| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
| |
rsa-sha2-512 signature algorithm. Certificates signed by RSA keys
will therefore be incompatible with OpenSSH < 7.2 unless the default
is overridden.
Document the ability of the ssh-keygen -t flag to override the
signature algorithm when signing certificates, and the new default.
ok deraadt@
|
| |
|
|
|
|
|
|
| |
than make the caller do it. Saves a lot of boilerplate code.
from markus@ ok djm@
|
|
|
|
| |
spotted by Adam Eijdenberg; ok dtucker@
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
as "incorrect passphrase" instead of trying to choose between that and
"invalid format".
libcrypto can return ASN1 parsing errors rather than the expected
decrypt error in certain infrequent cases when trying to decrypt/parse
PEM private keys when supplied with an invalid passphrase.
Report and repro recipe from Thomas Deutschmann in bz#2901
ok markus@
|
| |
|
|
|
|
| |
feedback and ok tb@ jsing@ markus@
|
|
|
|
| |
against a supplied whitelist; ok markus
|
|
|
|
| |
signature wrt loading and certification operations; ok markus@
|
|
|
|
| |
hosted in ssh-agent
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
In ssh, when an agent fails to return a RSA-SHA2 signature when
requested and falls back to RSA-SHA1 instead, retry the signature to
ensure that the public key algorithm sent in the SSH_MSG_USERAUTH
matches the one in the signature itself.
In sshd, strictly enforce that the public key algorithm sent in the
SSH_MSG_USERAUTH message matches what appears in the signature.
Make the sshd_config PubkeyAcceptedKeyTypes and
HostbasedAcceptedKeyTypes options control accepted signature algorithms
(previously they selected supported key types). This allows these
options to ban RSA-SHA1 in favour of RSA-SHA2.
Add new signature algorithms "rsa-sha2-256-cert-v01@openssh.com" and
"rsa-sha2-512-cert-v01@openssh.com" to force use of RSA-SHA2 signatures
with certificate keys.
feedback and ok markus@
|
| |
|
|
|
|
| |
ok markus
|
|
|
|
|
|
|
| |
The code is not compiled in by default (see WITH_XMSS in Makefile.inc)
Joint work with stefan-lukas_gazdag at genua.eu
See https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-signatures-12
ok djm@
|
|
|
|
|
|
| |
This also zeros an ed25519_pk when it was not being zeroed previously.
ok djm@ dtucker@
|
|
|
|
|
|
|
|
|
| |
functions handle NULL, from at least OpenSSL 1.0.1g onwards.
Prompted by dtucker@ asking about guards for RSA_free(), when looking at
openssh-portable pr#84 on github.
ok deraadt@ dtucker@
|
|
|
|
|
| |
check that the negotiated algorithm matches the type in the
signature (only matters for RSA SHA1/SHA2 sigs). ok markus@
|
|
|
|
| |
ok markus@
|
|
|
|
| |
so don't pass it a const char*
|
|
|
|
|
| |
private keys. The latter having the advantage of being supported
for no-OpenSSL builds; bz#2754 ok markus@
|
| |
|
|
|
|
| |
remaining bit that it still used into ssh-rsa.c; ok markus
|
|
|
|
| |
certificates. bz#2377 ok markus
|
|
|
|
|
| |
error stack for codes that indicate the wrong passphrase was supplied
for a PEM key. bz#2699 ok dtucker@
|
|
|
|
|
|
| |
are handled safely, and there also is no need for preallocation dances.
Future changes in this area will be less error prone.
Review and one bug found by markus
|
|
|
|
| |
as the same mistake for RSA/DSA
|
|
|
|
| |
do not meet this requirement. ok markus@
|
|
|
|
| |
ok markus@
|
| |
|
|
|
|
| |
ok markus@
|
|
|
|
|
| |
excluding SHA2 RSA signature methods. bz#2680, patch from Nuno
Goncalves; ok dtucker@
|
|
|
|
| |
via bz#2687, ok djm@
|
|
|
|
| |
SSH1 support. Found by kdunlop at guralp.com, ok djm@
|
|
|
|
|
|
|
|
| |
translate OpenSSL error codes to something more
meaninful; bz#2522 reported by Jakub Jelen, ok dtucker@
with additional fix from Jakub Jelen to solve the backout.
bz#2525 bz#2523 re-ok dtucker@
|
| |
|
|
|
|
| |
sshkey_ec_validate_public()
|
|
|
|
|
|
|
|
| |
ever violate its manpage and return a negative value. Improve
order of tests to avoid confusing increasingly pedantic compilers.
Reported by Guido Vranken from stack (css.csail.mit.edu/stack)
unstable optimisation analyser output. ok deraadt@
|
|
|
|
|
| |
Reported by mb AT smartftp.com in bz#2547 and (independantly)
Ron Frederick; ok markus@
|
|
|
|
|
| |
rather than pulling <sys/param.h> and unknown namespace pollution.
ok djm markus dtucker
|
|
|
|
| |
feedback and ok markus@
|
|
|
|
| |
reported by semarie@
|
|
|
|
| |
bz#2522 reported by Jakub Jelen, ok dtucker@
|
|
|
|
| |
ok markus@
|
|
|
|
| |
key pointer arguments; ok markus@
|
|
|
|
| |
ok djm@
|
|
|
|
| |
ok djm@
|
|
|
|
| |
ok dtucker@
|
|
|
|
|
| |
based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt;
with & ok djm@
|
| |
|
| |
|