summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/krl.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Fix occurrences of "r = func() != 0" which result in the wrong errorjsg2015-09-021-2/+2
| | | | | | codes being returned due to != having higher precedence than =. ok deraadt@ markus@
* delete support for legacy v00 certificates; "sure" markus@ dtucker@djm2015-07-031-5/+5
|
* correct test to sshkey_sign(); spotted by Albert S.djm2015-06-241-2/+2
|
* permit KRLs that revoke certificates by serial number or key IDdjm2015-01-301-38/+64
| | | | without scoping to a particular CA; ok markus@
* small refactor and add some convenience functions;djm2015-01-261-12/+5
| | | | ok markus
* Reduce use of <sys/param.h> and transition to <limits.h> throughout.deraadt2015-01-201-2/+2
| | | | ok djm markus
* fix format strings in (disabled) debuggingdjm2015-01-191-4/+4
|
* string truncation due to sizeof(size)deraadt2015-01-181-2/+2
| | | | ok djm markus
* avoid BIGNUM in KRL code by using a simple bitmap;djm2015-01-141-21/+41
| | | | feedback and ok markus
* sync changes from libopenssh; prepared by markus@djm2015-01-131-50/+48
| | | | | mostly debug output tweaks, a couple of error return value changes and some other minor stuff
* missing error assigment on sshbuf_put_string()markus2015-01-121-3/+3
|
* free->sshkey_free; ok djm@markus2015-01-121-2/+2
|
* deprecate key_load_private_pem() and sshkey_load_private_pem()djm2015-01-081-2/+2
| | | | | | | | | | | | | | | interfaces. Refactor the generic key loading API to not require pathnames to be specified (they weren't really used). Fixes a few other things en passant: Makes ed25519 keys work for hostbased authentication (ssh-keysign previously used the PEM-only routines). Fixes key comment regression bz#2306: key pathnames were being lost as comment fields. ok markus@
* Add FingerprintHash option to control algorithm used for keydjm2014-12-211-3/+5
| | | | | | | fingerprints. Default changes from MD5 to SHA256 and format from hex to base64. Feedback and ok naddy@ markus@
* convert KRL code to new buffer APIdjm2014-12-041-316/+335
| | | | ok markus@
* fix NULL pointer dereference crash on invalid timestampdjm2014-11-211-3/+7
| | | | found using Michal Zalewski's afl fuzzer
* fix KRL generation when multiple CAs are in usedjm2014-11-171-1/+2
| | | | | | | | | | | We would generate an invalid KRL when revoking certs by serial number for multiple CA keys due to a section being written out twice. Also extend the regress test to catch this case by having it produce a multi-CA KRL. Reported by peter AT pean.org
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-4/+4
| | | | | | | | | existing API is offered as a set of wrappers. with and ok markus@ Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew Dempsky and Ron Bowes for a detailed review a few months ago.
* fix bug in KRL generation: multiple consecutive revoked certificatedjm2014-06-241-1/+2
| | | | | | | serial number ranges could be serialised to an invalid format. Readers of a broken KRL caused by this bug will fail closed, so no should-have-been-revoked key will be accepted.
* buffer_get_string_ptr's return should be const to reminddjm2014-04-281-3/+5
| | | | | callers that futzing with it will futz with the actual buffer contents
* replace most bzero with explicit_bzero, except a few that cna be memsettedu2014-01-311-6/+6
| | | | ok djm dtucker
* fix verification error in (as-yet usused) KRL signature checking pathdjm2013-07-201-2/+2
|
* don't leak the rdata blob on errors; ok djm@markus2013-06-201-8/+11
|
* hush some {unused, printf type} warningsdjm2013-04-051-6/+11
|
* Remove bogus include. ok djmdtucker2013-02-191-2/+1
|
* actually use the xrealloc() return value; spotted by xi.wang AT gmail.comdjm2013-01-271-2/+2
|
* redo last commit without the vi-vomit that snuck in:djm2013-01-251-3/+6
| | | | | | skip serial lookup when cert's serial number is zero (now with 100% better comment)
* Revert last. Breaks due to likely typo. Let djm@ fix later.krw2013-01-251-2/+2
| | | | ok djm@ via dlg@
* skip serial lookup when cert's serial number is zerodjm2013-01-241-2/+2
|
* fix handling of (unused) KRL signatures; skip string in correct bufferdjm2013-01-241-2/+2
|
* RB_INSERT does not remove existing elments; ok djm@markus2013-01-191-2/+2
|
* fix KRL generation bug for list sectionsdjm2013-01-181-2/+2
|
* RCD IDs help us keep portable in synchdjm2013-01-181-0/+2
|
* add support for Key Revocation Lists (KRLs). These are a compact way todjm2013-01-171-0/+1223
represent lists of revoked keys and certificates, taking as little as a single bit of incremental cost to revoke a certificate by serial number. KRLs are loaded via the existing RevokedKeys sshd_config option. feedback and ok markus@