#
3a06db87 |
| 22-Sep-2024 |
jsg <jsg@openbsd.org> |
remove some unused defines; ok djm@
|
#
9e5b4079 |
| 14-Mar-2023 |
dtucker <dtucker@openbsd.org> |
Check pointer for NULL before attempting to deref. None of the existing callers seem to do that, but it's worth checking. From Coverity CID 291834, ok djm@
|
#
25daa3f3 |
| 21-Jun-2022 |
tobhe <tobhe@openbsd.org> |
Make sure not to fclose() the same fd twice in case of an error.
ok dtucker@
|
#
069f99b1 |
| 01-Jan-2022 |
jsg <jsg@openbsd.org> |
spelling ok dtucker@
|
#
158bd5dc |
| 18-Jun-2020 |
djm <djm@openbsd.org> |
avoid spurious "Unable to load host key" message when sshd can load a private key but no public counterpart; with & ok markus@
|
#
89ae1f19 |
| 17-Apr-2020 |
djm <djm@openbsd.org> |
refactor out some duplicate private key loading code; based on patch from loic AT venez.fr, ok dtucker@
|
#
548504ed |
| 08-Apr-2020 |
djm <djm@openbsd.org> |
let sshkey_try_load_public() load public keys from the unencrypted envelope of private key files if not sidecar public key file is present.
ok markus@
|
#
cdca007c |
| 08-Apr-2020 |
djm <djm@openbsd.org> |
simplify sshkey_try_load_public()
ok markus@
|
#
62af2284 |
| 25-Jan-2020 |
djm <djm@openbsd.org> |
factor out reading/writing sshbufs to dedicated functions; feedback and ok markus@
|
#
799632ce |
| 02-Jan-2020 |
djm <djm@openbsd.org> |
add sshkey_save_public(), to save a public key; ok markus@
|
#
b05cf02f |
| 03-Sep-2019 |
djm <djm@openbsd.org> |
move advance_past_options to authfile.c and make it public; ok markus@
|
#
b0c328c8 |
| 05-Aug-2019 |
dtucker <dtucker@openbsd.org> |
Remove now-redundant perm_ok arg since sshkey_load_private_type will now return SSH_ERR_KEY_BAD_PERMISSIONS in that case. Patch from jitendra.sharma at intel.com, ok djm@
|
#
46250577 |
| 15-Jul-2019 |
djm <djm@openbsd.org> |
support PKCS8 as an optional format for storage of private keys, enabled via "ssh-keygen -m PKCS8" on operations that save private keys to disk.
The OpenSSH native key format remains the default, bu
support PKCS8 as an optional format for storage of private keys, enabled via "ssh-keygen -m PKCS8" on operations that save private keys to disk.
The OpenSSH native key format remains the default, but PKCS8 is a superior format to PEM if interoperability with non-OpenSSH software is required, as it may use a less terrible KDF (IIRC PEM uses a single round of MD5 as a KDF).
adapted from patch by Jakub Jelen via bz3013; ok markus
show more ...
|
#
3aaa63eb |
| 28-Jun-2019 |
deraadt <deraadt@openbsd.org> |
When system calls indicate an error they return -1, not some arbitrary value < 0. errno is only updated in this case. Change all (most?) callers of syscalls to follow this better, and let's see if
When system calls indicate an error they return -1, not some arbitrary value < 0. errno is only updated in this case. Change all (most?) callers of syscalls to follow this better, and let's see if this strictness helps us in the future.
show more ...
|
#
036a096f |
| 21-Sep-2018 |
djm <djm@openbsd.org> |
In sshkey_in_file(), ignore keys that are considered for being too short (i.e. SSH_ERR_KEY_LENGTH). These keys will not be considered to be "in the file". This allows key revocation lists to contain
In sshkey_in_file(), ignore keys that are considered for being too short (i.e. SSH_ERR_KEY_LENGTH). These keys will not be considered to be "in the file". This allows key revocation lists to contain short keys without the entire revocation list being considered invalid.
bz#2897; ok dtucker
show more ...
|
#
25fe41fa |
| 09-Jul-2018 |
markus <markus@openbsd.org> |
replace cast with call to sshbuf_mutable_ptr(); ok djm@
|
#
e3941638 |
| 06-Jun-2018 |
markus <markus@openbsd.org> |
switch config file parsing to getline(3) as this avoids static limits noted by gerhard@; ok dtucker@, djm@
|
#
a6be8e7c |
| 23-Feb-2018 |
markus <markus@openbsd.org> |
Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures) The code is not compiled in by default (see WITH_XMSS in Makefile.inc) Joint work with stefan-lukas_gazdag at genua.eu See
Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures) The code is not compiled in by default (see WITH_XMSS in Makefile.inc) Joint work with stefan-lukas_gazdag at genua.eu See https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-signatures-12 ok djm@
show more ...
|
#
3671ebbe |
| 01-Jul-2017 |
djm <djm@openbsd.org> |
remove post-SSHv1 removal dead code from rsa.c and merge the remaining bit that it still used into ssh-rsa.c; ok markus
|
#
eaf8e3f6 |
| 31-May-2017 |
deraadt <deraadt@openbsd.org> |
Switch to recallocarray() for a few operations. Both growth and shrinkage are handled safely, and there also is no need for preallocation dances. Future changes in this area will be less error prone
Switch to recallocarray() for a few operations. Both growth and shrinkage are handled safely, and there also is no need for preallocation dances. Future changes in this area will be less error prone. Review and one bug found by markus
show more ...
|
#
c9c098b2 |
| 30-May-2017 |
markus <markus@openbsd.org> |
revise sshkey_load_public(): remove ssh1 related comments, remove extra open()/close() on keyfile, prevent leak of 'pub' if 'keyp' is NULL, replace strlcpy+cat with asprintf; ok djm@
|
#
67cc3a3c |
| 30-Apr-2017 |
djm <djm@openbsd.org> |
unifdef WITH_SSH1 ok markus@
|
#
75fa9110 |
| 26-Mar-2017 |
deraadt <deraadt@openbsd.org> |
incorrect renditions of this quote bother me
|
#
ac8147a0 |
| 25-Nov-2016 |
djm <djm@openbsd.org> |
use sshbuf_allocate() to pre-allocate the buffer used for loading keys. This avoids implicit realloc inside the buffer code, which might theoretically leave fragments of the key on the heap. This doe
use sshbuf_allocate() to pre-allocate the buffer used for loading keys. This avoids implicit realloc inside the buffer code, which might theoretically leave fragments of the key on the heap. This doesn't appear to happen in practice for normal sized keys, but was observed for novelty oversize ones.
Pointed out by Jann Horn of Project Zero; ok markus@
show more ...
|
#
d9171e4c |
| 09-Apr-2016 |
djm <djm@openbsd.org> |
make private key loading functions consistently handle NULL key pointer arguments; ok markus@
|