Age | Commit message (Expand) | Author |
2018-03-22 | ssh/xmss: fix deserialize for certs; ok djm@ | Markus Friedl |
2018-03-02 | refactor sshkey_read() to make it a little more, err, readable. | Damien Miller |
2018-02-23 | Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures) | Markus Friedl |
2018-02-14 | Some obvious freezero() conversions. | Joel Sing |
2018-02-07 | Remove all guards for calls to OpenSSL free functions - all of these | Joel Sing |
2017-12-18 | pass negotiated signing algorithm though to sshkey_verify() and | Damien Miller |
2017-12-18 | sshkey_sigtype() function to return the type of a signature; | Damien Miller |
2017-10-13 | BIO_get_mem_data() is supposed to take a char* as pointer argument, | Damien Miller |
2017-08-12 | Switch from aes256-cbc to aes256-ctr for encrypting new-style | Damien Miller |
2017-07-19 | fix support for unknown key types; ok djm@ | Markus Friedl |
2017-07-01 | remove post-SSHv1 removal dead code from rsa.c and merge the | Damien Miller |
2017-06-28 | Allow ssh-keygen to use a key held in ssh-agent as a CA when signing | Damien Miller |
2017-06-09 | better translate libcrypto errors by looking deeper in the accursed | Damien Miller |
2017-05-31 | Switch to recallocarray() for a few operations. Both growth and shrinkage | Theo de Raadt |
2017-05-08 | make requesting bad ECDSA bits yield the same error (SSH_ERR_KEY_LENGTH) | Damien Miller |
2017-05-07 | Refuse RSA keys <1024 bits in length. Improve reporting for keys that | Damien Miller |
2017-04-30 | remove KEY_RSA1 | Damien Miller |
2017-04-30 | remove SSHv1 ciphers; ok markus@ | Damien Miller |
2017-04-30 | unifdef WITH_SSH1 | Damien Miller |
2017-03-10 | fix regression in 7.4 server-sig-algs, where we were accidentally | Damien Miller |
2017-03-10 | Check for NULL argument to sshkey_read. Patch from jjelen at redhat.com | Darren Tucker |
2017-02-17 | ifdef out "rsa1" from the list of supported keytypes when compiled without | Darren Tucker |
2017-02-10 | bring back r1.34 that was backed out for problems loading public keys: | Damien Miller |
2016-10-24 | Remove dead breaks, found via opencoverage.net. ok deraadt@ | Darren Tucker |
2016-10-04 | add a comment about implicitly-expected checks to | Damien Miller |
2016-09-26 | Avoid a theoretical signed integer overflow should BN_num_bytes() | Damien Miller |
2016-09-12 | list all supported signature algorithms in the server-sig-algs | Damien Miller |
2016-09-12 | Add MAXIMUM(), MINIMUM(), and ROUNDUP() to misc.h, then use those definitions | Theo de Raadt |
2016-08-03 | small refactor of cipher.c: make ciphercontext opaque to callers | Damien Miller |
2016-06-19 | revert 1.34; causes problems loading public keys | Damien Miller |
2016-06-17 | translate OpenSSL error codes to something more meaninful; | Damien Miller |
2016-05-02 | support SHA256 and SHA512 RSA signatures in certificates; | Damien Miller |
2016-04-09 | make private key loading functions consistently handle NULL | Damien Miller |
2015-12-11 | Remove NULL-checks before sshbuf_free(). | mmcc |
2015-12-11 | Remove NULL-checks before sshkey_free(). | mmcc |
2015-12-10 | Remove NULL-checks before free(). | mmcc |
2015-12-04 | implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth) | Markus Friedl |
2015-11-19 | move the certificate validity formatting code to sshkey.[ch] | Damien Miller |
2015-11-16 | Replace remaining calls to index(3) with strchr(3). OK jca@ krw@ | Todd C. Miller |
2015-11-16 | improve sshkey_read() semantics; only update *cpp when a key | Damien Miller |
2015-10-15 | argument to sshkey_from_private() and sshkey_demote() can't be NULL | Damien Miller |
2015-09-13 | - Fix error message: passphrase needs to be at least 5 characters, not 4. | tim |
2015-09-02 | Fix occurrences of "r = func() != 0" which result in the wrong error | Jonathan Gray |
2015-08-19 | fix double-free() in error path of DSA key generation reported by | Damien Miller |
2015-07-03 | delete support for legacy v00 certificates; "sure" markus@ dtucker@ | Damien Miller |
2015-05-21 | refactor: split base64 encoding of pubkey into its own | Damien Miller |
2015-05-08 | don't choke on new-format private keys encrypted with an AEAD cipher; | Damien Miller |
2015-05-04 | Remove pattern length argument from match_pattern_list(), | Damien Miller |
2015-04-03 | correct return value in pubkey parsing, spotted by Ben Hawkes | Damien Miller |
2015-03-06 | fix sshkey_certify() return value for unsupported key types; | Damien Miller |