Damien Miller
|
54c2c68956
|
This stated as a conversion of monitor*.[ch] to the new
buffer API, but it got away from me...
Includes a change from u_int -> size_t in the key API that
touches quite a few things
|
2012-09-20 01:22:35 +10:00 |
|
Markus Friedl
|
e3403f3457
|
update to openssh-6.1
|
2012-07-30 20:41:29 +02:00 |
|
Damien Miller
|
44e5c0f6b2
|
memory leak in cert_free()
|
2012-03-21 10:56:06 +11:00 |
|
Damien Miller
|
b921712025
|
centralise error handling for sshkey_from_blob, fix leak
|
2012-03-07 00:26:51 +01:00 |
|
Damien Miller
|
c79348e375
|
better parameter checking for RSA key generation
|
2012-01-17 14:32:49 +01:00 |
|
Damien Miller
|
c90c1905fd
|
fix conversion of key types to "plain" (non-cert) names
makes cert-* regress pass
|
2012-01-17 14:32:49 +01:00 |
|
Markus Friedl
|
79762ba77d
|
fix reading/writing of pubic keys
pubkeys are stored base64 not base16 and
deal with spaces in pubkeys correctly.
|
2012-01-17 14:32:49 +01:00 |
|
Markus Friedl
|
e339f7589e
|
key_verify now returns 0 on success and < 0 on error
(used to return 1 on success 0 on failed signatures and -1
on error)
|
2012-01-17 14:32:49 +01:00 |
|
Damien Miller
|
ea5ceecdc2
|
first cut at merging disentangled buffer and library code. buffer_* continue
to exist as thin wrappers around sshbuf_*
doesn't yet pass regress (breakage in hostkey checking, probably related to
new sshkey_* return values)
|
2012-01-17 14:32:48 +01:00 |
|
Markus Friedl
|
a87828ec88
|
import openssh as of 2012/01/05
|
2012-01-05 12:08:12 +01:00 |
|