summaryrefslogtreecommitdiffstats
path: root/sshkey.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* upstream: be more strict in parsing key type names. Only allowdjm@openbsd.org2024-09-041-5/+19
* simplify sshkey_prekey_alloc(); always use mmapDamien Miller2024-08-211-17/+10
* upstream: actually use the length parameter that was passed in ratherdjm@openbsd.org2024-08-201-4/+4
* private key coredump protection for Linux/FreeBSDDamien Miller2024-08-201-0/+18
* upstream: place shielded keys (i.e. keys at rest in RAM) into memorydjm@openbsd.org2024-08-201-6/+26
* missed OPENSSL_HAS_ECC caseDamien Miller2024-08-151-0/+2
* upstream: Convert RSA and ECDSA key to the libcrypto EVP_PKEY API.djm@openbsd.org2024-08-151-71/+154
* upstream: make DSA key support compile-time optional, defaulting todjm@openbsd.org2024-01-111-1/+9
* upstream: spelling; ok markus@jsg@openbsd.org2024-01-081-2/+2
* upstream: Move declaration of "len" into the block where it's used.dtucker@openbsd.org2023-10-161-2/+3
* upstream: add support for reading ED25519 private keys in PEM PKCS8djm@openbsd.org2023-10-121-2/+37
* upstream: want stdlib.h for free(3)djm@openbsd.org2023-08-211-1/+2
* upstream: increase default KDF work-factor for OpenSSH formatdjm@openbsd.org2023-07-281-2/+2
* upstream: better validate CASignatureAlgorithms in ssh_config anddjm@openbsd.org2023-06-211-2/+5
* upstream: remove unused variable; prompted by Coverity CID 291879djm@openbsd.org2023-03-311-4/+1
* Allow building with BoringSSLDamien Miller2023-03-241-0/+6
* upstream: put sshkey_check_rsa_length() back in sshkey.c to unbreakdjm@openbsd.org2022-10-281-1/+20
* fix merge botchDamien Miller2022-10-281-1/+0
* upstream: refactor sshkey_private_deserializedjm@openbsd.org2022-10-281-246/+29
* upstream: refactor sshkey_private_serialize_opt()djm@openbsd.org2022-10-281-168/+26
* upstream: refactor certifydjm@openbsd.org2022-10-281-93/+33
* upstream: refactor sshkey_sign() and sshkey_verify()djm@openbsd.org2022-10-281-68/+17
* upstream: refactor sshkey_from_blob_internal()djm@openbsd.org2022-10-281-232/+22
* upstream: refactor sshkey_from_private()djm@openbsd.org2022-10-281-125/+14
* upstream: factor out key generationdjm@openbsd.org2022-10-281-126/+14
* upstream: refactor and simplify sshkey_read()djm@openbsd.org2022-10-281-122/+24
* upstream: factor out public key serializationdjm@openbsd.org2022-10-281-93/+24
* upstream: factor out sshkey_equal_public()djm@openbsd.org2022-10-281-74/+26
* upstream: begin big refactor of sshkeydjm@openbsd.org2022-10-281-264/+171
* upstream: Add a sshkey_check_rsa_length() call for checking thedjm@openbsd.org2022-09-171-10/+16
* upstream: sshkey_unshield_private() contains a exact duplicate ofdjm@openbsd.org2022-05-051-40/+32
* upstream: add a helper function to match a key type to a list ofdjm@openbsd.org2022-01-061-1/+24
* Only enable sk-* key types if ENABLE_SK is definedDarren Tucker2021-10-071-0/+6
* upstream: Let allowed signers files used by ssh-keygen(1)djm@openbsd.org2021-07-231-11/+21
* upstream: Use existing format_absolute_time() function whendtucker@openbsd.org2021-07-121-17/+5
* upstream: Fix a couple of whitespace things. Portable already hasdtucker@openbsd.org2021-07-081-1/+1
* polish whitespace for portable filesDamien Miller2021-04-031-2/+2
* upstream: highly polished whitespace, mostly fixing spaces-for-tabdjm@openbsd.org2021-04-031-11/+11
* upstream: fix memleaks in private key deserialisation; enforce moredjm@openbsd.org2021-02-051-1/+20
* upstream: move check_host_cert() from sshconnect,c to sshkey.c anddjm@openbsd.org2021-01-261-4/+35
* upstream: Make output buffer larger to prevent potential truncationdtucker@openbsd.org2021-01-181-2/+2
* upstream: Adapt XMSS to new logging infrastructure. With markus@, okdtucker@openbsd.org2020-10-201-5/+5
* upstream: support for user-verified FIDO keysdjm@openbsd.org2020-08-271-9/+11
* upstream: only call sshkey_xmss_init() once for KEY_XMSS_CERT; okmarkus@openbsd.org2020-06-261-2/+4
* upstream: Add support for FIDO webauthn (verification only).djm@openbsd.org2020-06-221-1/+3
* upstream: Refactor private key parsing. Eliminates a fair bit ofdjm@openbsd.org2020-04-111-147/+40
* upstream: add sshkey_parse_pubkey_from_private_fileblob_type()djm@openbsd.org2020-04-081-1/+65
* upstream: simplify sshkey_parse_private_fileblob_type()djm@openbsd.org2020-04-081-16/+5
* upstream: check private key type against requested key type indjm@openbsd.org2020-04-081-1/+7
* upstream: check that pubkey in private key envelope matches actualdjm@openbsd.org2020-04-081-8/+19