summaryrefslogtreecommitdiff
path: root/rsa.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2000-04-16 11:18:38 +1000
committerDamien Miller <djm@mindrot.org>2000-04-16 11:18:38 +1000
commit4af51306d9a51459a5bef922df1037f876ae51fe (patch)
tree09ecfc215fce82345a3259f8a0f384b9a67906f0 /rsa.c
parent5d1705ecf9bd3216dc99a84242bcdf2e7297d307 (diff)
- OpenBSD CVS updates.
[ssh.1 ssh.c] - ssh -2 [auth.c channels.c clientloop.c packet.c packet.h serverloop.c] [session.c sshconnect.c] - check payload for (illegal) extra data [ALL] - whitespace cleanup
Diffstat (limited to 'rsa.c')
-rw-r--r--rsa.c30
1 files changed, 15 insertions, 15 deletions
diff --git a/rsa.c b/rsa.c
index 0385a102c..1e8c434f9 100644
--- a/rsa.c
+++ b/rsa.c
@@ -1,41 +1,41 @@
1/* 1/*
2 * 2 *
3 * rsa.c 3 * rsa.c
4 * 4 *
5 * Author: Tatu Ylonen <ylo@cs.hut.fi> 5 * Author: Tatu Ylonen <ylo@cs.hut.fi>
6 * 6 *
7 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 7 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
8 * All rights reserved 8 * All rights reserved
9 * 9 *
10 * Created: Fri Mar 3 22:07:06 1995 ylo 10 * Created: Fri Mar 3 22:07:06 1995 ylo
11 * 11 *
12 * Description of the RSA algorithm can be found e.g. from the following sources: 12 * Description of the RSA algorithm can be found e.g. from the following sources:
13 * 13 *
14 * Bruce Schneier: Applied Cryptography. John Wiley & Sons, 1994. 14 * Bruce Schneier: Applied Cryptography. John Wiley & Sons, 1994.
15 * 15 *
16 * Jennifer Seberry and Josed Pieprzyk: Cryptography: An Introduction to 16 * Jennifer Seberry and Josed Pieprzyk: Cryptography: An Introduction to
17 * Computer Security. Prentice-Hall, 1989. 17 * Computer Security. Prentice-Hall, 1989.
18 * 18 *
19 * Man Young Rhee: Cryptography and Secure Data Communications. McGraw-Hill, 19 * Man Young Rhee: Cryptography and Secure Data Communications. McGraw-Hill,
20 * 1994. 20 * 1994.
21 * 21 *
22 * R. Rivest, A. Shamir, and L. M. Adleman: Cryptographic Communications 22 * R. Rivest, A. Shamir, and L. M. Adleman: Cryptographic Communications
23 * System and Method. US Patent 4,405,829, 1983. 23 * System and Method. US Patent 4,405,829, 1983.
24 * 24 *
25 * Hans Riesel: Prime Numbers and Computer Methods for Factorization. 25 * Hans Riesel: Prime Numbers and Computer Methods for Factorization.
26 * Birkhauser, 1994. 26 * Birkhauser, 1994.
27 * 27 *
28 * The RSA Frequently Asked Questions document by RSA Data Security, Inc., 1995. 28 * The RSA Frequently Asked Questions document by RSA Data Security, Inc., 1995.
29 * 29 *
30 * RSA in 3 lines of perl by Adam Back <aba@atlax.ex.ac.uk>, 1995, as included 30 * RSA in 3 lines of perl by Adam Back <aba@atlax.ex.ac.uk>, 1995, as included
31 * below: 31 * below:
32 * 32 *
33 * [gone - had to be deleted - what a pity] 33 * [gone - had to be deleted - what a pity]
34 * 34 *
35*/ 35*/
36 36
37#include "includes.h" 37#include "includes.h"
38RCSID("$Id: rsa.c,v 1.13 2000/04/04 04:57:08 damien Exp $"); 38RCSID("$Id: rsa.c,v 1.14 2000/04/16 01:18:45 damien Exp $");
39 39
40#include "rsa.h" 40#include "rsa.h"
41#include "ssh.h" 41#include "ssh.h"