#
5411e769 |
| 15-Aug-2024 |
djm <djm@openbsd.org> |
Convert RSA and ECDSA key to the libcrypto EVP_PKEY API. DSA remains unconverted as it will be removed within six months.
Based on patches originally from Dmitry Belyavskiy, but significantly rework
Convert RSA and ECDSA key to the libcrypto EVP_PKEY API. DSA remains unconverted as it will be removed within six months.
Based on patches originally from Dmitry Belyavskiy, but significantly reworked based on feedback from Bob Beck, Joel Sing and especially Theo Buehler (apologies to anyone I've missed).
ok tb@
show more ...
|
#
15d7c2bc |
| 05-Mar-2023 |
dtucker <dtucker@openbsd.org> |
Remove unused compat.h includes. We've previously removed a lot of the really old compatibility code, and with it went the need to include compat.h in most of the files that have it.
|
#
1eb54458 |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
put sshkey_check_rsa_length() back in sshkey.c to unbreak OPENSSL=no builds
|
#
a2c931d9 |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
refactor sshkey_private_deserialize
feedback/ok markus@
|
#
d03db38b |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
refactor sshkey_private_serialize_opt()
feedback/ok markus@
|
#
c5c174fa |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
refactor sshkey_sign() and sshkey_verify()
feedback/ok markus@
|
#
c8d92406 |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
refactor sshkey_from_blob_internal()
feedback/ok markus@
|
#
0d39f001 |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
refactor sshkey_from_private()
feedback/ok markus@
|
#
b6025feb |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
factor out key generation
feedback/ok markus@
|
#
eefcf659 |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
factor out public key serialization
feedback/ok markus@
|
#
712f5ecf |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
factor out sshkey_equal_public()
feedback/ok markus@
|
#
9c1667db |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
begin big refactor of sshkey
Move keytype data and some of the type-specific code (allocation, cleanup, etc) out into each key type's implementation. Subsequent commits will move more, with the goal
begin big refactor of sshkey
Move keytype data and some of the type-specific code (allocation, cleanup, etc) out into each key type's implementation. Subsequent commits will move more, with the goal of having each key-*.c file owning as much of its keytype's implementation as possible.
lots of feedback + ok markus@
show more ...
|
#
7c94020a |
| 13-Sep-2018 |
djm <djm@openbsd.org> |
hold our collective noses and use the openssl-1.1.x API in OpenSSH; feedback and ok tb@ jsing@ markus@
|
#
38a44c4d |
| 03-Jul-2018 |
djm <djm@openbsd.org> |
Improve strictness and control over RSA-SHA2 signature types:
In ssh, when an agent fails to return a RSA-SHA2 signature when requested and falls back to RSA-SHA1 instead, retry the signature to ens
Improve strictness and control over RSA-SHA2 signature types:
In ssh, when an agent fails to return a RSA-SHA2 signature when requested and falls back to RSA-SHA1 instead, retry the signature to ensure that the public key algorithm sent in the SSH_MSG_USERAUTH matches the one in the signature itself.
In sshd, strictly enforce that the public key algorithm sent in the SSH_MSG_USERAUTH message matches what appears in the signature.
Make the sshd_config PubkeyAcceptedKeyTypes and HostbasedAcceptedKeyTypes options control accepted signature algorithms (previously they selected supported key types). This allows these options to ban RSA-SHA1 in favour of RSA-SHA2.
Add new signature algorithms "rsa-sha2-256-cert-v01@openssh.com" and "rsa-sha2-512-cert-v01@openssh.com" to force use of RSA-SHA2 signatures with certificate keys.
feedback and ok markus@
show more ...
|
#
972cfb97 |
| 14-Feb-2018 |
jsing <jsing@openbsd.org> |
Ensure that D mod (P-1) and D mod (Q-1) are calculated in constant time.
This avoids a potential side channel timing leak.
ok djm@ markus@
|
#
29420331 |
| 07-Feb-2018 |
jsing <jsing@openbsd.org> |
Convert some explicit_bzero()/free() calls to freezero().
ok deraadt@ dtucker@
|
#
d22407ec |
| 18-Dec-2017 |
djm <djm@openbsd.org> |
log mismatched RSA signature types; ok markus@
|
#
28eeb9e1 |
| 18-Dec-2017 |
djm <djm@openbsd.org> |
pass negotiated signing algorithm though to sshkey_verify() and check that the negotiated algorithm matches the type in the signature (only matters for RSA SHA1/SHA2 sigs). ok markus@
|
#
3671ebbe |
| 01-Jul-2017 |
djm <djm@openbsd.org> |
remove post-SSHv1 removal dead code from rsa.c and merge the remaining bit that it still used into ssh-rsa.c; ok markus
|
#
654a3af3 |
| 07-May-2017 |
djm <djm@openbsd.org> |
Refuse RSA keys <1024 bits in length. Improve reporting for keys that do not meet this requirement. ok markus@
|
#
2859dac2 |
| 12-Sep-2016 |
djm <djm@openbsd.org> |
handle certs in rsa_hash_alg_from_ident(), saving an unnecessary special case elsewhere.
|
#
2fb1ed3c |
| 21-Apr-2016 |
djm <djm@openbsd.org> |
make argument == NULL tests more consistent
|
#
860b8821 |
| 11-Dec-2015 |
mmcc <mmcc@openbsd.org> |
Remove NULL-checks before sshbuf_free().
ok djm@
|
#
1b895242 |
| 10-Dec-2015 |
mmcc <mmcc@openbsd.org> |
Remove NULL-checks before free().
ok dtucker@
|
#
9fbe1e24 |
| 07-Dec-2015 |
markus <markus@openbsd.org> |
stricter encoding type checks for ssh-rsa; ok djm@
|