summaryrefslogtreecommitdiff
path: root/ssh-keygen.c
Commit message (Expand)AuthorAgeFilesLines
* upstream: Don't omit ssh-keygen -y from usage when built withoutdtucker@openbsd.org2021-07-241-2/+2
* upstream: Exclude key conversion options from usage when builtdtucker@openbsd.org2021-07-241-1/+3
* upstream: Let allowed signers files used by ssh-keygen(1)djm@openbsd.org2021-07-231-8/+50
* upstream: silence redundant error message; reported by Fabian Stelzerdjm@openbsd.org2021-07-091-2/+3
* upstream: Order includes as per style(9). Portable already hasdtucker@openbsd.org2021-07-081-1/+1
* upstream: highly polished whitespace, mostly fixing spaces-for-tabdjm@openbsd.org2021-04-031-8/+8
* upstream: pwcopy() struct passwd that we're going to reuse across adjm@openbsd.org2021-03-131-1/+2
* upstream: load_hostkeys()/hostkeys_foreach() variants for FILE*djm@openbsd.org2020-12-211-2/+2
* upstream: Include cipher.h for declaration of cipher_by_name.dtucker@openbsd.org2020-11-291-1/+2
* upstream: Document ssh-keygen -Z, sanity check its argument earlier anddtucker@openbsd.org2020-11-271-3/+6
* upstream: when requesting a security key touch on stderr, inform thedjm@openbsd.org2020-11-091-2/+2
* Remove preprocessor directive from log macro calls.Darren Tucker2020-11-091-1/+2
* upstream: fix type of nid in type_bits_valid(); github PR#202 fromdjm@openbsd.org2020-10-291-2/+2
* upstream: whitespace; no code changedjm@openbsd.org2020-10-291-2/+2
* upstream: use the new variant log macros instead of prependingdjm@openbsd.org2020-10-181-170/+134
* upstream: when writing an attestation blob for a FIDO key, record alldjm@openbsd.org2020-09-091-17/+27
* upstream: debug()-print a little info about FIDO-specific keydjm@openbsd.org2020-08-271-2/+6
* upstream: Request PIN ahead of time for certain FIDO actionsdjm@openbsd.org2020-08-271-18/+20
* upstream: major rework of FIDO token selection logicdjm@openbsd.org2020-08-271-1/+6
* upstream: support for user-verified FIDO keysdjm@openbsd.org2020-08-271-16/+39
* upstream: ensure that certificate extensions are lexically sorted.djm@openbsd.org2020-08-031-67/+85
* upstream: - Add [-a rounds] in ssh-keygen man page and usage() -solene@openbsd.org2020-07-171-7/+8
* upstream: Defer creation of ~/.ssh by ssh(1) until we attempt todtucker@openbsd.org2020-06-261-17/+4
* upstream: fix exit status for downloading of FIDO resident keys;djm@openbsd.org2020-05-291-4/+4
* upstream: avoid possible NULL deref; from Pedro Martellettodjm@openbsd.org2020-05-271-3/+5
* upstream: preserve group/world read permission on known_hostsdjm@openbsd.org2020-05-271-1/+5
* upstream: we have a sshkey_save_public() function to save public keys;djm@openbsd.org2020-05-021-49/+18
* upstream: avoid NULL dereference when attempting to convert invaliddjm@openbsd.org2020-05-011-4/+5
* upstream: fix a bug I introduced in r1.406: when printing private keydjm@openbsd.org2020-04-201-10/+14
* upstream: repair private key fingerprint printing to also printdjm@openbsd.org2020-04-171-9/+8
* upstream: give ssh-keygen the ability to dump the contents of adjm@openbsd.org2020-04-031-4/+6
* upstream: spelling errors in comments; no code change fromdjm@openbsd.org2020-03-141-2/+2
* upstream: when downloading FIDO2 resident keys from a token, don'tdjm@openbsd.org2020-03-141-8/+15
* upstream: fix use-after-free in do_download_sk; ok djmmarkus@openbsd.org2020-03-131-2/+2
* upstream: exit if ssh_krl_revoke_key_sha256 fails; ok djmmarkus@openbsd.org2020-03-131-1/+4
* upstream: no-touch-required certificate option should be andjm@openbsd.org2020-02-281-2/+2
* upstream: change explicit_bzero();free() to freezero()jsg@openbsd.org2020-02-281-17/+9
* upstream: fix two PIN entry bugs on FIDO keygen: 1) it would allow moredjm@openbsd.org2020-02-071-6/+12
* upstream: Replace "security key" with "authenticator" in programnaddy@openbsd.org2020-02-071-5/+5
* upstream: require FIDO application strings to start with "ssh:"; okdjm@openbsd.org2020-02-041-1/+5
* upstream: changes to support FIDO attestationdjm@openbsd.org2020-01-291-3/+33
* upstream: improve the error message for u2f enrollment errors bydjm@openbsd.org2020-01-261-2/+2
* upstream: factor out reading/writing sshbufs to dedicateddjm@openbsd.org2020-01-261-38/+10
* Put EC key export inside OPENSSL_HAS_ECC.Darren Tucker2020-01-251-0/+2
* upstream: expose PKCS#11 key labels/X.509 subjects as commentsdjm@openbsd.org2020-01-251-5/+9
* upstream: minor tweaks to ssh-keygen -Y find-principals:djm@openbsd.org2020-01-251-11/+21
* upstream: when signing a certificate with an RSA key, default todjm@openbsd.org2020-01-251-5/+9
* upstream: allow PEM export of DSA and ECDSA keys; bz3091, patchdjm@openbsd.org2020-01-251-1/+9
* upstream: ssh-keygen -Y find-principals fixes based on feedbackdjm@openbsd.org2020-01-251-14/+13
* upstream: remove trailing period characters from pub/priv keydjm@openbsd.org2020-01-231-3/+3