index
:
openssh
master
openssh
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
sshkey.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
upstream: add a helper function to match a key type to a list of
djm@openbsd.org
2022-01-06
1
-1
/
+24
*
Only enable sk-* key types if ENABLE_SK is defined
Darren Tucker
2021-10-07
1
-0
/
+6
*
upstream: Let allowed signers files used by ssh-keygen(1)
djm@openbsd.org
2021-07-23
1
-11
/
+21
*
upstream: Use existing format_absolute_time() function when
dtucker@openbsd.org
2021-07-12
1
-17
/
+5
*
upstream: Fix a couple of whitespace things. Portable already has
dtucker@openbsd.org
2021-07-08
1
-1
/
+1
*
polish whitespace for portable files
Damien Miller
2021-04-03
1
-2
/
+2
*
upstream: highly polished whitespace, mostly fixing spaces-for-tab
djm@openbsd.org
2021-04-03
1
-11
/
+11
*
upstream: fix memleaks in private key deserialisation; enforce more
djm@openbsd.org
2021-02-05
1
-1
/
+20
*
upstream: move check_host_cert() from sshconnect,c to sshkey.c and
djm@openbsd.org
2021-01-26
1
-4
/
+35
*
upstream: Make output buffer larger to prevent potential truncation
dtucker@openbsd.org
2021-01-18
1
-2
/
+2
*
upstream: Adapt XMSS to new logging infrastructure. With markus@, ok
dtucker@openbsd.org
2020-10-20
1
-5
/
+5
*
upstream: support for user-verified FIDO keys
djm@openbsd.org
2020-08-27
1
-9
/
+11
*
upstream: only call sshkey_xmss_init() once for KEY_XMSS_CERT; ok
markus@openbsd.org
2020-06-26
1
-2
/
+4
*
upstream: Add support for FIDO webauthn (verification only).
djm@openbsd.org
2020-06-22
1
-1
/
+3
*
upstream: Refactor private key parsing. Eliminates a fair bit of
djm@openbsd.org
2020-04-11
1
-147
/
+40
*
upstream: add sshkey_parse_pubkey_from_private_fileblob_type()
djm@openbsd.org
2020-04-08
1
-1
/
+65
*
upstream: simplify sshkey_parse_private_fileblob_type()
djm@openbsd.org
2020-04-08
1
-16
/
+5
*
upstream: check private key type against requested key type in
djm@openbsd.org
2020-04-08
1
-1
/
+7
*
upstream: check that pubkey in private key envelope matches actual
djm@openbsd.org
2020-04-08
1
-8
/
+19
*
upstream: refactor private key parsing a little
djm@openbsd.org
2020-04-08
1
-40
/
+114
*
upstream: sshkey_cert_check_authority requires reason to be set;
markus@openbsd.org
2020-03-13
1
-3
/
+3
*
upstream: passphrase depends on kdfname, not ciphername (possible
markus@openbsd.org
2020-03-13
1
-8
/
+8
*
upstream: change explicit_bzero();free() to freezero()
jsg@openbsd.org
2020-02-28
1
-29
/
+15
*
upstream: fix ssh-keygen not displaying authenticator touch
djm@openbsd.org
2020-01-21
1
-1
/
+4
*
upstream: SK API and sk-helper error/PIN passing
djm@openbsd.org
2019-12-30
1
-2
/
+2
*
remove a bunch of ENABLE_SK #ifdefs
Damien Miller
2019-12-13
1
-4
/
+0
*
upstream: use ssh-sk-helper for all security key signing operations
djm@openbsd.org
2019-12-13
1
-10
/
+5
*
upstream: Add new structure for signature options
djm@openbsd.org
2019-11-25
1
-5
/
+14
*
upstream: fix a bug that prevented serialisation of ed25519-sk keys
djm@openbsd.org
2019-11-18
1
-1
/
+2
*
upstream: fix bug that prevented certification of ed25519-sk keys
djm@openbsd.org
2019-11-18
1
-1
/
+7
*
Move ifdef OPENSSL_HAS_ECC.
Darren Tucker
2019-11-18
1
-1
/
+1
*
upstream: remove most uses of BN_CTX
djm@openbsd.org
2019-11-16
1
-59
/
+33
*
upstream: in order to be able to figure out the number of
markus@openbsd.org
2019-11-14
1
-1
/
+6
*
upstream: fix shield/unshield for xmss keys: - in ssh-agent we need
markus@openbsd.org
2019-11-14
1
-2
/
+2
*
Put sshsk_sign call inside ifdef ENABLE_SK.
Darren Tucker
2019-11-14
1
-0
/
+2
*
upstream: enable ed25519 support; ok djm
markus@openbsd.org
2019-11-12
1
-1
/
+153
*
upstream: implement sshsk_ed25519_inner_sig(); ok djm
markus@openbsd.org
2019-11-12
1
-1
/
+6
*
upstream: rename sshsk_ecdsa_sign() to sshsk_sign(); ok djm
markus@openbsd.org
2019-11-12
1
-3
/
+3
*
upstream: implement ssh-ed25519-sk verification; ok djm@
markus@openbsd.org
2019-11-12
1
-1
/
+5
*
conditionalise SK sign/verify on ENABLE_SK
Damien Miller
2019-11-01
1
-0
/
+4
*
upstream: Refactor signing - use sshkey_sign for everything,
djm@openbsd.org
2019-10-31
1
-8
/
+18
*
upstream: Initial infrastructure for U2F/FIDO support
djm@openbsd.org
2019-10-31
1
-26
/
+179
*
upstream: fix an unreachable integer overflow similar to the XMSS
djm@openbsd.org
2019-10-09
1
-4
/
+22
*
needs time.h for --without-openssl
Damien Miller
2019-09-08
1
-0
/
+1
*
upstream: fixes for !WITH_OPENSSL compilation; ok dtucker@
djm@openbsd.org
2019-09-06
1
-1
/
+1
*
upstream: make get_sigtype public as sshkey_get_sigtype(); ok
djm@openbsd.org
2019-09-03
1
-7
/
+7
*
upstream: remove mostly vestigal uuencode.[ch]; moving the only unique
djm@openbsd.org
2019-07-16
1
-20
/
+7
*
upstream: support PKCS8 as an optional format for storage of
djm@openbsd.org
2019-07-15
1
-22
/
+56
*
upstream: Remove some set but never used variables. ok daraadt@
dtucker@openbsd.org
2019-07-08
1
-4
/
+2
*
upstream: fix NULL deference (bzero) on err
djm@openbsd.org
2019-06-28
1
-2
/
+2
[next]