History log of /openbsd/usr.bin/ssh/authfile.c (Results 1 – 25 of 145)
Revision Date Author Comments
# 3a06db87 22-Sep-2024 jsg <jsg@openbsd.org>

remove some unused defines; ok djm@


# 9e5b4079 14-Mar-2023 dtucker <dtucker@openbsd.org>

Check pointer for NULL before attempting to deref. None of the existing
callers seem to do that, but it's worth checking. From Coverity CID
291834, ok djm@


# 25daa3f3 21-Jun-2022 tobhe <tobhe@openbsd.org>

Make sure not to fclose() the same fd twice in case of an error.

ok dtucker@


# 069f99b1 01-Jan-2022 jsg <jsg@openbsd.org>

spelling
ok dtucker@


# 158bd5dc 18-Jun-2020 djm <djm@openbsd.org>

avoid spurious "Unable to load host key" message when sshd can load a
private key but no public counterpart; with & ok markus@


# 89ae1f19 17-Apr-2020 djm <djm@openbsd.org>

refactor out some duplicate private key loading code; based on
patch from loic AT venez.fr, ok dtucker@


# 548504ed 08-Apr-2020 djm <djm@openbsd.org>

let sshkey_try_load_public() load public keys from the unencrypted
envelope of private key files if not sidecar public key file is
present.

ok markus@


# cdca007c 08-Apr-2020 djm <djm@openbsd.org>

simplify sshkey_try_load_public()

ok markus@


# 62af2284 25-Jan-2020 djm <djm@openbsd.org>

factor out reading/writing sshbufs to dedicated functions;
feedback and ok markus@


# 799632ce 02-Jan-2020 djm <djm@openbsd.org>

add sshkey_save_public(), to save a public key; ok markus@


# b05cf02f 03-Sep-2019 djm <djm@openbsd.org>

move advance_past_options to authfile.c and make it public;
ok markus@


# b0c328c8 05-Aug-2019 dtucker <dtucker@openbsd.org>

Remove now-redundant perm_ok arg since sshkey_load_private_type will
now return SSH_ERR_KEY_BAD_PERMISSIONS in that case. Patch from
jitendra.sharma at intel.com, ok djm@


# 46250577 15-Jul-2019 djm <djm@openbsd.org>

support PKCS8 as an optional format for storage of private keys,
enabled via "ssh-keygen -m PKCS8" on operations that save private
keys to disk.

The OpenSSH native key format remains the default, bu

support PKCS8 as an optional format for storage of private keys,
enabled via "ssh-keygen -m PKCS8" on operations that save private
keys to disk.

The OpenSSH native key format remains the default, but PKCS8 is a
superior format to PEM if interoperability with non-OpenSSH software
is required, as it may use a less terrible KDF (IIRC PEM uses a single
round of MD5 as a KDF).

adapted from patch by Jakub Jelen via bz3013; ok markus

show more ...


# 3aaa63eb 28-Jun-2019 deraadt <deraadt@openbsd.org>

When system calls indicate an error they return -1, not some arbitrary
value < 0. errno is only updated in this case. Change all (most?)
callers of syscalls to follow this better, and let's see if

When system calls indicate an error they return -1, not some arbitrary
value < 0. errno is only updated in this case. Change all (most?)
callers of syscalls to follow this better, and let's see if this strictness
helps us in the future.

show more ...


# 036a096f 21-Sep-2018 djm <djm@openbsd.org>

In sshkey_in_file(), ignore keys that are considered for being too
short (i.e. SSH_ERR_KEY_LENGTH). These keys will not be considered to
be "in the file". This allows key revocation lists to contain

In sshkey_in_file(), ignore keys that are considered for being too
short (i.e. SSH_ERR_KEY_LENGTH). These keys will not be considered to
be "in the file". This allows key revocation lists to contain short
keys without the entire revocation list being considered invalid.

bz#2897; ok dtucker

show more ...


# 25fe41fa 09-Jul-2018 markus <markus@openbsd.org>

replace cast with call to sshbuf_mutable_ptr(); ok djm@


# e3941638 06-Jun-2018 markus <markus@openbsd.org>

switch config file parsing to getline(3) as this avoids static limits
noted by gerhard@; ok dtucker@, djm@


# a6be8e7c 23-Feb-2018 markus <markus@openbsd.org>

Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures)
The code is not compiled in by default (see WITH_XMSS in Makefile.inc)
Joint work with stefan-lukas_gazdag at genua.eu
See

Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures)
The code is not compiled in by default (see WITH_XMSS in Makefile.inc)
Joint work with stefan-lukas_gazdag at genua.eu
See https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-signatures-12
ok djm@

show more ...


# 3671ebbe 01-Jul-2017 djm <djm@openbsd.org>

remove post-SSHv1 removal dead code from rsa.c and merge the
remaining bit that it still used into ssh-rsa.c; ok markus


# eaf8e3f6 31-May-2017 deraadt <deraadt@openbsd.org>

Switch to recallocarray() for a few operations. Both growth and shrinkage
are handled safely, and there also is no need for preallocation dances.
Future changes in this area will be less error prone

Switch to recallocarray() for a few operations. Both growth and shrinkage
are handled safely, and there also is no need for preallocation dances.
Future changes in this area will be less error prone.
Review and one bug found by markus

show more ...


# c9c098b2 30-May-2017 markus <markus@openbsd.org>

revise sshkey_load_public(): remove ssh1 related comments, remove extra
open()/close() on keyfile, prevent leak of 'pub' if 'keyp' is NULL,
replace strlcpy+cat with asprintf; ok djm@


# 67cc3a3c 30-Apr-2017 djm <djm@openbsd.org>

unifdef WITH_SSH1
ok markus@


# 75fa9110 26-Mar-2017 deraadt <deraadt@openbsd.org>

incorrect renditions of this quote bother me


# ac8147a0 25-Nov-2016 djm <djm@openbsd.org>

use sshbuf_allocate() to pre-allocate the buffer used for loading
keys. This avoids implicit realloc inside the buffer code, which
might theoretically leave fragments of the key on the heap. This
doe

use sshbuf_allocate() to pre-allocate the buffer used for loading
keys. This avoids implicit realloc inside the buffer code, which
might theoretically leave fragments of the key on the heap. This
doesn't appear to happen in practice for normal sized keys, but
was observed for novelty oversize ones.

Pointed out by Jann Horn of Project Zero; ok markus@

show more ...


# d9171e4c 09-Apr-2016 djm <djm@openbsd.org>

make private key loading functions consistently handle NULL
key pointer arguments; ok markus@


123456