summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshkey.h (follow)
Commit message (Expand)AuthorAgeFilesLines
* add sshkey_parse_pubkey_from_private_fileblob_type()djm2020-04-081-1/+3
* SK API and sk-helper error/PIN passingdjm2019-12-301-9/+1
* implement loading of resident keys in ssh-sk-helperdjm2019-12-301-1/+2
* perform security key enrollment via ssh-sk-helper too. This meansdjm2019-12-131-2/+6
* use ssh-sk-helper for all security key signing operationsdjm2019-12-131-1/+4
* Add new structure for signature optionsdjm2019-11-251-4/+14
* fix shield/unshield for xmss keys:markus2019-11-131-4/+5
* enable ed25519 support; ok djmmarkus2019-11-121-3/+4
* implement ssh-ed25519-sk verification; ok djm@markus2019-11-121-1/+6
* Refactor signing - use sshkey_sign for everything, including the newdjm2019-10-311-5/+6
* Initial infrastructure for U2F/FIDO supportdjm2019-10-311-1/+18
* make get_sigtype public as sshkey_get_sigtype(); ok markus@djm2019-09-031-1/+2
* support PKCS8 as an optional format for storage of private keys,djm2019-07-151-2/+9
* Add protection for private keys at rest in RAM against speculationdjm2019-06-211-6/+15
* add support for ECDSA keys in PKCS#11 tokensdjm2019-01-201-1/+2
* garbage-collect moribund ssh_new_private() API.djm2018-09-141-2/+1
* hold our collective noses and use the openssl-1.1.x API in OpenSSH;djm2018-09-131-5/+4
* add sshkey_check_cert_sigtype() that checks a cert->signature_typedjm2018-09-121-1/+2
* add cert->signature_type field and keep it in sync with certificatedjm2018-09-121-1/+2
* some finesse to fix RSA-SHA2 certificate authentication for certsdjm2018-07-031-1/+2
* Improve strictness and control over RSA-SHA2 signature types:djm2018-07-031-2/+2
* Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures)markus2018-02-231-1/+34
* pass negotiated signing algorithm though to sshkey_verify() anddjm2017-12-181-3/+4
* sshkey_sigtype() function to return the type of a signature;djm2017-12-181-1/+2
* remove post-SSHv1 removal dead code from rsa.c and merge thedjm2017-07-011-1/+4
* Allow ssh-keygen to use a key held in ssh-agent as a CA when signingdjm2017-06-281-2/+8
* missing prototype.djm2017-06-131-1/+2
* Refuse RSA keys <1024 bits in length. Improve reporting for keys thatdjm2017-05-071-2/+2
* remove miscellaneous SSH1 leftovers; ok markus@naddy2017-05-031-3/+1
* remove KEY_RSA1djm2017-04-301-2/+1
* fix regression in 7.4 server-sig-algs, where we were accidentallydjm2017-03-101-2/+2
* list all supported signature algorithms in the server-sig-algsdjm2016-09-121-2/+2
* support SHA256 and SHA512 RSA signatures in certificates;djm2016-05-021-2/+2
* implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)markus2015-12-041-6/+6
* move the certificate validity formatting code to sshkey.[ch]djm2015-11-191-1/+3
* - Fix error message: passphrase needs to be at least 5 characters, not 4.tim2015-09-131-3/+2
* backout SSH_RSA_MINIMUM_MODULUS_SIZE increase for this release;djm2015-08-041-2/+2
* another SSH_RSA_MINIMUM_MODULUS_SIZE that needed crankingdjm2015-07-031-2/+2
* delete support for legacy v00 certificates; "sure" markus@ dtucker@djm2015-07-031-5/+2
* refactor: split base64 encoding of pubkey into its owndjm2015-05-211-1/+2
* small refactor and add some convenience functions;djm2015-01-261-3/+6
* add sshd_config HostbasedAcceptedKeyTypes and PubkeyAcceptedKeyTypesdjm2015-01-131-2/+2
* deprecate key_load_private_pem() and sshkey_load_private_pem()djm2015-01-081-3/+1
* Add FingerprintHash option to control algorithm used for keydjm2014-12-211-9/+7
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-0/+222