#
860b8821 |
| 11-Dec-2015 |
mmcc <mmcc@openbsd.org> |
Remove NULL-checks before sshbuf_free().
ok djm@
|
#
5fb8de7d |
| 11-Dec-2015 |
mmcc <mmcc@openbsd.org> |
Remove NULL-checks before sshkey_free().
ok djm@
|
#
1b895242 |
| 10-Dec-2015 |
mmcc <mmcc@openbsd.org> |
Remove NULL-checks before free().
ok dtucker@
|
#
0768ca3d |
| 13-Sep-2015 |
tim <tim@openbsd.org> |
- Fix error message: passphrase needs to be at least 5 characters, not 4. - Remove unused function argument. - Remove two unnecessary variables.
OK djm@
|
#
aeca5846 |
| 09-Jul-2015 |
markus <markus@openbsd.org> |
re-enable ed25519-certs if compiled w/o openssl; ok djm
|
#
5e456000 |
| 03-Jul-2015 |
djm <djm@openbsd.org> |
delete support for legacy v00 certificates; "sure" markus@ dtucker@
|
#
3e546e32 |
| 17-Apr-2015 |
djm <djm@openbsd.org> |
s/recommended/required/ that private keys be og-r this wording change was made a while ago but got accidentally reverted
|
#
cda3d60a |
| 31-Mar-2015 |
djm <djm@openbsd.org> |
fd leak for !ssh1 case; found by unittests; ok markus@
|
#
b6a756d5 |
| 18-Mar-2015 |
djm <djm@openbsd.org> |
KRL support doesn't need OpenSSL anymore, remove #ifdefs from around call
|
#
d0c626f3 |
| 23-Feb-2015 |
djm <djm@openbsd.org> |
add an XXX to remind me to improve sshkey_load_public
|
#
ace78deb |
| 20-Jan-2015 |
deraadt <deraadt@openbsd.org> |
Reduce use of <sys/param.h> and transition to <limits.h> throughout. ok djm markus
|
#
03b8b379 |
| 08-Jan-2015 |
djm <djm@openbsd.org> |
deprecate key_load_private_pem() and sshkey_load_private_pem() interfaces. Refactor the generic key loading API to not require pathnames to be specified (they weren't really used).
Fixes a few other
deprecate key_load_private_pem() and sshkey_load_private_pem() interfaces. Refactor the generic key loading API to not require pathnames to be specified (they weren't really used).
Fixes a few other things en passant:
Makes ed25519 keys work for hostbased authentication (ssh-keysign previously used the PEM-only routines).
Fixes key comment regression bz#2306: key pathnames were being lost as comment fields.
ok markus@
show more ...
|
#
5885b59c |
| 04-Dec-2014 |
djm <djm@openbsd.org> |
add RevokedHostKeys option for the client
Allow textfile or KRL-based revocation of hostkeys.
|
#
ea2d8289 |
| 24-Jun-2014 |
djm <djm@openbsd.org> |
New key API: refactor key-related functions to be more library-like, existing API is offered as a set of wrappers.
with and ok markus@
Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matt
New key API: refactor key-related functions to be more library-like, existing API is offered as a set of wrappers.
with and ok markus@
Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew Dempsky and Ron Bowes for a detailed review a few months ago.
show more ...
|
#
12491775 |
| 29-Apr-2014 |
markus <markus@openbsd.org> |
make compiling against OpenSSL optional (make OPENSSL=no); reduces algorithms to curve25519, aes-ctr, chacha, ed25519; allows us to explore further options; with and ok djm
|
#
a06cba94 |
| 28-Apr-2014 |
djm <djm@openbsd.org> |
buffer_get_string_ptr's return should be const to remind callers that futzing with it will futz with the actual buffer contents
|
#
3336ceac |
| 12-Mar-2014 |
djm <djm@openbsd.org> |
correct test that kdf name is not "none" or "bcrypt"
|
#
c671dcf1 |
| 02-Feb-2014 |
djm <djm@openbsd.org> |
convert memset of potentially-private data to explicit_bzero()
|
#
69881b76 |
| 31-Jan-2014 |
tedu <tedu@openbsd.org> |
replace most bzero with explicit_bzero, except a few that cna be memset ok djm dtucker
|
#
93dce1ff |
| 29-Dec-2013 |
djm <djm@openbsd.org> |
don't refuse to load Ed25519 certificates
|
#
8ffbcf6d |
| 06-Dec-2013 |
markus <markus@openbsd.org> |
support ed25519 keys (hostkeys and user identities) using the public domain ed25519 reference code from SUPERCOP, see http://ed25519.cr.yp.to/software.html feedback, help & ok djm@
|
#
be8a7e88 |
| 06-Dec-2013 |
markus <markus@openbsd.org> |
new private key format, bcrypt as KDF by default; details in PROTOCOL.key; feedback and lots help from djm; ok djm@
|
#
1edbfe23 |
| 21-Nov-2013 |
djm <djm@openbsd.org> |
Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com" that combines Daniel Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an authenticated encryption mode.
Inspired by
Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com" that combines Daniel Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an authenticated encryption mode.
Inspired by and similar to Adam Langley's proposal for TLS: http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03 but differs in layout used for the MAC calculation and the use of a second ChaCha20 instance to separately encrypt packet lengths. Details are in the PROTOCOL.chacha20poly1305 file.
Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC ok markus@ naddy@
show more ...
|
#
0d40fefd |
| 17-May-2013 |
djm <djm@openbsd.org> |
bye, bye xfree(); ok markus@
|
#
0fdc47d7 |
| 19-Apr-2013 |
djm <djm@openbsd.org> |
add the ability to query supported ciphers, MACs, key type and KEX algorithms to ssh. Includes some refactoring of KEX and key type handling to be table-driven; ok markus@
|