summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/authfile.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* In sshkey_in_file(), ignore keys that are considered for being toodjm2018-09-211-4/+10
* replace cast with call to sshbuf_mutable_ptr(); ok djm@markus2018-07-091-2/+2
* switch config file parsing to getline(3) as this avoids static limitsmarkus2018-06-061-11/+11
* Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures)markus2018-02-231-1/+7
* remove post-SSHv1 removal dead code from rsa.c and merge thedjm2017-07-011-2/+1
* Switch to recallocarray() for a few operations. Both growth and shrinkagederaadt2017-05-311-14/+2
* revise sshkey_load_public(): remove ssh1 related comments, remove extramarkus2017-05-301-23/+21
* unifdef WITH_SSH1djm2017-04-301-55/+1
* incorrect renditions of this quote bother mederaadt2017-03-261-2/+2
* use sshbuf_allocate() to pre-allocate the buffer used for loadingdjm2016-11-251-2/+14
* make private key loading functions consistently handle NULLdjm2016-04-091-12/+22
* Remove NULL-checks before sshbuf_free().mmcc2015-12-111-5/+3
* Remove NULL-checks before sshkey_free().mmcc2015-12-111-9/+5
* Remove NULL-checks before free().mmcc2015-12-101-3/+2
* - Fix error message: passphrase needs to be at least 5 characters, not 4.tim2015-09-131-3/+3
* re-enable ed25519-certs if compiled w/o openssl; ok djmmarkus2015-07-091-3/+3
* delete support for legacy v00 certificates; "sure" markus@ dtucker@djm2015-07-031-2/+2
* s/recommended/required/ that private keys be og-rdjm2015-04-171-2/+2
* fd leak for !ssh1 case; found by unittests; ok markus@djm2015-03-311-1/+3
* KRL support doesn't need OpenSSL anymore, remove #ifdefsdjm2015-03-181-3/+1
* add an XXX to remind me to improve sshkey_load_publicdjm2015-02-231-1/+4
* Reduce use of <sys/param.h> and transition to <limits.h> throughout.deraadt2015-01-201-3/+3
* deprecate key_load_private_pem() and sshkey_load_private_pem()djm2015-01-081-40/+24
* add RevokedHostKeys option for the clientdjm2014-12-041-10/+48
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-1088/+316
* make compiling against OpenSSL optional (make OPENSSL=no);markus2014-04-291-1/+32
* buffer_get_string_ptr's return should be const to reminddjm2014-04-281-2/+3
* correct test that kdf name is not "none" or "bcrypt"djm2014-03-121-2/+2
* convert memset of potentially-private data to explicit_bzero()djm2014-02-021-7/+7
* replace most bzero with explicit_bzero, except a few that cna be memsettedu2014-01-311-4/+4
* don't refuse to load Ed25519 certificatesdjm2013-12-291-1/+2
* support ed25519 keys (hostkeys and user identities) using the public domainmarkus2013-12-061-1/+9
* new private key format, bcrypt as KDF by default; details in PROTOCOL.key;markus2013-12-061-10/+361
* Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com"djm2013-11-211-3/+3
* bye, bye xfree(); ok markus@djm2013-05-171-5/+5
* add the ability to query supported ciphers, MACs, key type and KEXdjm2013-04-191-3/+3
* support AES-GCM as defined in RFC 5647 (but with simpler KEX handling)markus2013-01-081-3/+3
* add encrypt-then-mac (EtM) modes to openssh by defining new mac algorithmsmarkus2012-12-111-3/+3
* memleak in key_load_file(); from Jan Klemkowmarkus2012-01-251-2/+2
* make sure key_parse_public/private_rsa1() no longer consumes its input buffer.markus2011-06-141-25/+28
* read in key comments for v.2 keys (though note that these are notdjm2011-05-231-3/+6
* warn on unexpected key type in key_parse_private_type()djm2011-05-131-1/+2
* despam debug() logs by detecting that we are trying to load a private keydjm2011-05-101-1/+4
* allow "ssh-add - < key"; feedback and ok markus@djm2011-05-041-36/+64
* correctly load comment for encrypted rsa1 keys;markus2010-11-291-2/+3
* Refactor internals of private key loading and saving to work on memorydjm2010-11-211-193/+254
* fix a possible NULL deref on loading a corrupt ECDH keydjm2010-10-281-9/+5
* typodjm2010-09-081-2/+2
* Implement Elliptic Curve Cryptography modes for key exchange (ECDH) anddjm2010-08-311-1/+31
* commited the wrong version of the hostbased certificate diff; thisdjm2010-08-041-5/+7