Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | read in key comments for v.2 keys (though note that these are not | 2011-05-23 | 1 | -3/+6 | ||
| | | | | | passed over the agent protocol); bz#439, based on patch from binder AT arago.de; ok markus@ | |||||
* | warn on unexpected key type in key_parse_private_type() | 2011-05-13 | 1 | -1/+2 | ||
| | ||||||
* | despam debug() logs by detecting that we are trying to load a private key | 2011-05-10 | 1 | -1/+4 | ||
| | | | | in key_try_load_public() and returning early; ok markus@ | |||||
* | allow "ssh-add - < key"; feedback and ok markus@ | 2011-05-04 | 1 | -36/+64 | ||
| | ||||||
* | correctly load comment for encrypted rsa1 keys; | 2010-11-29 | 1 | -2/+3 | ||
| | | | | report/fix Joachim Schipper; ok djm@ | |||||
* | Refactor internals of private key loading and saving to work on memory | 2010-11-21 | 1 | -193/+254 | ||
| | | | | | buffers rather than directly on files. This will make a few things easier to do in the future; ok markus@ | |||||
* | fix a possible NULL deref on loading a corrupt ECDH key | 2010-10-28 | 1 | -9/+5 | ||
| | | | | | | | store ECDH group information in private keys files as "named groups" rather than as a set of explicit group parameters (by setting the OPENSSL_EC_NAMED_CURVE flag). This makes for shorter key files and retrieves the group's OpenSSL NID that we need for various things. | |||||
* | typo | 2010-09-08 | 1 | -2/+2 | ||
| | ||||||
* | Implement Elliptic Curve Cryptography modes for key exchange (ECDH) and | 2010-08-31 | 1 | -1/+31 | ||
| | | | | | | | | | | | | | | | | | host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. Only the mandatory sections of RFC5656 are implemented, specifically the three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and ECDSA. Point compression (optional in RFC5656 is NOT implemented). Certificate host and user keys using the new ECDSA key types are supported. Note that this code has not been tested for interoperability and may be subject to change. feedback and ok markus@ | |||||
* | commited the wrong version of the hostbased certificate diff; this | 2010-08-04 | 1 | -5/+7 | ||
| | | | | | version replaces some strlc{py,at} verbosity with xasprintf() at the request of markus@ | |||||
* | enable certificates for hostbased authentication, from Iain Morgan; | 2010-08-04 | 1 | -1/+59 | ||
| | | | | "looks ok" markus@ | |||||
* | Add a TrustedUserCAKeys option to sshd_config to specify CA keys that | 2010-03-04 | 1 | -1/+63 | ||
| | | | | | | | | | | | are trusted to authenticate users (in addition than doing it per-user in authorized_keys). Add a RevokedKeys option to sshd_config and a @revoked marker to known_hosts to allow keys to me revoked and banned for user or host authentication. feedback and ok markus@ | |||||
* | Fix bug introduced in r1.78 (incorrect brace location) that broke key auth. | 2010-01-12 | 1 | -2/+2 | ||
| | | | | Patch from joachim joachimschipper nl. | |||||
* | Do not prompt for a passphrase if we fail to open a keyfile, and log the | 2010-01-11 | 1 | -3/+11 | ||
| | | | | | reason the open failed to debug. bz #1693, found by tj AT castaglia org, ok djm@ | |||||
* | switch from 3DES to AES-128 for encryption of passphrase-protected | 2009-10-22 | 1 | -2/+2 | ||
| | | | | SSH protocol 2 private keys; ok several | |||||
* | almost entirely get rid of the culture of ".h files that include .h files" | 2006-08-03 | 1 | -4/+3 | ||
| | | | | | ok djm, sort of ok stevesk makes the pain stop in one easy step | |||||
* | clean extra spaces | 2006-08-01 | 1 | -2/+2 | ||
| | ||||||
* | move #include <stdio.h> out of includes.h | 2006-08-01 | 1 | -1/+2 | ||
| | ||||||
* | move #include <stdlib.h> out of includes.h | 2006-07-26 | 1 | -1/+2 | ||
| | ||||||
* | move #include <sys/param.h> out of includes.h | 2006-07-26 | 1 | -1/+2 | ||
| | ||||||
* | move #include <string.h> out of includes.h | 2006-07-22 | 1 | -1/+2 | ||
| | ||||||
* | move #include <unistd.h> out of includes.h | 2006-07-17 | 1 | -1/+2 | ||
| | ||||||
* | need <errno.h> here also (it's also included in <openssl/err.h>) | 2006-07-11 | 1 | -1/+2 | ||
| | ||||||
* | move #include <fcntl.h> out of includes.h | 2006-07-09 | 1 | -1/+3 | ||
| | ||||||
* | Prevent ssh from trying to open private keys with bad permissions more than | 2006-04-25 | 1 | -2/+6 | ||
| | | | | | once or prompting for their passphrases (which it subsequently ignores anyway), similar to a previous change in ssh-add. bz #1186, ok djm@ | |||||
* | Put $OpenBSD$ tags back (as comments) to replace the RCSID()s that | 2006-03-25 | 1 | -0/+1 | ||
| | | | | Theo nuked - our scripts to sync -portable need them in the files | |||||
* | whoever thought that break after return was a good idea needs to get their head examimed | 2006-03-19 | 1 | -4/+0 | ||
| | ||||||
* | RCSID() can die | 2006-03-19 | 1 | -1/+0 | ||
| | ||||||
* | Make ssh-add check file permissions before attempting to load private | 2006-03-13 | 1 | -2/+2 | ||
| | | | | | key files multiple times; it will fail anyway and this prevents confusing multiple prompts and warnings. mindrot #1138, ok djm@ | |||||
* | move #include <sys/stat.h> out of includes.h; ok markus@ | 2006-02-20 | 1 | -1/+4 | ||
| | ||||||
* | make this -Wsign-compare clean; ok avsm@ markus@ | 2005-06-17 | 1 | -7/+9 | ||
| | ||||||
* | Fix debug call in error path of authorized_keys processing and fix related | 2004-12-11 | 1 | -2/+3 | ||
| | | | | warnings; ok djm@ | |||||
* | Discard over-length authorized_keys entries rather than complaining when | 2004-12-06 | 1 | -4/+5 | ||
| | | | | they don't decode. bz #884, with & ok djm@ | |||||
* | fix error path, spotted by Martin.Kraemer AT Fujitsu-Siemens.com; ok markus | 2004-08-23 | 1 | -3/+6 | ||
| | ||||||
* | make ssh -Wshadow clean, no functional changes | 2004-06-21 | 1 | -5/+5 | ||
| | | | | markus@ ok | |||||
* | improve some code lint did not like; djm millert ok | 2004-05-11 | 1 | -5/+11 | ||
| | ||||||
* | missing buffer_free(&encrypted); #662; zardoz at users.sf.net | 2003-09-18 | 1 | -1/+2 | ||
| | ||||||
* | cast some types for printing; ok markus@ | 2003-05-24 | 1 | -2/+2 | ||
| | ||||||
* | change key_load_public to try to read a public from: | 2003-05-11 | 1 | -1/+10 | ||
| | | | | | | rsa1 private or rsa1 public and ssh2 keys. this makes ssh-keygen -e fail for ssh1 keys more gracefully for example; report from itojun (netbsd pr 20550). | |||||
* | move RSA_blinding_on to generic key load method | 2003-03-13 | 1 | -1/+12 | ||
| | ||||||
* | lseek(2) may return -1 when getting the public/private key lenght. | 2002-11-15 | 1 | -5/+16 | ||
| | | | | | | Simplify the code and check for errors using fstat(2). Problem reported by Mauricio Sanchez, markus@ ok. | |||||
* | cat to (void) when output from buffer_get_X is ignored | 2002-06-24 | 1 | -3/+3 | ||
| | ||||||
* | add /usr/libexec/ssh-keysign: a setuid helper program for hostbased authentication | 2002-05-23 | 1 | -2/+2 | ||
| | | | | in protocol v2 (needs to access the hostkeys). | |||||
* | add some const EVP_MD for openssl-0.9.7 | 2002-02-28 | 1 | -2/+2 | ||
| | ||||||
* | signed vs. unsigned: make size arguments u_int, ok stevesk@ | 2002-02-24 | 1 | -2/+2 | ||
| | ||||||
* | hide some more implementation details of cipher.[ch] and prepares for move | 2002-02-14 | 1 | -12/+14 | ||
| | | | | to EVP, ok deraadt@ | |||||
* | remove unneeded casts and some char->u_char cleanup; ok markus@ | 2001-12-29 | 1 | -7/+7 | ||
| | ||||||
* | missing include | 2001-12-27 | 1 | -1/+2 | ||
| | ||||||
* | call fatal() for openssl allocation failures | 2001-12-27 | 1 | -14/+2 | ||
| | ||||||
* | change the buffer/packet interface to use void* vs. char*; ok markus@ | 2001-12-19 | 1 | -5/+5 | ||
| |