summaryrefslogtreecommitdiff
path: root/sshkey.c
Commit message (Expand)AuthorAgeFilesLines
* polish whitespace for portable filesDamien Miller2021-04-031-2/+2
* upstream: highly polished whitespace, mostly fixing spaces-for-tabdjm@openbsd.org2021-04-031-11/+11
* upstream: fix memleaks in private key deserialisation; enforce moredjm@openbsd.org2021-02-051-1/+20
* upstream: move check_host_cert() from sshconnect,c to sshkey.c anddjm@openbsd.org2021-01-261-4/+35
* upstream: Make output buffer larger to prevent potential truncationdtucker@openbsd.org2021-01-181-2/+2
* upstream: Adapt XMSS to new logging infrastructure. With markus@, okdtucker@openbsd.org2020-10-201-5/+5
* upstream: support for user-verified FIDO keysdjm@openbsd.org2020-08-271-9/+11
* upstream: only call sshkey_xmss_init() once for KEY_XMSS_CERT; okmarkus@openbsd.org2020-06-261-2/+4
* upstream: Add support for FIDO webauthn (verification only).djm@openbsd.org2020-06-221-1/+3
* upstream: Refactor private key parsing. Eliminates a fair bit ofdjm@openbsd.org2020-04-111-147/+40
* upstream: add sshkey_parse_pubkey_from_private_fileblob_type()djm@openbsd.org2020-04-081-1/+65
* upstream: simplify sshkey_parse_private_fileblob_type()djm@openbsd.org2020-04-081-16/+5
* upstream: check private key type against requested key type indjm@openbsd.org2020-04-081-1/+7
* upstream: check that pubkey in private key envelope matches actualdjm@openbsd.org2020-04-081-8/+19
* upstream: refactor private key parsing a littledjm@openbsd.org2020-04-081-40/+114
* upstream: sshkey_cert_check_authority requires reason to be set;markus@openbsd.org2020-03-131-3/+3
* upstream: passphrase depends on kdfname, not ciphername (possiblemarkus@openbsd.org2020-03-131-8/+8
* upstream: change explicit_bzero();free() to freezero()jsg@openbsd.org2020-02-281-29/+15
* upstream: fix ssh-keygen not displaying authenticator touchdjm@openbsd.org2020-01-211-1/+4
* upstream: SK API and sk-helper error/PIN passingdjm@openbsd.org2019-12-301-2/+2
* remove a bunch of ENABLE_SK #ifdefsDamien Miller2019-12-141-4/+0
* upstream: use ssh-sk-helper for all security key signing operationsdjm@openbsd.org2019-12-141-10/+5
* upstream: Add new structure for signature optionsdjm@openbsd.org2019-11-251-5/+14
* upstream: fix a bug that prevented serialisation of ed25519-sk keysdjm@openbsd.org2019-11-181-1/+2
* upstream: fix bug that prevented certification of ed25519-sk keysdjm@openbsd.org2019-11-181-1/+7
* Move ifdef OPENSSL_HAS_ECC.Darren Tucker2019-11-181-1/+1
* upstream: remove most uses of BN_CTXdjm@openbsd.org2019-11-171-59/+33
* upstream: in order to be able to figure out the number ofmarkus@openbsd.org2019-11-151-1/+6
* upstream: fix shield/unshield for xmss keys: - in ssh-agent we needmarkus@openbsd.org2019-11-151-2/+2
* Put sshsk_sign call inside ifdef ENABLE_SK.Darren Tucker2019-11-141-0/+2
* upstream: enable ed25519 support; ok djmmarkus@openbsd.org2019-11-131-1/+153
* upstream: implement sshsk_ed25519_inner_sig(); ok djmmarkus@openbsd.org2019-11-131-1/+6
* upstream: rename sshsk_ecdsa_sign() to sshsk_sign(); ok djmmarkus@openbsd.org2019-11-131-3/+3
* upstream: implement ssh-ed25519-sk verification; ok djm@markus@openbsd.org2019-11-131-1/+5
* conditionalise SK sign/verify on ENABLE_SKDamien Miller2019-11-011-0/+4
* upstream: Refactor signing - use sshkey_sign for everything,djm@openbsd.org2019-11-011-8/+18
* upstream: Initial infrastructure for U2F/FIDO supportdjm@openbsd.org2019-11-011-26/+179
* upstream: fix an unreachable integer overflow similar to the XMSSdjm@openbsd.org2019-10-091-4/+22
* needs time.h for --without-opensslDamien Miller2019-09-081-0/+1
* upstream: fixes for !WITH_OPENSSL compilation; ok dtucker@djm@openbsd.org2019-09-061-1/+1
* upstream: make get_sigtype public as sshkey_get_sigtype(); okdjm@openbsd.org2019-09-031-7/+7
* upstream: remove mostly vestigal uuencode.[ch]; moving the only uniquedjm@openbsd.org2019-07-161-20/+7
* upstream: support PKCS8 as an optional format for storage ofdjm@openbsd.org2019-07-151-22/+56
* upstream: Remove some set but never used variables. ok daraadt@dtucker@openbsd.org2019-07-081-4/+2
* upstream: fix NULL deference (bzero) on errdjm@openbsd.org2019-06-281-2/+2
* upstream: fix mismatch proto/decl from key shielding change; spotteddjm@openbsd.org2019-06-231-2/+2
* upstream: Add protection for private keys at rest in RAM againstdjm@openbsd.org2019-06-211-17/+282
* upstream: When signing certificates with an RSA key, default todjm@openbsd.org2019-05-201-1/+8
* upstream: Wrap XMSS including in ifdef. Patch from markus atdtucker@openbsd.org2019-05-081-2/+4
* upstream: Make sshpkt_get_bignum2() allocate the bignum it isdjm@openbsd.org2019-01-211-70/+26