History log of /openbsd/usr.bin/ssh/authfile.c (Results 26 – 50 of 145)
Revision Date Author Comments
# 860b8821 11-Dec-2015 mmcc <mmcc@openbsd.org>

Remove NULL-checks before sshbuf_free().

ok djm@


# 5fb8de7d 11-Dec-2015 mmcc <mmcc@openbsd.org>

Remove NULL-checks before sshkey_free().

ok djm@


# 1b895242 10-Dec-2015 mmcc <mmcc@openbsd.org>

Remove NULL-checks before free().

ok dtucker@


# 0768ca3d 13-Sep-2015 tim <tim@openbsd.org>

- Fix error message: passphrase needs to be at least 5 characters, not 4.
- Remove unused function argument.
- Remove two unnecessary variables.

OK djm@


# aeca5846 09-Jul-2015 markus <markus@openbsd.org>

re-enable ed25519-certs if compiled w/o openssl; ok djm


# 5e456000 03-Jul-2015 djm <djm@openbsd.org>

delete support for legacy v00 certificates; "sure" markus@ dtucker@


# 3e546e32 17-Apr-2015 djm <djm@openbsd.org>

s/recommended/required/ that private keys be og-r
this wording change was made a while ago but got accidentally reverted


# cda3d60a 31-Mar-2015 djm <djm@openbsd.org>

fd leak for !ssh1 case; found by unittests; ok markus@


# b6a756d5 18-Mar-2015 djm <djm@openbsd.org>

KRL support doesn't need OpenSSL anymore, remove #ifdefs
from around call


# d0c626f3 23-Feb-2015 djm <djm@openbsd.org>

add an XXX to remind me to improve sshkey_load_public


# ace78deb 20-Jan-2015 deraadt <deraadt@openbsd.org>

Reduce use of <sys/param.h> and transition to <limits.h> throughout.
ok djm markus


# 03b8b379 08-Jan-2015 djm <djm@openbsd.org>

deprecate key_load_private_pem() and sshkey_load_private_pem()
interfaces. Refactor the generic key loading API to not require
pathnames to be specified (they weren't really used).

Fixes a few other

deprecate key_load_private_pem() and sshkey_load_private_pem()
interfaces. Refactor the generic key loading API to not require
pathnames to be specified (they weren't really used).

Fixes a few other things en passant:

Makes ed25519 keys work for hostbased authentication (ssh-keysign
previously used the PEM-only routines).

Fixes key comment regression bz#2306: key pathnames were being lost as
comment fields.

ok markus@

show more ...


# 5885b59c 04-Dec-2014 djm <djm@openbsd.org>

add RevokedHostKeys option for the client

Allow textfile or KRL-based revocation of hostkeys.


# ea2d8289 24-Jun-2014 djm <djm@openbsd.org>

New key API: refactor key-related functions to be more library-like,
existing API is offered as a set of wrappers.

with and ok markus@

Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matt

New key API: refactor key-related functions to be more library-like,
existing API is offered as a set of wrappers.

with and ok markus@

Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew
Dempsky and Ron Bowes for a detailed review a few months ago.

show more ...


# 12491775 29-Apr-2014 markus <markus@openbsd.org>

make compiling against OpenSSL optional (make OPENSSL=no);
reduces algorithms to curve25519, aes-ctr, chacha, ed25519;
allows us to explore further options; with and ok djm


# a06cba94 28-Apr-2014 djm <djm@openbsd.org>

buffer_get_string_ptr's return should be const to remind
callers that futzing with it will futz with the actual buffer
contents


# 3336ceac 12-Mar-2014 djm <djm@openbsd.org>

correct test that kdf name is not "none" or "bcrypt"


# c671dcf1 02-Feb-2014 djm <djm@openbsd.org>

convert memset of potentially-private data to explicit_bzero()


# 69881b76 31-Jan-2014 tedu <tedu@openbsd.org>

replace most bzero with explicit_bzero, except a few that cna be memset
ok djm dtucker


# 93dce1ff 29-Dec-2013 djm <djm@openbsd.org>

don't refuse to load Ed25519 certificates


# 8ffbcf6d 06-Dec-2013 markus <markus@openbsd.org>

support ed25519 keys (hostkeys and user identities) using the public domain
ed25519 reference code from SUPERCOP, see http://ed25519.cr.yp.to/software.html
feedback, help & ok djm@


# be8a7e88 06-Dec-2013 markus <markus@openbsd.org>

new private key format, bcrypt as KDF by default; details in PROTOCOL.key;
feedback and lots help from djm; ok djm@


# 1edbfe23 21-Nov-2013 djm <djm@openbsd.org>

Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com"
that combines Daniel Bernstein's ChaCha20 stream cipher and Poly1305 MAC
to build an authenticated encryption mode.

Inspired by

Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com"
that combines Daniel Bernstein's ChaCha20 stream cipher and Poly1305 MAC
to build an authenticated encryption mode.

Inspired by and similar to Adam Langley's proposal for TLS:
http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03
but differs in layout used for the MAC calculation and the use of a
second ChaCha20 instance to separately encrypt packet lengths.
Details are in the PROTOCOL.chacha20poly1305 file.

Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC
ok markus@ naddy@

show more ...


# 0d40fefd 17-May-2013 djm <djm@openbsd.org>

bye, bye xfree(); ok markus@


# 0fdc47d7 19-Apr-2013 djm <djm@openbsd.org>

add the ability to query supported ciphers, MACs, key type and KEX
algorithms to ssh. Includes some refactoring of KEX and key type handling
to be table-driven; ok markus@


123456