summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/key.c
AgeCommit message (Expand)Author
2011-05-17fatal() if asked to generate a legacy ECDSA cert (these don't exist)Damien Miller
2011-02-04fix uninitialised nonce variable; reported by Mateusz KocielskiDamien Miller
2010-11-10use only libcrypto APIs that are retained with OPENSSL_NO_DEPRECATED.Damien Miller
2010-10-28fix a possible NULL deref on loading a corrupt ECDH keyDamien Miller
2010-09-09ECDH/ECDSA compliance fix: these methods vary the hash function they useDamien Miller
2010-08-31Implement Elliptic Curve Cryptography modes for key exchange (ECDH) andDamien Miller
2010-08-31Add buffer_get_cstring() and related functions that verify that theDamien Miller
2010-07-13s/timing_safe_cmp/timingsafe_bcmp/gDamien Miller
2010-07-13implement a timing_safe_cmp() function to compare memory without leakingDamien Miller
2010-05-07add some optional indirection to matching of principal names listedDamien Miller
2010-04-16revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with theDamien Miller
2010-03-15also print certificate type (user or host) for ssh-keygen -LKevin Steves
2010-03-04use buffer_get_string_ptr_ret() where we are checking the returnDamien Miller
2010-03-03reject strings with embedded ASCII nul chars in certificate key IDs,Damien Miller
2010-02-26Add support for certificate key types for users and hosts.Damien Miller
2010-01-13Ignore and log any Protocol 1 keys where the claimed size is not equal toDarren Tucker
2009-12-11switch from 35 to the more common value of RSA_F4 == (2**16)+1 == 65537Markus Friedl
2008-10-10typo in error message; ok djm@Kevin Steves
2008-07-25In random art visualization, make sure to use the end marker only at theAlexander von Gernler
2008-07-07/*NOTREACHED*/ for lint warning:Kevin Steves
2008-06-25add key length to visual fingerprint; zap magical constants;Otto Moerbeek
2008-06-12add my copyright, ok djm@Alexander von Gernler
2008-06-12We already mark the start of the worm, now also mark the end of the wormAlexander von Gernler
2008-06-12supply the key type (rsa1, rsa, dsa) as a caption in the frame of theAlexander von Gernler
2008-06-12use an odd number of rows and columns and a separate start marker, looksOtto Moerbeek
2008-06-11#define statements that are not atoms need braces around them, else theyAlexander von Gernler
2008-06-11simpler way of computing the augmentations; ok grunk@Otto Moerbeek
2008-06-11Introduce SSH Fingerprint ASCII Visualization, a technique inspired by theAlexander von Gernler
2007-07-12Delint: remove some unreachable statements, from Bret Lambert.Ray Lai
2006-11-06add missing checks for openssl return codes; with & ok djm@Markus Friedl
2006-08-03almost entirely get rid of the culture of ".h files that include .h files"Theo de Raadt
2006-08-01move #include <stdio.h> out of includes.hKevin Steves
2006-07-22move #include <string.h> out of includes.hKevin Steves
2006-03-25Put $OpenBSD$ tags back (as comments) to replace the RCSID()s thatDamien Miller
2006-03-25introduce xcalloc() and xasprintf() failure-checked allocations functionsDamien Miller
2006-03-20djm did a typoTheo de Raadt
2006-03-20in a switch (), break after return or goto is stupidTheo de Raadt
2006-03-20(really) last of the Coverity diffs: avoid possible NULL deref inDamien Miller
2006-03-19RCSID() can dieTheo de Raadt
2005-06-17make this -Wsign-compare clean; ok avsm@ markus@Damien Miller
2004-10-29use new buffer API to avoid fatal errors on corrupt keys in authorized_keysDamien Miller
2004-07-28more s/illegal/invalid/Markus Friedl
2003-11-10constify. ok markus@ & djm@Jakob Schlyter
2003-07-09minor tweak: when generating the hex fingerprint, give strlcat the full bound...Anil Madhavapeddy
2003-06-24int -> u_int; ok djm@, deraadt@, mouring@Markus Friedl
2003-05-14add experimental support for verifying hos keys using DNS as describedJakob Schlyter
2003-02-12merge ssh-dss.h ssh-rsa.h into key.h; ok deraadt@Markus Friedl
2003-02-04better debug3 messageMarkus Friedl
2002-09-09signed vs unsigned from -pedantic; ok henning@Markus Friedl
2002-07-04don't allocate, copy, and discard if there is not interested in the data; ok ...Markus Friedl