summaryrefslogtreecommitdiff
path: root/ssh-keygen.c
AgeCommit message (Expand)Author
9 daysupstream: fix indenting in last commitdjm@openbsd.org
10 daysupstream: Add ssh-keygen -Y match-principals operation to performdjm@openbsd.org
2021-10-29upstream: ssh-keygen: make verify-time argument parsing optionaldjm@openbsd.org
2021-10-28upstream: When downloading resident keys from a FIDO token, passdjm@openbsd.org
2021-10-06upstream: Dynamically allocate encoded HashKnownHosts and free asdtucker@openbsd.org
2021-09-08upstream: correct my mistake in previous fix; spotted by halexdjm@openbsd.org
2021-09-07upstream: avoid NULL deref in -Y find-principals. Report and fixdjm@openbsd.org
2021-08-11upstream: when verifying sshsig signatures, support an optiondjm@openbsd.org
2021-07-24upstream: Don't omit ssh-keygen -y from usage when built withoutdtucker@openbsd.org
2021-07-24upstream: Exclude key conversion options from usage when builtdtucker@openbsd.org
2021-07-23upstream: Let allowed signers files used by ssh-keygen(1)djm@openbsd.org
2021-07-09upstream: silence redundant error message; reported by Fabian Stelzerdjm@openbsd.org
2021-07-08upstream: Order includes as per style(9). Portable already hasdtucker@openbsd.org
2021-04-03upstream: highly polished whitespace, mostly fixing spaces-for-tabdjm@openbsd.org
2021-03-13upstream: pwcopy() struct passwd that we're going to reuse across adjm@openbsd.org
2020-12-21upstream: load_hostkeys()/hostkeys_foreach() variants for FILE*djm@openbsd.org
2020-11-29upstream: Include cipher.h for declaration of cipher_by_name.dtucker@openbsd.org
2020-11-27upstream: Document ssh-keygen -Z, sanity check its argument earlier anddtucker@openbsd.org
2020-11-09upstream: when requesting a security key touch on stderr, inform thedjm@openbsd.org
2020-11-09Remove preprocessor directive from log macro calls.Darren Tucker
2020-10-29upstream: fix type of nid in type_bits_valid(); github PR#202 fromdjm@openbsd.org
2020-10-29upstream: whitespace; no code changedjm@openbsd.org
2020-10-18upstream: use the new variant log macros instead of prependingdjm@openbsd.org
2020-09-09upstream: when writing an attestation blob for a FIDO key, record alldjm@openbsd.org
2020-08-27upstream: debug()-print a little info about FIDO-specific keydjm@openbsd.org
2020-08-27upstream: Request PIN ahead of time for certain FIDO actionsdjm@openbsd.org
2020-08-27upstream: major rework of FIDO token selection logicdjm@openbsd.org
2020-08-27upstream: support for user-verified FIDO keysdjm@openbsd.org
2020-08-03upstream: ensure that certificate extensions are lexically sorted.djm@openbsd.org
2020-07-17upstream: - Add [-a rounds] in ssh-keygen man page and usage() -solene@openbsd.org
2020-06-26upstream: Defer creation of ~/.ssh by ssh(1) until we attempt todtucker@openbsd.org
2020-05-29upstream: fix exit status for downloading of FIDO resident keys;djm@openbsd.org
2020-05-27upstream: avoid possible NULL deref; from Pedro Martellettodjm@openbsd.org
2020-05-27upstream: preserve group/world read permission on known_hostsdjm@openbsd.org
2020-05-02upstream: we have a sshkey_save_public() function to save public keys;djm@openbsd.org
2020-05-01upstream: avoid NULL dereference when attempting to convert invaliddjm@openbsd.org
2020-04-20upstream: fix a bug I introduced in r1.406: when printing private keydjm@openbsd.org
2020-04-17upstream: repair private key fingerprint printing to also printdjm@openbsd.org
2020-04-03upstream: give ssh-keygen the ability to dump the contents of adjm@openbsd.org
2020-03-14upstream: spelling errors in comments; no code change fromdjm@openbsd.org
2020-03-14upstream: when downloading FIDO2 resident keys from a token, don'tdjm@openbsd.org
2020-03-13upstream: fix use-after-free in do_download_sk; ok djmmarkus@openbsd.org
2020-03-13upstream: exit if ssh_krl_revoke_key_sha256 fails; ok djmmarkus@openbsd.org
2020-02-28upstream: no-touch-required certificate option should be andjm@openbsd.org
2020-02-28upstream: change explicit_bzero();free() to freezero()jsg@openbsd.org
2020-02-07upstream: fix two PIN entry bugs on FIDO keygen: 1) it would allow moredjm@openbsd.org
2020-02-07upstream: Replace "security key" with "authenticator" in programnaddy@openbsd.org
2020-02-04upstream: require FIDO application strings to start with "ssh:"; okdjm@openbsd.org
2020-01-29upstream: changes to support FIDO attestationdjm@openbsd.org
2020-01-26upstream: improve the error message for u2f enrollment errors bydjm@openbsd.org