summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshkey.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* highly polished whitespace, mostly fixing spaces-for-tab and baddjm2021-04-031-11/+11
* fix memleaks in private key deserialisation; enforce more consistencydjm2021-02-021-1/+20
* move check_host_cert() from sshconnect,c to sshkey.c and refactordjm2021-01-261-4/+35
* Make output buffer larger to prevent potential truncation warnings fromdtucker2021-01-151-2/+2
* Adapt XMSS to new logging infrastructure. With markus@, ok djm@.dtucker2020-10-191-5/+5
* support for user-verified FIDO keysdjm2020-08-271-9/+11
* only call sshkey_xmss_init() once for KEY_XMSS_CERT; ok djmmarkus2020-06-241-2/+4
* Add support for FIDO webauthn (verification only). webauthn is adjm2020-06-221-1/+3
* Refactor private key parsing. Eliminates a fair bit of duplicateddjm2020-04-111-147/+40
* add sshkey_parse_pubkey_from_private_fileblob_type()djm2020-04-081-1/+65
* simplify sshkey_parse_private_fileblob_type()djm2020-04-081-16/+5
* check private key type against requested key type in new-style privatedjm2020-04-081-1/+7
* check that pubkey in private key envelope matches actual private keydjm2020-04-081-8/+19
* refactor private key parsing a littledjm2020-04-081-40/+114
* sshkey_cert_check_authority requires reason to be set; ok djmmarkus2020-03-061-3/+3
* passphrase depends on kdfname, not ciphername (possible null-deref);markus2020-03-061-8/+8
* change explicit_bzero();free() to freezero()jsg2020-02-261-29/+15
* fix ssh-keygen not displaying authenticator touch prompt;djm2020-01-211-1/+4
* SK API and sk-helper error/PIN passingdjm2019-12-301-2/+2
* use ssh-sk-helper for all security key signing operationsdjm2019-12-131-8/+5
* Add new structure for signature optionsdjm2019-11-251-5/+14
* fix a bug that prevented serialisation of ed25519-sk keysdjm2019-11-181-1/+2
* fix bug that prevented certification of ed25519-sk keysdjm2019-11-181-1/+7
* remove most uses of BN_CTXdjm2019-11-151-57/+33
* in order to be able to figure out the number of signatures left onmarkus2019-11-131-1/+6
* fix shield/unshield for xmss keys:markus2019-11-131-2/+2
* enable ed25519 support; ok djmmarkus2019-11-121-1/+153
* implement sshsk_ed25519_inner_sig(); ok djmmarkus2019-11-121-1/+6
* rename sshsk_ecdsa_sign() to sshsk_sign(); ok djmmarkus2019-11-121-3/+3
* implement ssh-ed25519-sk verification; ok djm@markus2019-11-121-1/+5
* Refactor signing - use sshkey_sign for everything, including the newdjm2019-10-311-8/+18
* Initial infrastructure for U2F/FIDO supportdjm2019-10-311-26/+179
* fix an unreachable integer overflow similar to the XMSS case, and somedjm2019-10-091-4/+22
* fixes for !WITH_OPENSSL compilation; ok dtucker@djm2019-09-061-1/+5
* make get_sigtype public as sshkey_get_sigtype(); ok markus@djm2019-09-031-7/+7
* remove mostly vestigal uuencode.[ch]; moving the only uniquedjm2019-07-161-20/+7
* support PKCS8 as an optional format for storage of private keys,djm2019-07-151-21/+55
* Remove some set but never used variables. ok daraadt@dtucker2019-07-071-4/+2
* fix NULL deference (bzero) on error path added in last commit;djm2019-06-271-2/+2
* fix mismatch proto/decl from key shielding change; spotted via oss-fuzzdjm2019-06-231-2/+2
* Add protection for private keys at rest in RAM against speculationdjm2019-06-211-17/+282
* When signing certificates with an RSA key, default to using thedjm2019-05-201-1/+8
* Wrap XMSS including in ifdef. Patch from markus at blueflash.cc, ok djmdtucker2019-05-031-2/+4
* Make sshpkt_get_bignum2() allocate the bignum it is parsing ratherdjm2019-01-211-70/+26
* typo in plain RSA algorithm counterpart names for certificates;djm2018-10-111-3/+3
* Treat all PEM_read_bio_PrivateKey() errors when a passphrase is specifieddjm2018-10-091-2/+11
* garbage-collect moribund ssh_new_private() API.djm2018-09-141-17/+6
* hold our collective noses and use the openssl-1.1.x API in OpenSSH;djm2018-09-131-289/+331
* add sshkey_check_cert_sigtype() that checks a cert->signature_typedjm2018-09-121-1/+22
* add cert->signature_type field and keep it in sync with certificatedjm2018-09-121-26/+67