index
:
openssh
master
openssh
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
sshsig.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
upstream: skip more whitespace, fixes find-principals on
djm@openbsd.org
2024-03-08
1
-2
/
+2
*
upstream: prevent leak in sshsig_match_principals; ok djm@
markus@openbsd.org
2023-12-13
1
-4
/
+3
*
upstream: handle cr+lf (instead of just cr) in sshsig signature
djm@openbsd.org
2023-09-07
1
-8
/
+19
*
upstream: simplify sshsig_find_principals() similar to what happened to
djm@openbsd.org
2023-04-06
1
-4
/
+3
*
upstream: return SSH_ERR_KEY_NOT_FOUND if the allowed_signers file
djm@openbsd.org
2023-03-30
1
-3
/
+3
*
upstream: double free() in error path; from Eusgor via GHPR333
djm@openbsd.org
2022-08-19
1
-3
/
+4
*
upstream: avoid NULL deref via ssh-keygen -Y find-principals.
djm@openbsd.org
2022-03-30
1
-2
/
+7
*
upstream: allow 'ssh-keygen -Y find-principals' to match wildcard
djm@openbsd.org
2022-02-02
1
-12
/
+14
*
upstream: NULL deref when using find-principals when matching an
djm@openbsd.org
2022-01-05
1
-2
/
+2
*
upstream: sshsig: return "key not found" when searching empty files
djm@openbsd.org
2021-11-28
1
-1
/
+2
*
upstream: missing initialisation for oerrno
djm@openbsd.org
2021-11-28
1
-2
/
+2
*
upstream: Add ssh-keygen -Y match-principals operation to perform
djm@openbsd.org
2021-11-27
1
-1
/
+71
*
upstream: ssh-keygen -Y find-principals was verifying key validity
djm@openbsd.org
2021-11-18
1
-65
/
+36
*
upstream: move cert_filter_principals() to earlier in the file for
djm@openbsd.org
2021-11-06
1
-55
/
+55
*
upstream: Add a StdinNull directive to ssh_config(5) that allows
djm@openbsd.org
2021-07-23
1
-27
/
+83
*
upstream: Set linesize returned by getline to zero when freeing and
dtucker@openbsd.org
2021-01-31
1
-1
/
+3
*
upstream: move check_host_cert() from sshconnect,c to sshkey.c and
djm@openbsd.org
2021-01-26
1
-3
/
+3
*
upstream: use the new variant log macros instead of prepending
djm@openbsd.org
2020-10-18
1
-59
/
+55
*
upstream: Add RCS IDs to the few files that are missing them; from
djm@openbsd.org
2020-08-31
1
-0
/
+1
*
upstream: support for user-verified FIDO keys
djm@openbsd.org
2020-08-27
1
-7
/
+9
*
upstream: do not leak oprincipals; ok djm
markus@openbsd.org
2020-03-13
1
-2
/
+4
*
upstream: correct return code; ok djm
markus@openbsd.org
2020-03-13
1
-1
/
+1
*
upstream: principalsp is optional, pubkey required; ok djm
markus@openbsd.org
2020-03-13
1
-3
/
+3
*
upstream: sshsig: return correct error, fix null-deref; ok djm
markus@openbsd.org
2020-03-13
1
-5
/
+7
*
upstream: ssh-keygen -Y find-principals fixes based on feedback
djm@openbsd.org
2020-01-25
1
-11
/
+63
*
upstream: add a new signature operations "find-principal" to look
djm@openbsd.org
2020-01-23
1
-0
/
+117
*
upstream: factor out parsing of allowed-signers lines
djm@openbsd.org
2020-01-22
1
-27
/
+87
*
upstream: Add new structure for signature options
djm@openbsd.org
2019-11-25
1
-8
/
+14
*
upstream: Refactor signing - use sshkey_sign for everything,
djm@openbsd.org
2019-10-31
1
-10
/
+11
*
upstream: make signature format match PROTOCO
djm@openbsd.org
2019-10-02
1
-2
/
+2
*
upstream: memleak on error path; found by libfuzzer
djm@openbsd.org
2019-09-05
1
-1
/
+1
*
upstream: expose allowed_signers options parsing code in header for
djm@openbsd.org
2019-09-05
1
-9
/
+9
*
upstream: repair typo and editing mishap
naddy@openbsd.org
2019-09-05
1
-1
/
+1
*
portability fixes for sshsig
Damien Miller
2019-09-03
1
-0
/
+2
*
upstream: sshsig tweaks and improvements from and suggested by
djm@openbsd.org
2019-09-03
1
-84
/
+96
*
upstream: sshsig: lightweight signature and verification ability
djm@openbsd.org
2019-09-03
1
-0
/
+787