2000-06-20OpenBSD tagMarkus Friedl
2000-06-18split auth-rsa option parsing into auth-optionsMarkus Friedl
add options support to authorized_keys2
2000-06-06fix match_hostname() logic for auth-rsa: deny access if we have a negative ↵Markus Friedl
match or no match at all
2000-04-29keysize warnings error() -> log()Markus Friedl
2000-04-26missing fcloseMarkus Friedl
2000-04-14whitespace cleanupMarkus Friedl
2000-04-12#include <ssl/foo.h> -> <openssh/foo.h>Markus Friedl
2000-03-23initial support for DSA keys. ok deraadt@, niels@Markus Friedl
2000-02-11delay MD5 computation until client sends response, free() early, cleanup.Markus Friedl
2000-01-18fix user/1056, sshd keeps restrictions; dbt@meat.netMarkus Friedl
1999-12-02warn only about mismatch if key is _used_Markus Friedl
1999-12-02warn about keysize-mismatch with log() not error()Markus Friedl
1999-11-24KNF, final part 3Markus Friedl
1999-11-24much more KNFTheo de Raadt
1999-11-23KNF part 1Markus Friedl
1999-11-22syslog changes:Markus Friedl
* Unified Logmessage for all auth-types, for success and for failed * Standard connections get only ONE line in the LOG when level==LOG: Auth-attempts are logged only, if authentication is: a) successfull or b) with passwd or c) we had more than AUTH_FAIL_LOG failues * many log() became verbose() * old behaviour with level=VERBOSE
1999-11-18more %d vs. %s in fmt-stringsMarkus Friedl
1999-11-15the keysize of rsa-parameter 'n' is passed implizit,Markus Friedl
a few more checks and warnings about 'pretended' keysizes.
1999-11-11make all access to options via 'extern Options options'Markus Friedl
and 'extern ServerOptions options' respectively; options are no longer passed as arguments: * make options handling more consistent * remove #include "readconf.h" from ssh.h * readconf.h is only included if necessary
1999-11-02replace assert() with error, fatal or packet_disconnectMarkus Friedl
1999-10-27use libssl md5 routinesTheo de Raadt
1999-10-18the session key is only the least significant 256-bits, mask the rest awayNiels Provos
1999-10-11make sure ~/.ssh/authorized_keys is not writable for group/world (sshd)Markus Friedl
don't load private keys if they are group/world-{rwx} (ssh,sshd and ssh-add)
1999-09-30use libc md5Theo de Raadt
1999-09-29numerous sprintf, strncpy, strcpy cleanupsTheo de Raadt
1999-09-28convert all uses of gmp to SSL bignumNiels Provos
convert all used of rsa to SSL rsa functions remove all use of randomstate to OpenBSD arc4random() and arc4_stir() all this done at a long long night in Canada.