summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/sshkey.c
AgeCommit message (Expand)Author
2017-07-19fix support for unknown key types; ok djm@Markus Friedl
2017-07-01remove post-SSHv1 removal dead code from rsa.c and merge theDamien Miller
2017-06-28Allow ssh-keygen to use a key held in ssh-agent as a CA when signingDamien Miller
2017-06-09better translate libcrypto errors by looking deeper in the accursedDamien Miller
2017-05-31Switch to recallocarray() for a few operations. Both growth and shrinkageTheo de Raadt
2017-05-08make requesting bad ECDSA bits yield the same error (SSH_ERR_KEY_LENGTH)Damien Miller
2017-05-07Refuse RSA keys <1024 bits in length. Improve reporting for keys thatDamien Miller
2017-04-30remove KEY_RSA1Damien Miller
2017-04-30remove SSHv1 ciphers; ok markus@Damien Miller
2017-04-30unifdef WITH_SSH1Damien Miller
2017-03-10fix regression in 7.4 server-sig-algs, where we were accidentallyDamien Miller
2017-03-10Check for NULL argument to sshkey_read. Patch from jjelen at redhat.comDarren Tucker
2017-02-17ifdef out "rsa1" from the list of supported keytypes when compiled withoutDarren Tucker
2017-02-10bring back r1.34 that was backed out for problems loading public keys:Damien Miller
2016-10-24Remove dead breaks, found via opencoverage.net. ok deraadt@Darren Tucker
2016-10-04add a comment about implicitly-expected checks toDamien Miller
2016-09-26Avoid a theoretical signed integer overflow should BN_num_bytes()Damien Miller
2016-09-12list all supported signature algorithms in the server-sig-algsDamien Miller
2016-09-12Add MAXIMUM(), MINIMUM(), and ROUNDUP() to misc.h, then use those definitionsTheo de Raadt
2016-08-03small refactor of cipher.c: make ciphercontext opaque to callersDamien Miller
2016-06-19revert 1.34; causes problems loading public keysDamien Miller
2016-06-17translate OpenSSL error codes to something more meaninful;Damien Miller
2016-05-02support SHA256 and SHA512 RSA signatures in certificates;Damien Miller
2016-04-09make private key loading functions consistently handle NULLDamien Miller
2015-12-11Remove NULL-checks before sshbuf_free().mmcc
2015-12-11Remove NULL-checks before sshkey_free().mmcc
2015-12-10Remove NULL-checks before free().mmcc
2015-12-04implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)Markus Friedl
2015-11-19move the certificate validity formatting code to sshkey.[ch]Damien Miller
2015-11-16Replace remaining calls to index(3) with strchr(3). OK jca@ krw@Todd C. Miller
2015-11-16improve sshkey_read() semantics; only update *cpp when a keyDamien Miller
2015-10-15argument to sshkey_from_private() and sshkey_demote() can't be NULLDamien Miller
2015-09-13- Fix error message: passphrase needs to be at least 5 characters, not 4.tim
2015-09-02Fix occurrences of "r = func() != 0" which result in the wrong errorJonathan Gray
2015-08-19fix double-free() in error path of DSA key generation reported byDamien Miller
2015-07-03delete support for legacy v00 certificates; "sure" markus@ dtucker@Damien Miller
2015-05-21refactor: split base64 encoding of pubkey into its ownDamien Miller
2015-05-08don't choke on new-format private keys encrypted with an AEAD cipher;Damien Miller
2015-05-04Remove pattern length argument from match_pattern_list(),Damien Miller
2015-04-03correct return value in pubkey parsing, spotted by Ben HawkesDamien Miller
2015-03-06fix sshkey_certify() return value for unsupported key types;Damien Miller
2015-01-26small refactor and add some convenience functions;Damien Miller
2015-01-16Replace <sys/param.h> with <limits.h> and other less dirty headers whereTheo de Raadt
2015-01-14avoid an warning for the !OPENSSL caseDamien Miller
2015-01-13add sshd_config HostbasedAcceptedKeyTypes and PubkeyAcceptedKeyTypesDamien Miller
2015-01-12unbreak parsing of pubkey comments; with gerhard; ok djm/deraadtMarkus Friedl
2015-01-12allow WITH_OPENSSL w/o WITH_SSH1; ok djm@Markus Friedl
2015-01-08deprecate key_load_private_pem() and sshkey_load_private_pem()Damien Miller
2014-12-21Add FingerprintHash option to control algorithm used for keyDamien Miller
2014-12-10better error value for invalid signature lengthDamien Miller