summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshkey.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* When signing certificates with an RSA key, default to using thedjm2019-05-201-1/+8
* Wrap XMSS including in ifdef. Patch from markus at blueflash.cc, ok djmdtucker2019-05-031-2/+4
* Make sshpkt_get_bignum2() allocate the bignum it is parsing ratherdjm2019-01-211-70/+26
* typo in plain RSA algorithm counterpart names for certificates;djm2018-10-111-3/+3
* Treat all PEM_read_bio_PrivateKey() errors when a passphrase is specifieddjm2018-10-091-2/+11
* garbage-collect moribund ssh_new_private() API.djm2018-09-141-17/+6
* hold our collective noses and use the openssl-1.1.x API in OpenSSH;djm2018-09-131-289/+331
* add sshkey_check_cert_sigtype() that checks a cert->signature_typedjm2018-09-121-1/+22
* add cert->signature_type field and keep it in sync with certificatedjm2018-09-121-26/+67
* some finesse to fix RSA-SHA2 certificate authentication for certsdjm2018-07-031-4/+4
* Improve strictness and control over RSA-SHA2 signature types:djm2018-07-031-21/+75
* ssh/xmss: fix deserialize for certs; ok djm@markus2018-03-221-1/+6
* refactor sshkey_read() to make it a little more, err, readable.djm2018-03-021-113/+135
* Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures)markus2018-02-231-15/+395
* Some obvious freezero() conversions.jsing2018-02-141-26/+11
* Remove all guards for calls to OpenSSL free functions - all of thesejsing2018-02-071-35/+18
* pass negotiated signing algorithm though to sshkey_verify() anddjm2017-12-181-4/+5
* sshkey_sigtype() function to return the type of a signature;djm2017-12-181-1/+26
* BIO_get_mem_data() is supposed to take a char* as pointer argument,djm2017-10-131-2/+2
* Switch from aes256-cbc to aes256-ctr for encrypting new-styledjm2017-08-121-2/+2
* fix support for unknown key types; ok djm@markus2017-07-191-6/+1
* remove post-SSHv1 removal dead code from rsa.c and merge thedjm2017-07-011-4/+3
* Allow ssh-keygen to use a key held in ssh-agent as a CA when signingdjm2017-06-281-4/+21
* better translate libcrypto errors by looking deeper in the accurseddjm2017-06-091-40/+62
* Switch to recallocarray() for a few operations. Both growth and shrinkagederaadt2017-05-311-3/+4
* make requesting bad ECDSA bits yield the same error (SSH_ERR_KEY_LENGTH)djm2017-05-081-3/+4
* Refuse RSA keys <1024 bits in length. Improve reporting for keys thatdjm2017-05-071-5/+24
* remove KEY_RSA1djm2017-04-301-56/+7
* remove SSHv1 ciphers; ok markus@djm2017-04-301-6/+2
* unifdef WITH_SSH1djm2017-04-301-379/+1
* fix regression in 7.4 server-sig-algs, where we were accidentallydjm2017-03-101-3/+5
* Check for NULL argument to sshkey_read. Patch from jjelen at redhat.comdtucker2017-03-101-1/+4
* ifdef out "rsa1" from the list of supported keytypes when compiled withoutdtucker2017-02-171-1/+3
* bring back r1.34 that was backed out for problems loading public keys:djm2017-02-101-5/+46
* Remove dead breaks, found via opencoverage.net. ok deraadt@dtucker2016-10-241-2/+1
* add a comment about implicitly-expected checks todjm2016-10-041-1/+9
* Avoid a theoretical signed integer overflow should BN_num_bytes()djm2016-09-261-3/+6
* list all supported signature algorithms in the server-sig-algsdjm2016-09-121-3/+3
* Add MAXIMUM(), MINIMUM(), and ROUNDUP() to misc.h, then use those definitionsderaadt2016-09-121-7/+6
* small refactor of cipher.c: make ciphercontext opaque to callersdjm2016-08-031-23/+14
* revert 1.34; causes problems loading public keysdjm2016-06-191-39/+2
* translate OpenSSL error codes to something more meaninful;djm2016-06-171-2/+39
* support SHA256 and SHA512 RSA signatures in certificates;djm2016-05-021-3/+3
* make private key loading functions consistently handle NULLdjm2016-04-091-16/+24
* Remove NULL-checks before sshbuf_free().mmcc2015-12-111-19/+10
* Remove NULL-checks before sshkey_free().mmcc2015-12-111-9/+5
* Remove NULL-checks before free().mmcc2015-12-101-11/+6
* implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)markus2015-12-041-20/+23
* move the certificate validity formatting code to sshkey.[ch]djm2015-11-191-1/+38
* Replace remaining calls to index(3) with strchr(3). OK jca@ krw@millert2015-11-161-3/+3