summaryrefslogtreecommitdiffstats
path: root/crypto/openssh/rsa.c
Commit message (Collapse)AuthorAgeFilesLines
* MFH (r265214, r294333, r294407, r294467): misc prop fixesdes2016-02-071-38/+75
| | | | | | | | | | | | | | | | MFH (r285975, r287143): register mergeinfo for security fixes MFH (r294497, r294498, r295139): internal documentation MFH (r294328): upgrade to openssh 6.7p1, re-add libwrap MFH (r294332): upgrade to openssh 6.8p1 MFH (r294367): update pam_ssh for api changes MFH (r294909): switch usedns back on MFH (r294336): upgrade to openssh 6.9p1 MFH (r294495): re-enable dsa keys MFH (r294464): upgrade to openssh 7.0p1 MFH (r294496): upgrade to openssh 7.1p2 Approved by: re (gjb) Relnotes: yes
* MFH (r263712): upgrade openssh to 6.6p1des2014-04-121-5/+5
| | | | MFH (r264308): restore p level in debugging output
* Upgrade to 6.3p1.des2013-09-211-5/+5
|\ | | | | | | Approved by: re (gjb)
| * Properly flatten openssh/dist.des2008-07-221-151/+0
| |
| * Revert part of 180714 - the intent was to flatten dist, not to nuke it.des2008-07-221-0/+151
| |
| * Flatten the OpenSSH vendor tree for 3.x and newer.des2008-07-221-151/+0
| |
| * Vendor import of OpenSSH 4.5p1.des2006-11-101-8/+10
| |
| * Vendor import of OpenSSH 4.4p1.des2006-09-301-2/+7
| |
| * Vendor import of OpenSSH 3.1des2002-03-181-5/+8
| |
| * Say "hi" to the latest in the OpenSSH series, version 2.9!green2001-05-041-81/+28
| | | | | | | | Happy birthday to: rwatson
| * Initial import of OpenSSH post-2.2.0 snapshot dated 2000-09-09kris2000-09-101-12/+37
| |
| * Initial import of OpenSSH v2.1.kris2000-05-151-15/+15
| |
| * Virgin import of OpenSSH sources dated 2000/03/25kris2000-03-261-3/+3
| |
* | Resolve conflicts.des2006-11-101-8/+10
| |
* | Merge conflicts.des2006-09-301-2/+7
| | | | | | | | MFC after: 1 week
* | Forcibly revert to mainline.des2002-06-271-1/+0
| |
* | Fix conflicts.des2002-03-181-5/+8
| |
* | Fix conflicts for OpenSSH 2.9.green2001-05-041-76/+22
| |
* | Patches backported from later development version of OpenSSH which preventkris2001-02-121-6/+7
| | | | | | | | | | | | | | | | (instead of just mitigating through connection limits) the Bleichenbacher attack which can lead to guessing of the server key (not host key) by regenerating it when an RSA failure is detected. Reviewed by: rwatson
* | Update to OpenSSH 2.3.0 with FreeBSD modifications. OpenSSH 2.3.0green2000-12-051-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | new features description elided in favor of checking out their website. Important new FreeBSD-version stuff: PAM support has been worked in, partially from the "Unix" OpenSSH version, and a lot due to the work of Eivind Eklend, too. This requires at least the following in pam.conf: sshd auth sufficient pam_skey.so sshd auth required pam_unix.so try_first_pass sshd session required pam_permit.so Parts by: Eivind Eklend <eivind@FreeBSD.org>
* | Resolve conflicts and update for OpenSSH 2.2.0kris2000-09-101-13/+38
| | | | | | | | Reviewed by: gshapiro, peter, green
* | Nuke RSAREF support from orbit.kris2000-09-101-6/+0
| | | | | | | | It's the only way to be sure.
* | Resolve conflicts and update for FreeBSD.kris2000-05-151-15/+14
| |
* | Resolve conflicts.kris2000-03-261-3/+3
| |
* | Add a new function stub to libcrypto() which resolves to a symbol inkris2000-03-131-2/+10
|/ | | | | | | | | | | the librsa* library and reports which version of the library (OpenSSL/RSAREF) is being used. This is then used in openssh to detect the failure case of RSAREF and a RSA key >1024 bits, to print a more helpful error message than 'rsa_public_encrypt() fai led.' This is a 4.0-RELEASE candidate.
* Vendor import of OpenSSH.markm2000-02-241-0/+169
OpenPOWER on IntegriCloud