summaryrefslogtreecommitdiff
path: root/sshkey.c
AgeCommit message (Expand)Author
5 daysupstream: fix ssh-keygen not displaying authenticator touchdjm@openbsd.org
2019-12-30upstream: SK API and sk-helper error/PIN passingdjm@openbsd.org
2019-12-14remove a bunch of ENABLE_SK #ifdefsDamien Miller
2019-12-14upstream: use ssh-sk-helper for all security key signing operationsdjm@openbsd.org
2019-11-25upstream: Add new structure for signature optionsdjm@openbsd.org
2019-11-18upstream: fix a bug that prevented serialisation of ed25519-sk keysdjm@openbsd.org
2019-11-18upstream: fix bug that prevented certification of ed25519-sk keysdjm@openbsd.org
2019-11-18Move ifdef OPENSSL_HAS_ECC.Darren Tucker
2019-11-17upstream: remove most uses of BN_CTXdjm@openbsd.org
2019-11-15upstream: in order to be able to figure out the number ofmarkus@openbsd.org
2019-11-15upstream: fix shield/unshield for xmss keys: - in ssh-agent we needmarkus@openbsd.org
2019-11-14Put sshsk_sign call inside ifdef ENABLE_SK.Darren Tucker
2019-11-13upstream: enable ed25519 support; ok djmmarkus@openbsd.org
2019-11-13upstream: implement sshsk_ed25519_inner_sig(); ok djmmarkus@openbsd.org
2019-11-13upstream: rename sshsk_ecdsa_sign() to sshsk_sign(); ok djmmarkus@openbsd.org
2019-11-13upstream: implement ssh-ed25519-sk verification; ok djm@markus@openbsd.org
2019-11-01conditionalise SK sign/verify on ENABLE_SKDamien Miller
2019-11-01upstream: Refactor signing - use sshkey_sign for everything,djm@openbsd.org
2019-11-01upstream: Initial infrastructure for U2F/FIDO supportdjm@openbsd.org
2019-10-09upstream: fix an unreachable integer overflow similar to the XMSSdjm@openbsd.org
2019-09-08needs time.h for --without-opensslDamien Miller
2019-09-06upstream: fixes for !WITH_OPENSSL compilation; ok dtucker@djm@openbsd.org
2019-09-03upstream: make get_sigtype public as sshkey_get_sigtype(); okdjm@openbsd.org
2019-07-16upstream: remove mostly vestigal uuencode.[ch]; moving the only uniquedjm@openbsd.org
2019-07-15upstream: support PKCS8 as an optional format for storage ofdjm@openbsd.org
2019-07-08upstream: Remove some set but never used variables. ok daraadt@dtucker@openbsd.org
2019-06-28upstream: fix NULL deference (bzero) on errdjm@openbsd.org
2019-06-23upstream: fix mismatch proto/decl from key shielding change; spotteddjm@openbsd.org
2019-06-21upstream: Add protection for private keys at rest in RAM againstdjm@openbsd.org
2019-05-20upstream: When signing certificates with an RSA key, default todjm@openbsd.org
2019-05-08upstream: Wrap XMSS including in ifdef. Patch from markus atdtucker@openbsd.org
2019-01-21upstream: Make sshpkt_get_bignum2() allocate the bignum it isdjm@openbsd.org
2018-10-11some more duplicated key algorithm linesDamien Miller
2018-10-11fix duplicated algorithm specification linesDamien Miller
2018-10-11upstream: typo in plain RSA algorithm counterpart names fordjm@openbsd.org
2018-10-11supply callback to PEM_read_bio_PrivateKeyDamien Miller
2018-10-09upstream: Treat all PEM_read_bio_PrivateKey() errors when a passphrasedjm@openbsd.org
2018-09-15Fix openssl-1.1 fallout for --without-openssl.Darren Tucker
2018-09-14upstream: garbage-collect moribund ssh_new_private() API.djm@openbsd.org
2018-09-13adapt -portable to OpenSSL 1.1x APIDamien Miller
2018-09-13upstream: hold our collective noses and use the openssl-1.1.x API indjm@openbsd.org
2018-09-12upstream: add sshkey_check_cert_sigtype() that checks adjm@openbsd.org
2018-09-12upstream: add cert->signature_type field and keep it in sync withdjm@openbsd.org
2018-07-03upstream: some finesse to fix RSA-SHA2 certificate authenticationdjm@openbsd.org
2018-07-03upstream: Improve strictness and control over RSA-SHA2 signaturedjm@openbsd.org
2018-03-23upstream: ssh/xmss: fix deserialize for certs; ok djm@markus@openbsd.org
2018-03-02upstream: refactor sshkey_read() to make it a little more, err,djm@openbsd.org
2018-02-26upstream: Add experimental support for PQC XMSS keys (Extendedmarkus@openbsd.org
2018-02-16upstream: Some obvious freezero() conversions.jsing@openbsd.org
2018-02-08upstream commitjsing@openbsd.org