<feed xmlns='http://www.w3.org/2005/Atom'>
<title>wireguard-openbsd/usr.bin/ssh/sshkey.c, branch jd/queueboosts</title>
<subtitle>WireGuard implementation for the OpenBSD kernel</subtitle>
<id>https://git.zx2c4.com/wireguard-openbsd/atom/usr.bin/ssh/sshkey.c?h=jd%2Fqueueboosts</id>
<link rel='self' href='https://git.zx2c4.com/wireguard-openbsd/atom/usr.bin/ssh/sshkey.c?h=jd%2Fqueueboosts'/>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/'/>
<updated>2020-06-22T05:58:35Z</updated>
<entry>
<title>Add support for FIDO webauthn (verification only). webauthn is a</title>
<updated>2020-06-22T05:58:35Z</updated>
<author>
<name>djm</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-06-22T05:58:35Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=c25c45ac5c037f909a29d0baed332c4fbcf1043b'/>
<id>urn:sha1:c25c45ac5c037f909a29d0baed332c4fbcf1043b</id>
<content type='text'>
standard for using FIDO keys in web browsers. webauthn signatures are
a slightly different format to plain FIDO signatures - this support
allows verification of these. Feedback and ok markus@
</content>
</entry>
<entry>
<title>Refactor private key parsing. Eliminates a fair bit of duplicated</title>
<updated>2020-04-11T10:16:11Z</updated>
<author>
<name>djm</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-04-11T10:16:11Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=dd305755ddbc31845ba45e3768a8aff5c4131e19'/>
<id>urn:sha1:dd305755ddbc31845ba45e3768a8aff5c4131e19</id>
<content type='text'>
code and fixes oss-fuzz#20074 (NULL deref) caused by a missing
key type check in the ECDSA_CERT parsing path.

feedback and ok markus@
</content>
</entry>
<entry>
<title>add sshkey_parse_pubkey_from_private_fileblob_type()</title>
<updated>2020-04-08T00:08:46Z</updated>
<author>
<name>djm</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-04-08T00:08:46Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=117d161305dbc0ba38d37c60247e1b5986b573ba'/>
<id>urn:sha1:117d161305dbc0ba38d37c60247e1b5986b573ba</id>
<content type='text'>
Extracts a public key from the unencrypted envelope of a new-style
OpenSSH private key.

ok markus@
</content>
</entry>
<entry>
<title>simplify sshkey_parse_private_fileblob_type()</title>
<updated>2020-04-08T00:07:19Z</updated>
<author>
<name>djm</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-04-08T00:07:19Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=d49d52ce0b870694111f336c8da3abf48a204838'/>
<id>urn:sha1:d49d52ce0b870694111f336c8da3abf48a204838</id>
<content type='text'>
Try new format parser for all key types first, fall back to PEM
parser only for invalid format errors.

ok markus@
</content>
</entry>
<entry>
<title>check private key type against requested key type in new-style private</title>
<updated>2020-04-08T00:05:59Z</updated>
<author>
<name>djm</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-04-08T00:05:59Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=c96249d0056a164595cb300a97af930ec4a59426'/>
<id>urn:sha1:c96249d0056a164595cb300a97af930ec4a59426</id>
<content type='text'>
decoding; ok markus@
</content>
</entry>
<entry>
<title>check that pubkey in private key envelope matches actual private key</title>
<updated>2020-04-08T00:04:32Z</updated>
<author>
<name>djm</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-04-08T00:04:32Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=c3be6246a4bdc210e0c63b83f53e944cb6c1ca88'/>
<id>urn:sha1:c3be6246a4bdc210e0c63b83f53e944cb6c1ca88</id>
<content type='text'>
(this public key is currently unusued)

ok markus@
</content>
</entry>
<entry>
<title>refactor private key parsing a little</title>
<updated>2020-04-08T00:01:52Z</updated>
<author>
<name>djm</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-04-08T00:01:52Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=a8b002979ef949acff340a1ce1645a99a9058771'/>
<id>urn:sha1:a8b002979ef949acff340a1ce1645a99a9058771</id>
<content type='text'>
Split out the base64 decoding and private section decryption steps in
to separate functions. This will make the decryption step easier to fuzz
as well as making it easier to write a "load public key from new-format
private key" function.

ok markus@
</content>
</entry>
<entry>
<title>sshkey_cert_check_authority requires reason to be set; ok djm</title>
<updated>2020-03-06T18:23:17Z</updated>
<author>
<name>markus</name>
<email>markus@openbsd.org</email>
</author>
<published>2020-03-06T18:23:17Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=4e349e12d39cd6783e16a83a9eca668ebcdedc95'/>
<id>urn:sha1:4e349e12d39cd6783e16a83a9eca668ebcdedc95</id>
<content type='text'>
</content>
</entry>
<entry>
<title>passphrase depends on kdfname, not ciphername (possible null-deref);</title>
<updated>2020-03-06T18:21:28Z</updated>
<author>
<name>markus</name>
<email>markus@openbsd.org</email>
</author>
<published>2020-03-06T18:21:28Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=5496609a6eb9be0f51a03cd4cd0e67b8974b029a'/>
<id>urn:sha1:5496609a6eb9be0f51a03cd4cd0e67b8974b029a</id>
<content type='text'>
ok djm
</content>
</entry>
<entry>
<title>change explicit_bzero();free() to freezero()</title>
<updated>2020-02-26T13:40:09Z</updated>
<author>
<name>jsg</name>
<email>jsg@openbsd.org</email>
</author>
<published>2020-02-26T13:40:09Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=c9831b39c7f05cf54db0775dea423b6be448db6e'/>
<id>urn:sha1:c9831b39c7f05cf54db0775dea423b6be448db6e</id>
<content type='text'>
While freezero() returns early if the pointer is NULL the tests for
NULL in callers are left to avoid warnings about passing an
uninitialised size argument across a function boundry.

ok deraadt@ djm@
</content>
</entry>
</feed>
