summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/key.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* update to new API (key_fingerprint => sshkey_fingerprint)djm2015-01-281-18/+1
* Reduce use of <sys/param.h> and transition to <limits.h> throughout.deraadt2015-01-201-2/+2
* deprecate key_load_private_pem() and sshkey_load_private_pem()djm2015-01-081-23/+2
* Add FingerprintHash option to control algorithm used for keydjm2014-12-211-4/+3
* key_in_file() wrapper is no longer useddjm2014-12-041-15/+1
* Prevent spam from key_load_private_pem during hostbased auth. ok djm@dtucker2014-07-221-2/+5
* silence "incorrect passphrase" error spam; reported and ok dtucker@djm2014-07-171-3/+5
* downgrade more error() to debug() to better match what old authfile.cdjm2014-07-091-6/+11
* suppress spurious error message when loading key with a passphrase;djm2014-06-301-2/+3
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-2437/+289
* make compiling against OpenSSL optional (make OPENSSL=no);markus2014-04-291-23/+97
* convert memset of potentially-private data to explicit_bzero()djm2014-02-021-6/+6
* Introduce digest API and use it to perform all hashing operationsdjm2014-01-091-20/+20
* to make sure we don't omit any key types as valid CA keys again,djm2013-12-291-7/+17
* correct comment for key_drop_cert()djm2013-12-291-2/+2
* correct comment for key_to_certified()djm2013-12-291-2/+2
* allow ed25519 keys to appear as certificate authoritiesdjm2013-12-291-2/+3
* set k->cert = NULL after freeing itdjm2013-12-071-1/+2
* support ed25519 keys (hostkeys and user identities) using the public domainmarkus2013-12-061-25/+169
* new private key format, bcrypt as KDF by default; details in PROTOCOL.key;markus2013-12-061-1/+2
* move private key (de)serialization to key.c; ok djmmarkus2013-12-061-1/+184
* make key_to_blob() return a NULL blob on failure; part ofdjm2013-12-021-1/+5
* fix potential stack exhaustion caused by nested certificates;djm2013-10-291-16/+29
* Standardise logging of supplemental information during userauth. Keysdjm2013-05-191-2/+2
* bye, bye xfree(); ok markus@djm2013-05-171-33/+24
* memleak in cert_free(), wasn't actually freeing the struct;djm2013-05-101-1/+2
* add the ability to query supported ciphers, MACs, key type and KEXdjm2013-04-191-116/+97
* add support for Key Revocation Lists (KRLs). These are a compact way todjm2013-01-171-15/+25
* add support for RFC6594 SSHFP DNS records for ECDSA key types.djm2012-05-231-1/+4
* remove explict search for \0 in packet strings, this job is now donedjm2011-10-181-6/+1
* fatal() if asked to generate a legacy ECDSA cert (these don't exist)djm2011-05-171-1/+4
* fix uninitialised nonce variable; reported by Mateusz Kocielskidjm2011-02-041-4/+3
* use only libcrypto APIs that are retained with OPENSSL_NO_DEPRECATED.djm2010-11-101-9/+17
* fix a possible NULL deref on loading a corrupt ECDH keydjm2010-10-281-9/+22
* ECDH/ECDSA compliance fix: these methods vary the hash function they usedjm2010-09-091-12/+35
* Implement Elliptic Curve Cryptography modes for key exchange (ECDH) anddjm2010-08-311-15/+526
* Add buffer_get_cstring() and related functions that verify that thedjm2010-08-311-9/+4
* s/timing_safe_cmp/timingsafe_bcmp/gdjm2010-07-131-2/+2
* implement a timing_safe_cmp() function to compare memory without leakingdjm2010-07-131-2/+3
* add some optional indirection to matching of principal names listeddjm2010-05-071-2/+2
* revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with thedjm2010-04-161-31/+146
* also print certificate type (user or host) for ssh-keygen -Lstevesk2010-03-151-1/+14
* use buffer_get_string_ptr_ret() where we are checking the returndjm2010-03-041-3/+3
* reject strings with embedded ASCII nul chars in certificate key IDs,djm2010-03-031-13/+23
* Add support for certificate key types for users and hosts.djm2010-02-261-34/+561
* Ignore and log any Protocol 1 keys where the claimed size is not equal todtucker2010-01-131-1/+7
* switch from 35 to the more common value of RSA_F4 == (2**16)+1 == 65537markus2009-12-111-2/+2
* typo in error message; ok djm@stevesk2008-10-101-2/+2
* In random art visualization, make sure to use the end marker only at thegrunk2008-07-251-2/+3
* /*NOTREACHED*/ for lint warning:stevesk2008-07-071-1/+2