summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshkey.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Add support for FIDO webauthn (verification only). webauthn is adjm2020-06-221-1/+3
* Refactor private key parsing. Eliminates a fair bit of duplicateddjm2020-04-111-147/+40
* add sshkey_parse_pubkey_from_private_fileblob_type()djm2020-04-081-1/+65
* simplify sshkey_parse_private_fileblob_type()djm2020-04-081-16/+5
* check private key type against requested key type in new-style privatedjm2020-04-081-1/+7
* check that pubkey in private key envelope matches actual private keydjm2020-04-081-8/+19
* refactor private key parsing a littledjm2020-04-081-40/+114
* sshkey_cert_check_authority requires reason to be set; ok djmmarkus2020-03-061-3/+3
* passphrase depends on kdfname, not ciphername (possible null-deref);markus2020-03-061-8/+8
* change explicit_bzero();free() to freezero()jsg2020-02-261-29/+15
* fix ssh-keygen not displaying authenticator touch prompt;djm2020-01-211-1/+4
* SK API and sk-helper error/PIN passingdjm2019-12-301-2/+2
* use ssh-sk-helper for all security key signing operationsdjm2019-12-131-8/+5
* Add new structure for signature optionsdjm2019-11-251-5/+14
* fix a bug that prevented serialisation of ed25519-sk keysdjm2019-11-181-1/+2
* fix bug that prevented certification of ed25519-sk keysdjm2019-11-181-1/+7
* remove most uses of BN_CTXdjm2019-11-151-57/+33
* in order to be able to figure out the number of signatures left onmarkus2019-11-131-1/+6
* fix shield/unshield for xmss keys:markus2019-11-131-2/+2
* enable ed25519 support; ok djmmarkus2019-11-121-1/+153
* implement sshsk_ed25519_inner_sig(); ok djmmarkus2019-11-121-1/+6
* rename sshsk_ecdsa_sign() to sshsk_sign(); ok djmmarkus2019-11-121-3/+3
* implement ssh-ed25519-sk verification; ok djm@markus2019-11-121-1/+5
* Refactor signing - use sshkey_sign for everything, including the newdjm2019-10-311-8/+18
* Initial infrastructure for U2F/FIDO supportdjm2019-10-311-26/+179
* fix an unreachable integer overflow similar to the XMSS case, and somedjm2019-10-091-4/+22
* fixes for !WITH_OPENSSL compilation; ok dtucker@djm2019-09-061-1/+5
* make get_sigtype public as sshkey_get_sigtype(); ok markus@djm2019-09-031-7/+7
* remove mostly vestigal uuencode.[ch]; moving the only uniquedjm2019-07-161-20/+7
* support PKCS8 as an optional format for storage of private keys,djm2019-07-151-21/+55
* Remove some set but never used variables. ok daraadt@dtucker2019-07-071-4/+2
* fix NULL deference (bzero) on error path added in last commit;djm2019-06-271-2/+2
* fix mismatch proto/decl from key shielding change; spotted via oss-fuzzdjm2019-06-231-2/+2
* Add protection for private keys at rest in RAM against speculationdjm2019-06-211-17/+282
* When signing certificates with an RSA key, default to using thedjm2019-05-201-1/+8
* Wrap XMSS including in ifdef. Patch from markus at blueflash.cc, ok djmdtucker2019-05-031-2/+4
* Make sshpkt_get_bignum2() allocate the bignum it is parsing ratherdjm2019-01-211-70/+26
* typo in plain RSA algorithm counterpart names for certificates;djm2018-10-111-3/+3
* Treat all PEM_read_bio_PrivateKey() errors when a passphrase is specifieddjm2018-10-091-2/+11
* garbage-collect moribund ssh_new_private() API.djm2018-09-141-17/+6
* hold our collective noses and use the openssl-1.1.x API in OpenSSH;djm2018-09-131-289/+331
* add sshkey_check_cert_sigtype() that checks a cert->signature_typedjm2018-09-121-1/+22
* add cert->signature_type field and keep it in sync with certificatedjm2018-09-121-26/+67
* some finesse to fix RSA-SHA2 certificate authentication for certsdjm2018-07-031-4/+4
* Improve strictness and control over RSA-SHA2 signature types:djm2018-07-031-21/+75
* ssh/xmss: fix deserialize for certs; ok djm@markus2018-03-221-1/+6
* refactor sshkey_read() to make it a little more, err, readable.djm2018-03-021-113/+135
* Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures)markus2018-02-231-15/+395
* Some obvious freezero() conversions.jsing2018-02-141-26/+11
* Remove all guards for calls to OpenSSL free functions - all of thesejsing2018-02-071-35/+18