Damien Miller
|
0fe974bd62
|
expose sshkey_parse_public_rsa1() for unit testing
|
2012-03-04 21:19:23 +01:00 |
|
Damien Miller
|
79061f1d6e
|
signed/unsigned comparison
|
2012-03-04 21:19:22 +01:00 |
|
Markus Friedl
|
37f4c4a78f
|
remove remaining xstrdup from sshkey_try_load_public()
|
2012-03-04 21:19:22 +01:00 |
|
Markus Friedl
|
ff45a11b5a
|
fix re-try for files with .pub suffix (e.g. for cert tests or encrypted private keys)
|
2012-03-04 21:19:22 +01:00 |
|
Markus Friedl
|
56b8e0979c
|
fix rsa1 key loading and passphrase change
|
2012-03-04 21:19:22 +01:00 |
|
Damien Miller
|
68cf42d1fe
|
convert everything to new authfile.[ch] API
NB. bugs remain
|
2012-03-04 21:19:22 +01:00 |
|
Damien Miller
|
ce24556633
|
NULL *commentp in functions that take it
|
2012-03-04 21:19:21 +01:00 |
|
Damien Miller
|
f576b5ee39
|
fixes from Markus
|
2012-03-04 21:19:21 +01:00 |
|
Damien Miller
|
c412d88561
|
zero *keyp in each function that uses it
|
2012-03-04 21:19:21 +01:00 |
|
Damien Miller
|
24db83513f
|
rework authfile.c to avoid fatal and return error codes
|
2012-03-04 21:19:21 +01:00 |
|
Damien Miller
|
ef0c2e123f
|
defatal cipher.[ch]
unbreak arcfour(128|256)
|
2012-01-17 14:37:27 +01:00 |
|
Damien Miller
|
ea5ceecdc2
|
first cut at merging disentangled buffer and library code. buffer_* continue
to exist as thin wrappers around sshbuf_*
doesn't yet pass regress (breakage in hostkey checking, probably related to
new sshkey_* return values)
|
2012-01-17 14:32:48 +01:00 |
|
Markus Friedl
|
a87828ec88
|
import openssh as of 2012/01/05
|
2012-01-05 12:08:12 +01:00 |
|