summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh-keygen.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* fix exit status for downloading of FIDO resident keys; fromdjm2020-05-291-4/+4
* avoid possible NULL deref; from Pedro Martellettodjm2020-05-181-3/+5
* preserve group/world read permission on known_hosts file across runs ofdjm2020-05-131-1/+5
* we have a sshkey_save_public() function to save public keys; use itdjm2020-05-021-49/+18
* avoid NULL dereference when attempting to convert invalid ssh.comdjm2020-05-011-4/+5
* fix a bug I introduced in r1.406: when printing private key fingerprintdjm2020-04-201-10/+14
* repair private key fingerprint printing to also print comment afterdjm2020-04-171-9/+8
* give ssh-keygen the ability to dump the contents of a binary keydjm2020-04-031-4/+6
* spelling errors in comments; no code changedjm2020-03-131-2/+2
* when downloading FIDO2 resident keys from a token, don't prompt for a PINdjm2020-03-131-8/+15
* fix use-after-free in do_download_sk; ok djmmarkus2020-03-061-2/+2
* exit if ssh_krl_revoke_key_sha256 fails; ok djmmarkus2020-03-061-1/+4
* no-touch-required certificate option should be an extension, notdjm2020-02-281-2/+2
* change explicit_bzero();free() to freezero()jsg2020-02-261-17/+9
* fix two PIN entry bugs on FIDO keygen: 1) it would allow more than thedjm2020-02-071-6/+12
* Replace "security key" with "authenticator" in program messages.naddy2020-02-061-5/+5
* require FIDO application strings to start with "ssh:"; ok markus@djm2020-02-041-1/+5
* changes to support FIDO attestationdjm2020-01-281-3/+33
* improve the error message for u2f enrollment errors by makingdjm2020-01-251-2/+2
* factor out reading/writing sshbufs to dedicated functions;djm2020-01-251-38/+10
* expose PKCS#11 key labels/X.509 subjects as commentsdjm2020-01-251-5/+9
* minor tweaks to ssh-keygen -Y find-principals:djm2020-01-241-11/+21
* when signing a certificate with an RSA key, default to a safe signaturedjm2020-01-241-5/+9
* allow PEM export of DSA and ECDSA keys; bz3091, patch from Jakub Jelendjm2020-01-241-1/+9
* ssh-keygen -Y find-principals fixes based on feedback from Markus:djm2020-01-231-14/+13
* remove trailing period characters from pub/priv key pathnames -djm2020-01-231-3/+3
* add a new signature operations "find-principal" to look up thedjm2020-01-231-9/+75
* For ssh-keygen -lF only add a space after key fingerprint when there is aclaudio2020-01-221-3/+5
* don't #ifdef out the KRL code when compiling without libcryptodjm2020-01-211-11/+1
* sync ssh-keygen.1 and ssh-keygen's usage() with each other and realitynaddy2020-01-141-6/+5
* Extends the SK API to accept a set of key/value options for alldjm2020-01-061-12/+27
* ability to download FIDO2 resident keys from a token viadjm2020-01-021-60/+162
* Remove the -x option currently used for FIDO/U2F-specific key flags.djm2019-12-301-23/+22
* translate and return error codes; retry on bad PINdjm2019-12-301-9/+19
* SK API and sk-helper error/PIN passingdjm2019-12-301-2/+2
* basic support for generating FIDO2 resident keysdjm2019-12-301-1/+3
* remove single-letter flags for moduli optionsdjm2019-12-301-101/+150
* prepare for use of ssh-keygen -O flag beyond certsdjm2019-12-301-3/+8
* when acting as a CA and using a security key as the CA key, remind thedjm2019-12-101-4/+16
* Print a key touch reminder when generating a security key. Most keysdjm2019-11-251-1/+6
* allow "ssh-keygen -x no-touch-required" when generating a security keydjm2019-11-251-8/+14
* add a "no-touch-required" option for authorized_keys and a similardjm2019-11-251-8/+17
* Add new structure for signature optionsdjm2019-11-251-3/+10
* more missing mentions of ed25519-sk; ok djm@naddy2019-11-181-2/+2
* additional missing stdarg.h includes when built without WITH_OPENSSL; ok djm@naddy2019-11-181-1/+2
* Fix incorrect error message when key certification failsdjm2019-11-181-2/+2
* allow *-sk key types to be turned into certificatesdjm2019-11-181-4/+2
* missing break in getopt switch; spotted by Sebastian Kinnedjm2019-11-181-1/+2
* directly support U2F/FIDO2 security keys in OpenSSH by linkingdjm2019-11-141-1/+4
* security keys typically need to be tapped/touched in order to performdjm2019-11-121-3/+11