History log of /openbsd/usr.bin/ssh/ssh-rsa.c (Results 1 – 25 of 80)
Revision Date Author Comments
# 5411e769 15-Aug-2024 djm <djm@openbsd.org>

Convert RSA and ECDSA key to the libcrypto EVP_PKEY API. DSA remains
unconverted as it will be removed within six months.

Based on patches originally from Dmitry Belyavskiy, but significantly
rework

Convert RSA and ECDSA key to the libcrypto EVP_PKEY API. DSA remains
unconverted as it will be removed within six months.

Based on patches originally from Dmitry Belyavskiy, but significantly
reworked based on feedback from Bob Beck, Joel Sing and especially
Theo Buehler (apologies to anyone I've missed).

ok tb@

show more ...


# 15d7c2bc 05-Mar-2023 dtucker <dtucker@openbsd.org>

Remove unused compat.h includes. We've previously removed a lot
of the really old compatibility code, and with it went the need to
include compat.h in most of the files that have it.


# 1eb54458 28-Oct-2022 djm <djm@openbsd.org>

put sshkey_check_rsa_length() back in sshkey.c to unbreak
OPENSSL=no builds


# a2c931d9 28-Oct-2022 djm <djm@openbsd.org>

refactor sshkey_private_deserialize

feedback/ok markus@


# d03db38b 28-Oct-2022 djm <djm@openbsd.org>

refactor sshkey_private_serialize_opt()

feedback/ok markus@


# c5c174fa 28-Oct-2022 djm <djm@openbsd.org>

refactor sshkey_sign() and sshkey_verify()

feedback/ok markus@


# c8d92406 28-Oct-2022 djm <djm@openbsd.org>

refactor sshkey_from_blob_internal()

feedback/ok markus@


# 0d39f001 28-Oct-2022 djm <djm@openbsd.org>

refactor sshkey_from_private()

feedback/ok markus@


# b6025feb 28-Oct-2022 djm <djm@openbsd.org>

factor out key generation

feedback/ok markus@


# eefcf659 28-Oct-2022 djm <djm@openbsd.org>

factor out public key serialization

feedback/ok markus@


# 712f5ecf 28-Oct-2022 djm <djm@openbsd.org>

factor out sshkey_equal_public()

feedback/ok markus@


# 9c1667db 28-Oct-2022 djm <djm@openbsd.org>

begin big refactor of sshkey

Move keytype data and some of the type-specific code (allocation,
cleanup, etc) out into each key type's implementation. Subsequent
commits will move more, with the goal

begin big refactor of sshkey

Move keytype data and some of the type-specific code (allocation,
cleanup, etc) out into each key type's implementation. Subsequent
commits will move more, with the goal of having each key-*.c file
owning as much of its keytype's implementation as possible.

lots of feedback + ok markus@

show more ...


# 7c94020a 13-Sep-2018 djm <djm@openbsd.org>

hold our collective noses and use the openssl-1.1.x API in OpenSSH;
feedback and ok tb@ jsing@ markus@


# 38a44c4d 03-Jul-2018 djm <djm@openbsd.org>

Improve strictness and control over RSA-SHA2 signature types:

In ssh, when an agent fails to return a RSA-SHA2 signature when
requested and falls back to RSA-SHA1 instead, retry the signature to
ens

Improve strictness and control over RSA-SHA2 signature types:

In ssh, when an agent fails to return a RSA-SHA2 signature when
requested and falls back to RSA-SHA1 instead, retry the signature to
ensure that the public key algorithm sent in the SSH_MSG_USERAUTH
matches the one in the signature itself.

In sshd, strictly enforce that the public key algorithm sent in the
SSH_MSG_USERAUTH message matches what appears in the signature.

Make the sshd_config PubkeyAcceptedKeyTypes and
HostbasedAcceptedKeyTypes options control accepted signature algorithms
(previously they selected supported key types). This allows these
options to ban RSA-SHA1 in favour of RSA-SHA2.

Add new signature algorithms "rsa-sha2-256-cert-v01@openssh.com" and
"rsa-sha2-512-cert-v01@openssh.com" to force use of RSA-SHA2 signatures
with certificate keys.

feedback and ok markus@

show more ...


# 972cfb97 14-Feb-2018 jsing <jsing@openbsd.org>

Ensure that D mod (P-1) and D mod (Q-1) are calculated in constant time.

This avoids a potential side channel timing leak.

ok djm@ markus@


# 29420331 07-Feb-2018 jsing <jsing@openbsd.org>

Convert some explicit_bzero()/free() calls to freezero().

ok deraadt@ dtucker@


# d22407ec 18-Dec-2017 djm <djm@openbsd.org>

log mismatched RSA signature types; ok markus@


# 28eeb9e1 18-Dec-2017 djm <djm@openbsd.org>

pass negotiated signing algorithm though to sshkey_verify() and
check that the negotiated algorithm matches the type in the
signature (only matters for RSA SHA1/SHA2 sigs). ok markus@


# 3671ebbe 01-Jul-2017 djm <djm@openbsd.org>

remove post-SSHv1 removal dead code from rsa.c and merge the
remaining bit that it still used into ssh-rsa.c; ok markus


# 654a3af3 07-May-2017 djm <djm@openbsd.org>

Refuse RSA keys <1024 bits in length. Improve reporting for keys that
do not meet this requirement. ok markus@


# 2859dac2 12-Sep-2016 djm <djm@openbsd.org>

handle certs in rsa_hash_alg_from_ident(), saving an unnecessary
special case elsewhere.


# 2fb1ed3c 21-Apr-2016 djm <djm@openbsd.org>

make argument == NULL tests more consistent


# 860b8821 11-Dec-2015 mmcc <mmcc@openbsd.org>

Remove NULL-checks before sshbuf_free().

ok djm@


# 1b895242 10-Dec-2015 mmcc <mmcc@openbsd.org>

Remove NULL-checks before free().

ok dtucker@


# 9fbe1e24 07-Dec-2015 markus <markus@openbsd.org>

stricter encoding type checks for ssh-rsa; ok djm@


1234