diff options
author | Damien Miller <djm@mindrot.org> | 2000-04-16 11:18:38 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2000-04-16 11:18:38 +1000 |
commit | 4af51306d9a51459a5bef922df1037f876ae51fe (patch) | |
tree | 09ecfc215fce82345a3259f8a0f384b9a67906f0 /rsa.c | |
parent | 5d1705ecf9bd3216dc99a84242bcdf2e7297d307 (diff) |
- OpenBSD CVS updates.
[ssh.1 ssh.c]
- ssh -2
[auth.c channels.c clientloop.c packet.c packet.h serverloop.c]
[session.c sshconnect.c]
- check payload for (illegal) extra data
[ALL]
- whitespace cleanup
Diffstat (limited to 'rsa.c')
-rw-r--r-- | rsa.c | 30 |
1 files changed, 15 insertions, 15 deletions
@@ -1,41 +1,41 @@ | |||
1 | /* | 1 | /* |
2 | * | 2 | * |
3 | * rsa.c | 3 | * rsa.c |
4 | * | 4 | * |
5 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 5 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
6 | * | 6 | * |
7 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 7 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
8 | * All rights reserved | 8 | * All rights reserved |
9 | * | 9 | * |
10 | * Created: Fri Mar 3 22:07:06 1995 ylo | 10 | * Created: Fri Mar 3 22:07:06 1995 ylo |
11 | * | 11 | * |
12 | * Description of the RSA algorithm can be found e.g. from the following sources: | 12 | * Description of the RSA algorithm can be found e.g. from the following sources: |
13 | * | 13 | * |
14 | * Bruce Schneier: Applied Cryptography. John Wiley & Sons, 1994. | 14 | * Bruce Schneier: Applied Cryptography. John Wiley & Sons, 1994. |
15 | * | 15 | * |
16 | * Jennifer Seberry and Josed Pieprzyk: Cryptography: An Introduction to | 16 | * Jennifer Seberry and Josed Pieprzyk: Cryptography: An Introduction to |
17 | * Computer Security. Prentice-Hall, 1989. | 17 | * Computer Security. Prentice-Hall, 1989. |
18 | * | 18 | * |
19 | * Man Young Rhee: Cryptography and Secure Data Communications. McGraw-Hill, | 19 | * Man Young Rhee: Cryptography and Secure Data Communications. McGraw-Hill, |
20 | * 1994. | 20 | * 1994. |
21 | * | 21 | * |
22 | * R. Rivest, A. Shamir, and L. M. Adleman: Cryptographic Communications | 22 | * R. Rivest, A. Shamir, and L. M. Adleman: Cryptographic Communications |
23 | * System and Method. US Patent 4,405,829, 1983. | 23 | * System and Method. US Patent 4,405,829, 1983. |
24 | * | 24 | * |
25 | * Hans Riesel: Prime Numbers and Computer Methods for Factorization. | 25 | * Hans Riesel: Prime Numbers and Computer Methods for Factorization. |
26 | * Birkhauser, 1994. | 26 | * Birkhauser, 1994. |
27 | * | 27 | * |
28 | * The RSA Frequently Asked Questions document by RSA Data Security, Inc., 1995. | 28 | * The RSA Frequently Asked Questions document by RSA Data Security, Inc., 1995. |
29 | * | 29 | * |
30 | * RSA in 3 lines of perl by Adam Back <aba@atlax.ex.ac.uk>, 1995, as included | 30 | * RSA in 3 lines of perl by Adam Back <aba@atlax.ex.ac.uk>, 1995, as included |
31 | * below: | 31 | * below: |
32 | * | 32 | * |
33 | * [gone - had to be deleted - what a pity] | 33 | * [gone - had to be deleted - what a pity] |
34 | * | 34 | * |
35 | */ | 35 | */ |
36 | 36 | ||
37 | #include "includes.h" | 37 | #include "includes.h" |
38 | RCSID("$Id: rsa.c,v 1.13 2000/04/04 04:57:08 damien Exp $"); | 38 | RCSID("$Id: rsa.c,v 1.14 2000/04/16 01:18:45 damien Exp $"); |
39 | 39 | ||
40 | #include "rsa.h" | 40 | #include "rsa.h" |
41 | #include "ssh.h" | 41 | #include "ssh.h" |