summaryrefslogtreecommitdiff
path: root/ssh-keygen.c
Commit message (Expand)AuthorAgeFilesLines
* upstream: sync ssh-keygen.1 and ssh-keygen's usage() with eachnaddy@openbsd.org2020-01-211-6/+5
* upstream: Extends the SK API to accept a set of key/value optionsdjm@openbsd.org2020-01-061-12/+27
* upstream: ability to download FIDO2 resident keys from a token viadjm@openbsd.org2020-01-031-61/+163
* upstream: Remove the -x option currently used fordjm@openbsd.org2019-12-301-23/+22
* upstream: translate and return error codes; retry on bad PINdjm@openbsd.org2019-12-301-11/+21
* upstream: SK API and sk-helper error/PIN passingdjm@openbsd.org2019-12-301-2/+2
* upstream: basic support for generating FIDO2 resident keysdjm@openbsd.org2019-12-301-1/+3
* upstream: remove single-letter flags for moduli optionsdjm@openbsd.org2019-12-301-99/+150
* upstream: prepare for use of ssh-keygen -O flag beyond certsdjm@openbsd.org2019-12-301-3/+8
* remove a bunch of ENABLE_SK #ifdefsDamien Miller2019-12-141-4/+0
* upstream: when acting as a CA and using a security key as the CAdjm@openbsd.org2019-12-111-4/+16
* upstream: Print a key touch reminder when generating a securitydjm@openbsd.org2019-11-251-1/+6
* upstream: allow "ssh-keygen -x no-touch-required" when generating adjm@openbsd.org2019-11-251-13/+15
* upstream: add a "no-touch-required" option for authorized_keys anddjm@openbsd.org2019-11-251-8/+17
* upstream: Add new structure for signature optionsdjm@openbsd.org2019-11-251-3/+10
* upstream: more missing mentions of ed25519-sk; ok djm@naddy@openbsd.org2019-11-201-2/+2
* upstream: additional missing stdarg.h includes when built withoutnaddy@openbsd.org2019-11-201-1/+1
* upstream: Fix incorrect error message when key certification failsdjm@openbsd.org2019-11-181-2/+2
* upstream: allow *-sk key types to be turned into certificatesdjm@openbsd.org2019-11-181-4/+2
* upstream: missing break in getopt switch; spotted by Sebastian Kinnedjm@openbsd.org2019-11-181-1/+2
* upstream: directly support U2F/FIDO2 security keys in OpenSSH bydjm@openbsd.org2019-11-151-1/+6
* upstream: security keys typically need to be tapped/touched indjm@openbsd.org2019-11-131-3/+11
* Remove leftover if statement from sync.Darren Tucker2019-11-131-1/+0
* upstream: enable ed25519 support; ok djmmarkus@openbsd.org2019-11-131-7/+18
* upstream: duplicate 'x' character in getopt(3) optstringdjm@openbsd.org2019-11-111-2/+2
* upstream: Fill in missing man page bits for U2F security key support:naddy@openbsd.org2019-11-081-2/+3
* autoconf pieces for U2F supportDamien Miller2019-11-011-1/+9
* upstream: fix -Wshadow warningdjm@openbsd.org2019-11-011-2/+2
* upstream: Refactor signing - use sshkey_sign for everything,djm@openbsd.org2019-11-011-7/+11
* upstream: ssh-keygen support for generating U2F/FIDO keysdjm@openbsd.org2019-11-011-6/+35
* upstream: free buf before return; reported by krishnaiah bommudjm@openbsd.org2019-10-161-1/+2
* wrap stdint.h include in HAVE_STDINT_HDamien Miller2019-10-091-1/+3
* upstream: use a more common options order in SYNOPSIS and syncjmc@openbsd.org2019-10-041-17/+17
* upstream: thinko in previous; spotted by Mantasdjm@openbsd.org2019-10-021-2/+2
* upstream: ban empty namespace strings for sdjm@openbsd.org2019-10-021-2/+2
* upstream: group and sort single letter options; ok deraadtjmc@openbsd.org2019-10-011-4/+4
* upstream: identity_file[] should be PATH_MAX, not the arbitraryderaadt@openbsd.org2019-10-011-2/+2
* upstream: Allow testing signature syntax and validity without verifyingdjm@openbsd.org2019-09-161-7/+23
* upstream: key conversion should fail for !openssl builds, not falldjm@openbsd.org2019-09-081-2/+5
* upstream: fixes for !WITH_OPENSSL compilation; ok dtucker@djm@openbsd.org2019-09-061-1/+1
* upstream: lots of things were relying on libcrypto headers todjm@openbsd.org2019-09-061-1/+2
* upstream: repair typo and editing mishapnaddy@openbsd.org2019-09-051-2/+2
* upstream: sshsig tweaks and improvements from and suggested bydjm@openbsd.org2019-09-031-5/+5
* upstream: sshsig: lightweight signature and verification abilitydjm@openbsd.org2019-09-031-4/+321
* upstream: factor out confirm_overwrite(); ok markus@djm@openbsd.org2019-09-031-11/+27
* upstream: constify an argumentdjm@openbsd.org2019-09-031-2/+2
* upstream: print comment when printing pubkey from privatedjm@openbsd.org2019-09-021-7/+13
* upstream: Allow the maximimum uint32 value for the argument passed todtucker@openbsd.org2019-08-081-4/+5
* upstream: Many key types are supported now, so take care to checknaddy@openbsd.org2019-08-081-13/+15
* upstream: Accept the verbose flag when searching for host keys in knowndjm@openbsd.org2019-07-191-2/+10