index
:
delta/openssh-git.git
IBS
PRIVSEP
V_2_5_2
V_2_9_9
V_2_9_P1
V_3_0_2
V_3_2_3
V_3_3
V_3_5
V_3_6
V_3_6_1
V_3_7
V_3_8
V_3_8_1
V_3_9
V_4_0
V_4_1
V_4_2
V_4_3
V_4_4
V_4_5
V_4_6
V_4_7
V_4_9
V_5_3
V_5_4
V_5_6
V_5_8
V_5_9
V_6_0
V_6_2
V_6_3
V_6_4
V_6_5
V_6_6
V_6_7
V_6_8
V_6_9
V_7_0
V_7_1
V_7_2
V_7_3
V_7_4
V_7_5
V_7_6
V_7_7
V_7_8
V_7_9
V_8_0
V_8_1
V_8_2
V_8_3
V_8_4
V_8_5
V_8_6
V_8_7
V_8_8
V_8_9
V_9_0
V_9_1
V_9_2
V_9_3
baserock/6.7-musl
baserock/morph
baserock/tiagogomes/armv8l64
master
anongit.mindrot.org: openssh.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
sshkey.c
Commit message (
Expand
)
Author
Age
Files
Lines
*
polish whitespace for portable files
Damien Miller
2021-04-03
1
-2
/
+2
*
upstream: highly polished whitespace, mostly fixing spaces-for-tab
djm@openbsd.org
2021-04-03
1
-11
/
+11
*
upstream: fix memleaks in private key deserialisation; enforce more
djm@openbsd.org
2021-02-05
1
-1
/
+20
*
upstream: move check_host_cert() from sshconnect,c to sshkey.c and
djm@openbsd.org
2021-01-26
1
-4
/
+35
*
upstream: Make output buffer larger to prevent potential truncation
dtucker@openbsd.org
2021-01-18
1
-2
/
+2
*
upstream: Adapt XMSS to new logging infrastructure. With markus@, ok
dtucker@openbsd.org
2020-10-20
1
-5
/
+5
*
upstream: support for user-verified FIDO keys
djm@openbsd.org
2020-08-27
1
-9
/
+11
*
upstream: only call sshkey_xmss_init() once for KEY_XMSS_CERT; ok
markus@openbsd.org
2020-06-26
1
-2
/
+4
*
upstream: Add support for FIDO webauthn (verification only).
djm@openbsd.org
2020-06-22
1
-1
/
+3
*
upstream: Refactor private key parsing. Eliminates a fair bit of
djm@openbsd.org
2020-04-11
1
-147
/
+40
*
upstream: add sshkey_parse_pubkey_from_private_fileblob_type()
djm@openbsd.org
2020-04-08
1
-1
/
+65
*
upstream: simplify sshkey_parse_private_fileblob_type()
djm@openbsd.org
2020-04-08
1
-16
/
+5
*
upstream: check private key type against requested key type in
djm@openbsd.org
2020-04-08
1
-1
/
+7
*
upstream: check that pubkey in private key envelope matches actual
djm@openbsd.org
2020-04-08
1
-8
/
+19
*
upstream: refactor private key parsing a little
djm@openbsd.org
2020-04-08
1
-40
/
+114
*
upstream: sshkey_cert_check_authority requires reason to be set;
markus@openbsd.org
2020-03-13
1
-3
/
+3
*
upstream: passphrase depends on kdfname, not ciphername (possible
markus@openbsd.org
2020-03-13
1
-8
/
+8
*
upstream: change explicit_bzero();free() to freezero()
jsg@openbsd.org
2020-02-28
1
-29
/
+15
*
upstream: fix ssh-keygen not displaying authenticator touch
djm@openbsd.org
2020-01-21
1
-1
/
+4
*
upstream: SK API and sk-helper error/PIN passing
djm@openbsd.org
2019-12-30
1
-2
/
+2
*
remove a bunch of ENABLE_SK #ifdefs
Damien Miller
2019-12-14
1
-4
/
+0
*
upstream: use ssh-sk-helper for all security key signing operations
djm@openbsd.org
2019-12-14
1
-10
/
+5
*
upstream: Add new structure for signature options
djm@openbsd.org
2019-11-25
1
-5
/
+14
*
upstream: fix a bug that prevented serialisation of ed25519-sk keys
djm@openbsd.org
2019-11-18
1
-1
/
+2
*
upstream: fix bug that prevented certification of ed25519-sk keys
djm@openbsd.org
2019-11-18
1
-1
/
+7
*
Move ifdef OPENSSL_HAS_ECC.
Darren Tucker
2019-11-18
1
-1
/
+1
*
upstream: remove most uses of BN_CTX
djm@openbsd.org
2019-11-17
1
-59
/
+33
*
upstream: in order to be able to figure out the number of
markus@openbsd.org
2019-11-15
1
-1
/
+6
*
upstream: fix shield/unshield for xmss keys: - in ssh-agent we need
markus@openbsd.org
2019-11-15
1
-2
/
+2
*
Put sshsk_sign call inside ifdef ENABLE_SK.
Darren Tucker
2019-11-14
1
-0
/
+2
*
upstream: enable ed25519 support; ok djm
markus@openbsd.org
2019-11-13
1
-1
/
+153
*
upstream: implement sshsk_ed25519_inner_sig(); ok djm
markus@openbsd.org
2019-11-13
1
-1
/
+6
*
upstream: rename sshsk_ecdsa_sign() to sshsk_sign(); ok djm
markus@openbsd.org
2019-11-13
1
-3
/
+3
*
upstream: implement ssh-ed25519-sk verification; ok djm@
markus@openbsd.org
2019-11-13
1
-1
/
+5
*
conditionalise SK sign/verify on ENABLE_SK
Damien Miller
2019-11-01
1
-0
/
+4
*
upstream: Refactor signing - use sshkey_sign for everything,
djm@openbsd.org
2019-11-01
1
-8
/
+18
*
upstream: Initial infrastructure for U2F/FIDO support
djm@openbsd.org
2019-11-01
1
-26
/
+179
*
upstream: fix an unreachable integer overflow similar to the XMSS
djm@openbsd.org
2019-10-09
1
-4
/
+22
*
needs time.h for --without-openssl
Damien Miller
2019-09-08
1
-0
/
+1
*
upstream: fixes for !WITH_OPENSSL compilation; ok dtucker@
djm@openbsd.org
2019-09-06
1
-1
/
+1
*
upstream: make get_sigtype public as sshkey_get_sigtype(); ok
djm@openbsd.org
2019-09-03
1
-7
/
+7
*
upstream: remove mostly vestigal uuencode.[ch]; moving the only unique
djm@openbsd.org
2019-07-16
1
-20
/
+7
*
upstream: support PKCS8 as an optional format for storage of
djm@openbsd.org
2019-07-15
1
-22
/
+56
*
upstream: Remove some set but never used variables. ok daraadt@
dtucker@openbsd.org
2019-07-08
1
-4
/
+2
*
upstream: fix NULL deference (bzero) on err
djm@openbsd.org
2019-06-28
1
-2
/
+2
*
upstream: fix mismatch proto/decl from key shielding change; spotted
djm@openbsd.org
2019-06-23
1
-2
/
+2
*
upstream: Add protection for private keys at rest in RAM against
djm@openbsd.org
2019-06-21
1
-17
/
+282
*
upstream: When signing certificates with an RSA key, default to
djm@openbsd.org
2019-05-20
1
-1
/
+8
*
upstream: Wrap XMSS including in ifdef. Patch from markus at
dtucker@openbsd.org
2019-05-08
1
-2
/
+4
*
upstream: Make sshpkt_get_bignum2() allocate the bignum it is
djm@openbsd.org
2019-01-21
1
-70
/
+26
[next]