summaryrefslogtreecommitdiffstats
path: root/sshkey.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* upstream: put sshkey_check_rsa_length() back in sshkey.c to unbreakdjm@openbsd.org2022-10-281-1/+20
* fix merge botchDamien Miller2022-10-281-1/+0
* upstream: refactor sshkey_private_deserializedjm@openbsd.org2022-10-281-246/+29
* upstream: refactor sshkey_private_serialize_opt()djm@openbsd.org2022-10-281-168/+26
* upstream: refactor certifydjm@openbsd.org2022-10-281-93/+33
* upstream: refactor sshkey_sign() and sshkey_verify()djm@openbsd.org2022-10-281-68/+17
* upstream: refactor sshkey_from_blob_internal()djm@openbsd.org2022-10-281-232/+22
* upstream: refactor sshkey_from_private()djm@openbsd.org2022-10-281-125/+14
* upstream: factor out key generationdjm@openbsd.org2022-10-281-126/+14
* upstream: refactor and simplify sshkey_read()djm@openbsd.org2022-10-281-122/+24
* upstream: factor out public key serializationdjm@openbsd.org2022-10-281-93/+24
* upstream: factor out sshkey_equal_public()djm@openbsd.org2022-10-281-74/+26
* upstream: begin big refactor of sshkeydjm@openbsd.org2022-10-281-264/+171
* upstream: Add a sshkey_check_rsa_length() call for checking thedjm@openbsd.org2022-09-171-10/+16
* upstream: sshkey_unshield_private() contains a exact duplicate ofdjm@openbsd.org2022-05-051-40/+32
* upstream: add a helper function to match a key type to a list ofdjm@openbsd.org2022-01-061-1/+24
* Only enable sk-* key types if ENABLE_SK is definedDarren Tucker2021-10-071-0/+6
* upstream: Let allowed signers files used by ssh-keygen(1)djm@openbsd.org2021-07-231-11/+21
* upstream: Use existing format_absolute_time() function whendtucker@openbsd.org2021-07-121-17/+5
* upstream: Fix a couple of whitespace things. Portable already hasdtucker@openbsd.org2021-07-081-1/+1
* polish whitespace for portable filesDamien Miller2021-04-031-2/+2
* upstream: highly polished whitespace, mostly fixing spaces-for-tabdjm@openbsd.org2021-04-031-11/+11
* upstream: fix memleaks in private key deserialisation; enforce moredjm@openbsd.org2021-02-051-1/+20
* upstream: move check_host_cert() from sshconnect,c to sshkey.c anddjm@openbsd.org2021-01-261-4/+35
* upstream: Make output buffer larger to prevent potential truncationdtucker@openbsd.org2021-01-181-2/+2
* upstream: Adapt XMSS to new logging infrastructure. With markus@, okdtucker@openbsd.org2020-10-201-5/+5
* upstream: support for user-verified FIDO keysdjm@openbsd.org2020-08-271-9/+11
* upstream: only call sshkey_xmss_init() once for KEY_XMSS_CERT; okmarkus@openbsd.org2020-06-261-2/+4
* upstream: Add support for FIDO webauthn (verification only).djm@openbsd.org2020-06-221-1/+3
* upstream: Refactor private key parsing. Eliminates a fair bit ofdjm@openbsd.org2020-04-111-147/+40
* upstream: add sshkey_parse_pubkey_from_private_fileblob_type()djm@openbsd.org2020-04-081-1/+65
* upstream: simplify sshkey_parse_private_fileblob_type()djm@openbsd.org2020-04-081-16/+5
* upstream: check private key type against requested key type indjm@openbsd.org2020-04-081-1/+7
* upstream: check that pubkey in private key envelope matches actualdjm@openbsd.org2020-04-081-8/+19
* upstream: refactor private key parsing a littledjm@openbsd.org2020-04-081-40/+114
* upstream: sshkey_cert_check_authority requires reason to be set;markus@openbsd.org2020-03-131-3/+3
* upstream: passphrase depends on kdfname, not ciphername (possiblemarkus@openbsd.org2020-03-131-8/+8
* upstream: change explicit_bzero();free() to freezero()jsg@openbsd.org2020-02-281-29/+15
* upstream: fix ssh-keygen not displaying authenticator touchdjm@openbsd.org2020-01-211-1/+4
* upstream: SK API and sk-helper error/PIN passingdjm@openbsd.org2019-12-301-2/+2
* remove a bunch of ENABLE_SK #ifdefsDamien Miller2019-12-131-4/+0
* upstream: use ssh-sk-helper for all security key signing operationsdjm@openbsd.org2019-12-131-10/+5
* upstream: Add new structure for signature optionsdjm@openbsd.org2019-11-251-5/+14
* upstream: fix a bug that prevented serialisation of ed25519-sk keysdjm@openbsd.org2019-11-181-1/+2
* upstream: fix bug that prevented certification of ed25519-sk keysdjm@openbsd.org2019-11-181-1/+7
* Move ifdef OPENSSL_HAS_ECC.Darren Tucker2019-11-181-1/+1
* upstream: remove most uses of BN_CTXdjm@openbsd.org2019-11-161-59/+33
* upstream: in order to be able to figure out the number ofmarkus@openbsd.org2019-11-141-1/+6
* upstream: fix shield/unshield for xmss keys: - in ssh-agent we needmarkus@openbsd.org2019-11-141-2/+2
* Put sshsk_sign call inside ifdef ENABLE_SK.Darren Tucker2019-11-141-0/+2