OpenBSD CVS

CVS log for src/usr.bin/ssh/sshkey.h


[BACK] Up to [local] / src / usr.bin / ssh

Request diff between arbitrary revisions


Default branch: MAIN


Revision 1.62 / (download) - annotate - [select for diffs], Wed Jun 21 05:10:26 2023 UTC (10 months, 3 weeks ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_7_5_BASE, OPENBSD_7_5, OPENBSD_7_4_BASE, OPENBSD_7_4, HEAD
Changes since 1.61: +2 -2 lines
Diff to previous 1.61 (colored)

better validate CASignatureAlgorithms in ssh_config and sshd_config.

Previously this directive would accept certificate algorithm names, but
these were unusable in practice as OpenSSH does not support CA chains.

part of bz3577; ok dtucker@

Revision 1.61 / (download) - annotate - [select for diffs], Fri Oct 28 00:44:44 2022 UTC (18 months, 2 weeks ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_7_3_BASE, OPENBSD_7_3
Changes since 1.60: +4 -1 lines
Diff to previous 1.60 (colored)

refactor sshkey_private_deserialize

feedback/ok markus@

Revision 1.60 / (download) - annotate - [select for diffs], Fri Oct 28 00:44:17 2022 UTC (18 months, 2 weeks ago) by djm
Branch: MAIN
Changes since 1.59: +5 -1 lines
Diff to previous 1.59 (colored)

refactor sshkey_private_serialize_opt()

feedback/ok markus@

Revision 1.59 / (download) - annotate - [select for diffs], Fri Oct 28 00:43:08 2022 UTC (18 months, 2 weeks ago) by djm
Branch: MAIN
Changes since 1.58: +7 -36 lines
Diff to previous 1.58 (colored)

refactor sshkey_sign() and sshkey_verify()

feedback/ok markus@

Revision 1.58 / (download) - annotate - [select for diffs], Fri Oct 28 00:41:52 2022 UTC (18 months, 2 weeks ago) by djm
Branch: MAIN
Changes since 1.57: +8 -2 lines
Diff to previous 1.57 (colored)

refactor sshkey_from_blob_internal()

feedback/ok markus@

Revision 1.57 / (download) - annotate - [select for diffs], Fri Oct 28 00:41:17 2022 UTC (18 months, 2 weeks ago) by djm
Branch: MAIN
Changes since 1.56: +3 -1 lines
Diff to previous 1.56 (colored)

refactor sshkey_from_private()

feedback/ok markus@

Revision 1.56 / (download) - annotate - [select for diffs], Fri Oct 28 00:39:29 2022 UTC (18 months, 2 weeks ago) by djm
Branch: MAIN
Changes since 1.55: +2 -1 lines
Diff to previous 1.55 (colored)

factor out key generation

feedback/ok markus@

Revision 1.55 / (download) - annotate - [select for diffs], Fri Oct 28 00:37:24 2022 UTC (18 months, 2 weeks ago) by djm
Branch: MAIN
Changes since 1.54: +4 -1 lines
Diff to previous 1.54 (colored)

factor out public key serialization

feedback/ok markus@

Revision 1.54 / (download) - annotate - [select for diffs], Fri Oct 28 00:36:31 2022 UTC (18 months, 2 weeks ago) by djm
Branch: MAIN
Changes since 1.53: +5 -1 lines
Diff to previous 1.53 (colored)

factor out sshkey_equal_public()

feedback/ok markus@

Revision 1.53 / (download) - annotate - [select for diffs], Fri Oct 28 00:35:40 2022 UTC (18 months, 2 weeks ago) by djm
Branch: MAIN
Changes since 1.52: +19 -1 lines
Diff to previous 1.52 (colored)

begin big refactor of sshkey

Move keytype data and some of the type-specific code (allocation,
cleanup, etc) out into each key type's implementation. Subsequent
commits will move more, with the goal of having each key-*.c file
owning as much of its keytype's implementation as possible.

lots of feedback + ok markus@

Revision 1.52 / (download) - annotate - [select for diffs], Sat Sep 17 10:30:45 2022 UTC (19 months, 4 weeks ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_7_2_BASE, OPENBSD_7_2
Changes since 1.51: +2 -1 lines
Diff to previous 1.51 (colored)

Add a sshkey_check_rsa_length() call for checking the length of an
RSA key; ok markus@

Revision 1.51 / (download) - annotate - [select for diffs], Thu Jan 6 22:05:42 2022 UTC (2 years, 4 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_7_1_BASE, OPENBSD_7_1
Changes since 1.50: +5 -1 lines
Diff to previous 1.50 (colored)

add a helper function to match a key type to a list of signature
algorithms. RSA keys can make signatures with multiple algorithms,
so some special handling is required.
ok markus@

Revision 1.50 / (download) - annotate - [select for diffs], Fri Jul 23 03:37:52 2021 UTC (2 years, 9 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_7_0_BASE, OPENBSD_7_0
Changes since 1.49: +3 -1 lines
Diff to previous 1.49 (colored)

Let allowed signers files used by ssh-keygen(1) signatures support key
lifetimes, and allow the verification mode to specify a signature time
to check at. This is intended for use by git to support signing
objects using ssh keys. ok dtucker@

Revision 1.49 / (download) - annotate - [select for diffs], Tue Jan 26 00:49:30 2021 UTC (3 years, 3 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_9_BASE, OPENBSD_6_9
Changes since 1.48: +4 -2 lines
Diff to previous 1.48 (colored)

move check_host_cert() from sshconnect,c to sshkey.c and refactor
it to make it more generally usable and testable.

ok markus@

Revision 1.48 / (download) - annotate - [select for diffs], Sun Nov 8 11:46:12 2020 UTC (3 years, 6 months ago) by dtucker
Branch: MAIN
Changes since 1.47: +3 -1 lines
Diff to previous 1.47 (colored)

Replace WITH_OPENSSL ifdefs in log calls with a macro.  The log calls
are themselves now macros, and preprocessor directives inside macro
arguments are undefined behaviour which some compilers (eg old GCCs)
choke on.  It also makes the code tidier.  ok deraadt@

Revision 1.47 / (download) - annotate - [select for diffs], Mon Oct 19 22:49:23 2020 UTC (3 years, 6 months ago) by dtucker
Branch: MAIN
Changes since 1.46: +4 -5 lines
Diff to previous 1.46 (colored)

Adapt XMSS to new logging infrastructure.  With markus@, ok djm@.

Revision 1.46 / (download) - annotate - [select for diffs], Thu Aug 27 01:06:19 2020 UTC (3 years, 8 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_8_BASE, OPENBSD_6_8
Changes since 1.45: +6 -5 lines
Diff to previous 1.45 (colored)

support for user-verified FIDO keys

FIDO2 supports a notion of "user verification" where the user is
required to demonstrate their identity to the token before particular
operations (e.g. signing). Typically this is done by authenticating
themselves using a PIN that has been set on the token.

This adds support for generating and using user verified keys where
the verification happens via PIN (other options might be added in the
future, but none are in common use now). Practically, this adds
another key generation option "verify-required" that yields a key that
requires a PIN before each authentication.

feedback markus@ and Pedro Martelletto; ok markus@

Revision 1.45 / (download) - annotate - [select for diffs], Wed Apr 8 00:08:46 2020 UTC (4 years, 1 month ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_7_BASE, OPENBSD_6_7
Changes since 1.44: +3 -1 lines
Diff to previous 1.44 (colored)

add sshkey_parse_pubkey_from_private_fileblob_type()

Extracts a public key from the unencrypted envelope of a new-style
OpenSSH private key.

ok markus@

Revision 1.44 / (download) - annotate - [select for diffs], Mon Dec 30 09:23:28 2019 UTC (4 years, 4 months ago) by djm
Branch: MAIN
Changes since 1.43: +1 -9 lines
Diff to previous 1.43 (colored)

SK API and sk-helper error/PIN passing

Allow passing a PIN via the SK API (API major crank) and let the
ssh-sk-helper API follow.

Also enhance the ssh-sk-helper API to support passing back an error
code instead of a complete reply. Will be used to signal "wrong PIN",
etc.

feedback and ok markus@

Revision 1.43 / (download) - annotate - [select for diffs], Mon Dec 30 09:21:59 2019 UTC (4 years, 4 months ago) by djm
Branch: MAIN
Changes since 1.42: +2 -1 lines
Diff to previous 1.42 (colored)

implement loading of resident keys in ssh-sk-helper

feedback and ok markus@

Revision 1.42 / (download) - annotate - [select for diffs], Fri Dec 13 19:11:14 2019 UTC (4 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.41: +6 -2 lines
Diff to previous 1.41 (colored)

perform security key enrollment via ssh-sk-helper too. This means
that ssh-keygen no longer needs to link against ssh-sk-helper,
and only ssh-sk-helper needs libfido2 and /dev/uhid* access;

feedback & ok markus@

Revision 1.41 / (download) - annotate - [select for diffs], Fri Dec 13 19:09:10 2019 UTC (4 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.40: +4 -1 lines
Diff to previous 1.40 (colored)

use ssh-sk-helper for all security key signing operations

This extracts and refactors the client interface for ssh-sk-helper
from ssh-agent and generalises it for use by the other programs.
This means that most OpenSSH tools no longer need to link against
libfido2 or directly interact with /dev/uhid*

requested by, feedback and ok markus@

Revision 1.40 / (download) - annotate - [select for diffs], Mon Nov 25 00:51:37 2019 UTC (4 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.39: +14 -4 lines
Diff to previous 1.39 (colored)

Add new structure for signature options

This is populated during signature verification with additional fields
that are present in and covered by the signature. At the moment, it is
only used to record security key-specific options, especially the flags
field.

with and ok markus@

Revision 1.39 / (download) - annotate - [select for diffs], Wed Nov 13 07:53:10 2019 UTC (4 years, 6 months ago) by markus
Branch: MAIN
Changes since 1.38: +5 -4 lines
Diff to previous 1.38 (colored)

fix shield/unshield for xmss keys:
- in ssh-agent we need to delay the call to shield
  until we have received key specific options.
- when serializing xmss keys for shield we need to deal with
  all optional components (e.g. state might not be loaded).
ok djm@

Revision 1.38 / (download) - annotate - [select for diffs], Tue Nov 12 19:33:08 2019 UTC (4 years, 6 months ago) by markus
Branch: MAIN
Changes since 1.37: +4 -3 lines
Diff to previous 1.37 (colored)

enable ed25519 support; ok djm

Revision 1.37 / (download) - annotate - [select for diffs], Tue Nov 12 19:29:25 2019 UTC (4 years, 6 months ago) by markus
Branch: MAIN
Changes since 1.36: +6 -1 lines
Diff to previous 1.36 (colored)

implement ssh-ed25519-sk verification; ok djm@

Revision 1.36 / (download) - annotate - [select for diffs], Thu Oct 31 21:23:19 2019 UTC (4 years, 6 months ago) by djm
Branch: MAIN
Changes since 1.35: +6 -5 lines
Diff to previous 1.35 (colored)

Refactor signing - use sshkey_sign for everything, including the new
U2F signatures.

Don't use sshsk_ecdsa_sign() directly, instead make it reachable via
sshkey_sign() like all other signature operations. This means that
we need to add a provider argument to sshkey_sign(), so most of this
change is mechanically adding that.

Suggested by / ok markus@

Revision 1.35 / (download) - annotate - [select for diffs], Thu Oct 31 21:15:14 2019 UTC (4 years, 6 months ago) by djm
Branch: MAIN
Changes since 1.34: +18 -1 lines
Diff to previous 1.34 (colored)

Initial infrastructure for U2F/FIDO support

Key library support: including allocation, marshalling public/private
keys and certificates, signature validation.

feedback & ok markus@

Revision 1.34 / (download) - annotate - [select for diffs], Tue Sep 3 08:31:20 2019 UTC (4 years, 8 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_6_BASE, OPENBSD_6_6
Changes since 1.33: +2 -1 lines
Diff to previous 1.33 (colored)

make get_sigtype public as sshkey_get_sigtype(); ok markus@

Revision 1.33 / (download) - annotate - [select for diffs], Mon Jul 15 13:16:29 2019 UTC (4 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.32: +9 -2 lines
Diff to previous 1.32 (colored)

support PKCS8 as an optional format for storage of private keys,
enabled via "ssh-keygen -m PKCS8" on operations that save private
keys to disk.

The OpenSSH native key format remains the default, but PKCS8 is a
superior format to PEM if interoperability with non-OpenSSH software
is required, as it may use a less terrible KDF (IIRC PEM uses a single
round of MD5 as a KDF).

adapted from patch by Jakub Jelen via bz3013; ok markus

Revision 1.32 / (download) - annotate - [select for diffs], Fri Jun 21 04:21:05 2019 UTC (4 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.31: +15 -6 lines
Diff to previous 1.31 (colored)

Add protection for private keys at rest in RAM against speculation
and memory sidechannel attacks like Spectre, Meltdown, Rowhammer and
Rambleed. This change encrypts private keys when they are not in use
with a symmetic key that is derived from a relatively large "prekey"
consisting of random data (currently 16KB).

Attackers must recover the entire prekey with high accuracy before
they can attempt to decrypt the shielded private key, but the current
generation of attacks have bit error rates that, when applied
cumulatively to the entire prekey, make this unlikely.

Implementation-wise, keys are encrypted "shielded" when loaded and then
automatically and transparently unshielded when used for signatures or
when being saved/serialised.

Hopefully we can remove this in a few years time when computer
architecture has become less unsafe.

been in snaps for a bit already; thanks deraadt@

ok dtucker@ deraadt@

Revision 1.31 / (download) - annotate - [select for diffs], Sun Jan 20 22:51:37 2019 UTC (5 years, 3 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_5_BASE, OPENBSD_6_5
Changes since 1.30: +2 -1 lines
Diff to previous 1.30 (colored)

add support for ECDSA keys in PKCS#11 tokens

Work by markus@ and Pedro Martelletto, feedback and ok me@

Revision 1.30 / (download) - annotate - [select for diffs], Fri Sep 14 04:17:44 2018 UTC (5 years, 8 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_4_BASE, OPENBSD_6_4
Changes since 1.29: +1 -2 lines
Diff to previous 1.29 (colored)

garbage-collect moribund ssh_new_private() API.

Revision 1.29 / (download) - annotate - [select for diffs], Thu Sep 13 02:08:33 2018 UTC (5 years, 8 months ago) by djm
Branch: MAIN
Changes since 1.28: +4 -5 lines
Diff to previous 1.28 (colored)

hold our collective noses and use the openssl-1.1.x API in OpenSSH;
feedback and ok tb@ jsing@ markus@

Revision 1.28 / (download) - annotate - [select for diffs], Wed Sep 12 01:32:54 2018 UTC (5 years, 8 months ago) by djm
Branch: MAIN
Changes since 1.27: +2 -1 lines
Diff to previous 1.27 (colored)

add sshkey_check_cert_sigtype() that checks a cert->signature_type
against a supplied whitelist; ok markus

Revision 1.27 / (download) - annotate - [select for diffs], Wed Sep 12 01:31:30 2018 UTC (5 years, 8 months ago) by djm
Branch: MAIN
Changes since 1.26: +2 -1 lines
Diff to previous 1.26 (colored)

add cert->signature_type field and keep it in sync with certificate
signature wrt loading and certification operations; ok markus@

Revision 1.26 / (download) - annotate - [select for diffs], Tue Jul 3 13:20:25 2018 UTC (5 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.25: +2 -1 lines
Diff to previous 1.25 (colored)

some finesse to fix RSA-SHA2 certificate authentication for certs
hosted in ssh-agent

Revision 1.25 / (download) - annotate - [select for diffs], Tue Jul 3 11:39:54 2018 UTC (5 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.24: +2 -2 lines
Diff to previous 1.24 (colored)

Improve strictness and control over RSA-SHA2 signature types:

In ssh, when an agent fails to return a RSA-SHA2 signature when
requested and falls back to RSA-SHA1 instead, retry the signature to
ensure that the public key algorithm sent in the SSH_MSG_USERAUTH
matches the one in the signature itself.

In sshd, strictly enforce that the public key algorithm sent in the
SSH_MSG_USERAUTH message matches what appears in the signature.

Make the sshd_config PubkeyAcceptedKeyTypes and
HostbasedAcceptedKeyTypes options control accepted signature algorithms
(previously they selected supported key types). This allows these
options to ban RSA-SHA1 in favour of RSA-SHA2.

Add new signature algorithms "rsa-sha2-256-cert-v01@openssh.com" and
"rsa-sha2-512-cert-v01@openssh.com" to force use of RSA-SHA2 signatures
with certificate keys.

feedback and ok markus@

Revision 1.24 / (download) - annotate - [select for diffs], Fri Feb 23 15:58:38 2018 UTC (6 years, 2 months ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_6_3_BASE, OPENBSD_6_3
Changes since 1.23: +34 -1 lines
Diff to previous 1.23 (colored)

Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures)
The code is not compiled in by default (see WITH_XMSS in Makefile.inc)
Joint work with stefan-lukas_gazdag at genua.eu
See https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-signatures-12
ok djm@

Revision 1.23 / (download) - annotate - [select for diffs], Mon Dec 18 02:25:15 2017 UTC (6 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.22: +4 -3 lines
Diff to previous 1.22 (colored)

pass negotiated signing algorithm though to sshkey_verify() and
check that the negotiated algorithm matches the type in the
signature (only matters for RSA SHA1/SHA2 sigs). ok markus@

Revision 1.22 / (download) - annotate - [select for diffs], Mon Dec 18 02:22:29 2017 UTC (6 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.21: +2 -1 lines
Diff to previous 1.21 (colored)

sshkey_sigtype() function to return the type of a signature;
ok markus@

Revision 1.21 / (download) - annotate - [select for diffs], Sat Jul 1 13:50:45 2017 UTC (6 years, 10 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_2_BASE, OPENBSD_6_2
Changes since 1.20: +4 -1 lines
Diff to previous 1.20 (colored)

remove post-SSHv1 removal dead code from rsa.c and merge the
remaining bit that it still used into ssh-rsa.c; ok markus

Revision 1.20 / (download) - annotate - [select for diffs], Wed Jun 28 01:09:22 2017 UTC (6 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.19: +8 -2 lines
Diff to previous 1.19 (colored)

Allow ssh-keygen to use a key held in ssh-agent as a CA when signing
certificates. bz#2377 ok markus

Revision 1.19 / (download) - annotate - [select for diffs], Tue Jun 13 11:22:15 2017 UTC (6 years, 11 months ago) by djm
Branch: MAIN
Changes since 1.18: +2 -1 lines
Diff to previous 1.18 (colored)

missing prototype.

Revision 1.18 / (download) - annotate - [select for diffs], Sun May 7 23:15:59 2017 UTC (7 years ago) by djm
Branch: MAIN
Changes since 1.17: +2 -2 lines
Diff to previous 1.17 (colored)

Refuse RSA keys <1024 bits in length. Improve reporting for keys that
do not meet this requirement. ok markus@

Revision 1.17 / (download) - annotate - [select for diffs], Wed May 3 21:08:09 2017 UTC (7 years ago) by naddy
Branch: MAIN
Changes since 1.16: +1 -3 lines
Diff to previous 1.16 (colored)

remove miscellaneous SSH1 leftovers; ok markus@

Revision 1.16 / (download) - annotate - [select for diffs], Sun Apr 30 23:18:44 2017 UTC (7 years ago) by djm
Branch: MAIN
Changes since 1.15: +1 -2 lines
Diff to previous 1.15 (colored)

remove KEY_RSA1

ok markus@

Revision 1.15 / (download) - annotate - [select for diffs], Fri Mar 10 04:07:20 2017 UTC (7 years, 2 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_1_BASE, OPENBSD_6_1
Changes since 1.14: +2 -2 lines
Diff to previous 1.14 (colored)

fix regression in 7.4 server-sig-algs, where we were accidentally
excluding SHA2 RSA signature methods. bz#2680, patch from Nuno
Goncalves; ok dtucker@

Revision 1.14 / (download) - annotate - [select for diffs], Mon Sep 12 23:31:27 2016 UTC (7 years, 8 months ago) by djm
Branch: MAIN
Changes since 1.13: +2 -2 lines
Diff to previous 1.13 (colored)

list all supported signature algorithms in the server-sig-algs
Reported by mb AT smartftp.com in bz#2547 and (independantly)
Ron Frederick; ok markus@

Revision 1.13 / (download) - annotate - [select for diffs], Mon May 2 09:36:42 2016 UTC (8 years ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_6_0_BASE, OPENBSD_6_0
Changes since 1.12: +2 -2 lines
Diff to previous 1.12 (colored)

support SHA256 and SHA512 RSA signatures in certificates;
ok markus@

Revision 1.12 / (download) - annotate - [select for diffs], Fri Dec 4 16:41:28 2015 UTC (8 years, 5 months ago) by markus
Branch: MAIN
CVS Tags: OPENBSD_5_9_BASE, OPENBSD_5_9
Changes since 1.11: +6 -6 lines
Diff to previous 1.11 (colored)

implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)
based on draft-rsa-dsa-sha2-256-03.txt and draft-ssh-ext-info-04.txt;
with & ok djm@

Revision 1.11 / (download) - annotate - [select for diffs], Thu Nov 19 01:08:55 2015 UTC (8 years, 5 months ago) by djm
Branch: MAIN
Changes since 1.10: +3 -1 lines
Diff to previous 1.10 (colored)

move the certificate validity formatting code to sshkey.[ch]

Revision 1.10 / (download) - annotate - [select for diffs], Sun Sep 13 14:39:16 2015 UTC (8 years, 8 months ago) by tim
Branch: MAIN
Changes since 1.9: +2 -3 lines
Diff to previous 1.9 (colored)

- Fix error message: passphrase needs to be at least 5 characters, not 4.
- Remove unused function argument.
- Remove two unnecessary variables.

OK djm@

Revision 1.9 / (download) - annotate - [select for diffs], Tue Aug 4 05:23:06 2015 UTC (8 years, 9 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_5_8_BASE, OPENBSD_5_8
Changes since 1.8: +2 -2 lines
Diff to previous 1.8 (colored)

backout SSH_RSA_MINIMUM_MODULUS_SIZE increase for this release;
problems spotted by sthen@ ok deraadt@ markus@

Revision 1.8 / (download) - annotate - [select for diffs], Fri Jul 3 04:05:54 2015 UTC (8 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.7: +2 -2 lines
Diff to previous 1.7 (colored)

another SSH_RSA_MINIMUM_MODULUS_SIZE that needed cranking

Revision 1.7 / (download) - annotate - [select for diffs], Fri Jul 3 03:43:18 2015 UTC (8 years, 10 months ago) by djm
Branch: MAIN
Changes since 1.6: +2 -5 lines
Diff to previous 1.6 (colored)

delete support for legacy v00 certificates; "sure" markus@ dtucker@

Revision 1.6 / (download) - annotate - [select for diffs], Thu May 21 04:55:51 2015 UTC (8 years, 11 months ago) by djm
Branch: MAIN
Changes since 1.5: +2 -1 lines
Diff to previous 1.5 (colored)

refactor: split base64 encoding of pubkey into its own
sshkey_to_base64() function and out of sshkey_write();
ok markus@

Revision 1.5 / (download) - annotate - [select for diffs], Mon Jan 26 02:59:11 2015 UTC (9 years, 3 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_5_7_BASE, OPENBSD_5_7
Changes since 1.4: +6 -3 lines
Diff to previous 1.4 (colored)

small refactor and add some convenience functions;
ok markus

Revision 1.4 / (download) - annotate - [select for diffs], Tue Jan 13 07:39:19 2015 UTC (9 years, 4 months ago) by djm
Branch: MAIN
Changes since 1.3: +2 -2 lines
Diff to previous 1.3 (colored)

add sshd_config HostbasedAcceptedKeyTypes and PubkeyAcceptedKeyTypes
options to allow sshd to control what public key types will be
accepted. Currently defaults to all. Feedback & ok markus@

Revision 1.3 / (download) - annotate - [select for diffs], Thu Jan 8 10:14:08 2015 UTC (9 years, 4 months ago) by djm
Branch: MAIN
Changes since 1.2: +1 -3 lines
Diff to previous 1.2 (colored)

deprecate key_load_private_pem() and sshkey_load_private_pem()
interfaces. Refactor the generic key loading API to not require
pathnames to be specified (they weren't really used).

Fixes a few other things en passant:

Makes ed25519 keys work for hostbased authentication (ssh-keysign
previously used the PEM-only routines).

Fixes key comment regression bz#2306: key pathnames were being lost as
comment fields.

ok markus@

Revision 1.2 / (download) - annotate - [select for diffs], Sun Dec 21 22:27:55 2014 UTC (9 years, 4 months ago) by djm
Branch: MAIN
Changes since 1.1: +7 -9 lines
Diff to previous 1.1 (colored)

Add FingerprintHash option to control algorithm used for key
fingerprints. Default changes from MD5 to SHA256 and format
from hex to base64.

Feedback and ok naddy@ markus@

Revision 1.1 / (download) - annotate - [select for diffs], Tue Jun 24 01:16:58 2014 UTC (9 years, 10 months ago) by djm
Branch: MAIN
CVS Tags: OPENBSD_5_6_BASE, OPENBSD_5_6

New key API: refactor key-related functions to be more library-like,
existing API is offered as a set of wrappers.

with and ok markus@

Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
Dempsky and Ron Bowes for a detailed review a few months ago.

This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.