summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/key.c
AgeCommit message (Collapse)Author
2003-11-10constify. ok markus@ & djm@Jakob Schlyter
2003-07-09minor tweak: when generating the hex fingerprint, give strlcat the full ↵Anil Madhavapeddy
bound to the buffer, and add a comment below explaining why the zero-termination is one less than the bound. markus@ ok
2003-06-24int -> u_int; ok djm@, deraadt@, mouring@Markus Friedl
2003-05-14add experimental support for verifying hos keys using DNS as describedJakob Schlyter
in draft-ietf-secsh-dns-xx.txt. more information in README.dns. ok markus@ and henning@
2003-02-12merge ssh-dss.h ssh-rsa.h into key.h; ok deraadt@Markus Friedl
2003-02-04better debug3 messageMarkus Friedl
2002-09-09signed vs unsigned from -pedantic; ok henning@Markus Friedl
2002-07-04don't allocate, copy, and discard if there is not interested in the data; ok ↵Markus Friedl
deraadt@
2002-07-04patch memory leaks; grendel@zeitbombe.orgTheo de Raadt
2002-06-30minor KNFTheo de Raadt
2002-06-23KNFTheo de Raadt
2002-05-31add comment:Markus Friedl
key_verify returns 1 for a correct signature, 0 for an incorrect signature and -1 on error. CVS ----------------------------------------------------------------------
2002-03-19KNF whitespaceMarkus Friedl
2002-03-18add key_demote() for ssh-privsepMarkus Friedl
2002-02-28add some const EVP_MD for openssl-0.9.7Markus Friedl
2002-02-24signed vs. unsigned: make size arguments u_int, ok stevesk@Markus Friedl
2002-01-25use EVP_MD_size(evp_md) and not evp_md->md_size; ok steveks@Markus Friedl
2001-12-27call fatal() for openssl allocation failuresMarkus Friedl
2001-12-25be more careful on allocationMarkus Friedl
2001-12-19basic KNF done while i was looking for something elseTheo de Raadt
2001-12-05minor KNFTheo de Raadt
2001-11-21mem leakMarkus Friedl
2001-10-04call OPENSSL_free() for memory allocated by openssl; from chombier@mac.comMarkus Friedl
2001-09-19key_read() now returns -1 on type mismatch, tooMarkus Friedl
2001-09-17better error handling if you try to export a bad key to ssh.comMarkus Friedl
2001-09-17u_char*/char* cleanup; ok markus@Kevin Steves
2001-06-26add smartcard support to the client, too (now you can use bothMarkus Friedl
the agent and the client).
2001-06-25update copyright for 2001Markus Friedl
2001-06-23more strict prototypes. raise warning level in Makefile.inc. markus ok'edJun-ichiro itojun Hagino
TODO; cleanup headers
2001-06-23handle sigature of size 0 (some broken clients send this).Markus Friedl
2001-04-17add HostKeyAlgorithms; based on patch from res@shore.net; ok provos@Markus Friedl
2001-04-16better safe than sorry in later mods; yongari@kt-is.co.krTheo de Raadt
2001-04-05fix whitespace: unexpand + trailing spaces.Markus Friedl
2001-03-12remove old key_fingerprint interface, s/_ex//Markus Friedl
2001-03-11style+cleanupMarkus Friedl
2001-03-11cleanup & shorten some var names key_fingerprint_bubblebabble.Jakob Schlyter
2001-03-11add improved fingerprint functions. based on work by CarstenJakob Schlyter
Raskgaard <cara@int.tele.dk> and modified by me. ok markus@.
2001-03-11debugMarkus Friedl
2001-02-04unexpand and remove end-of-line whitespace; ok markus@Kevin Steves
2001-01-22free() -> xfree(); ok markus@Kevin Steves
2001-01-21split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.Markus Friedl
rename util.[ch] -> misc.[ch]
2001-01-16make "ssh-rsa" key format for ssh2 confirm to the ietf-drafts; from ↵Markus Friedl
galb@vandyke.com. note that you have to delete older ssh2-rsa keys, since they are in the wrong format, too. they must be removed from .ssh/authorized_keys2 and .ssh/known_hosts2, etc. (cd; grep -v ssh-rsa .ssh/authorized_keys2 > TMP && mv TMP .ssh/authorized_keys2) additionally, we now check that BN_num_bits(rsa->n) >= 768.
2000-12-19replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'Markus Friedl
with u_char.
2000-11-12add support for RSA to SSH2. please test.Markus Friedl
there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
2000-09-07cleanup copyright notices on all files. I have attempted to be accurate withTheo de Raadt
the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
2000-08-19add SSH2/DSA support to the agent and some other DSA related cleanups.Markus Friedl
(note that we cannot talk to ssh.com's ssh2 agents)
2000-06-22Missing CVS idents; ok markusDamien Miller
2000-06-19cleanup fingerprinting, less hardcoded sizesMarkus Friedl
2000-05-24fix key_read() for uuencoded keys w/o '='Markus Friedl
2000-05-05remote trailing comments before calling __b64_ptonMarkus Friedl