History log of /openssh-portable/ssh-keygen.c (Results 1 - 25 of 729)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
# 6500c3bc 16-Oct-2019 djm@openbsd.org

upstream: free buf before return; reported by krishnaiah bommu

OpenBSD-Commit-ID: 091bb23a6e913af5d4f72c50030b53ce1cef4de1


Revision tags: V_8_1_P1
# cfc1897a 08-Oct-2019 Damien Miller

wrap stdint.h include in HAVE_STDINT_H

make the indenting a little more consistent too..

Fixes Solaris 2.6; reported by Tom G. Christensen


# 69189744 03-Oct-2019 jmc@openbsd.org

upstream: use a more common options order in SYNOPSIS and sync

usage(); while here, no need for Bk/Ek;

ok dtucker

OpenBSD-Commit-ID: 38715c3f10b166f599a2283eb7bc14860211bb90


# feff96b7 02-Oct-2019 djm@openbsd.org

upstream: thinko in previous; spotted by Mantas

=?UTF-8?q?=20Mikul=C4=97nas?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

O

upstream: thinko in previous; spotted by Mantas

=?UTF-8?q?=20Mikul=C4=97nas?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

OpenBSD-Commit-ID: ffa3f5a45e09752fc47d9041e2203ee2ec15b24d

show more ...


# dc6f81ee 02-Oct-2019 djm@openbsd.org

upstream: ban empty namespace strings for s

=?UTF-8?q?shsig;=20spotted=20by=20Mantas=20Mikul=C4=97nas?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer

upstream: ban empty namespace strings for s

=?UTF-8?q?shsig;=20spotted=20by=20Mantas=20Mikul=C4=97nas?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

OpenBSD-Commit-ID: 7c5bcf40bed8f4e826230176f4aa353c52aeb698

show more ...


# 6c91d42c 29-Sep-2019 jmc@openbsd.org

upstream: group and sort single letter options; ok deraadt

OpenBSD-Commit-ID: e1480e760a2b582f79696cdcff70098e23fc603f


# 3e53ef28 24-Sep-2019 deraadt@openbsd.org

upstream: identity_file[] should be PATH_MAX, not the arbitrary

number 1024

OpenBSD-Commit-ID: e775f94ad47ce9ab37bd1410d7cf3b7ea98b11b7


# 8aa2aa3c 15-Sep-2019 djm@openbsd.org

upstream: Allow testing signature syntax and validity without verifying

that a signature came from a trusted signer. To discourage accidental or
unintentional use, this is invoked by the

upstream: Allow testing signature syntax and validity without verifying

that a signature came from a trusted signer. To discourage accidental or
unintentional use, this is invoked by the deliberately ugly option name
"check-novalidate"

from Sebastian Kinne

OpenBSD-Commit-ID: cea42c36ab7d6b70890e2d8635c1b5b943adcc0b

show more ...


# c8bdd2db 06-Sep-2019 djm@openbsd.org

upstream: key conversion should fail for !openssl builds, not fall

through to the key generation code

OpenBSD-Commit-ID: b957436adc43c4941e61d61958a193a708bc83c9


# 670104b9 06-Sep-2019 djm@openbsd.org

upstream: fixes for !WITH_OPENSSL compilation; ok dtucker@

OpenBSD-Commit-ID: 7fd68eaa9e0f7482b5d4c7e8d740aed4770a839f


# be02d7cb 06-Sep-2019 djm@openbsd.org

upstream: lots of things were relying on libcrypto headers to

transitively include various system headers (mostly stdlib.h); include them
explicitly

OpenBSD-Commit-ID: 5b522f4f2

upstream: lots of things were relying on libcrypto headers to

transitively include various system headers (mostly stdlib.h); include them
explicitly

OpenBSD-Commit-ID: 5b522f4f2d844f78bf1cc4f3f4cc392e177b2080

show more ...


# 0f44e595 03-Sep-2019 naddy@openbsd.org

upstream: repair typo and editing mishap

OpenBSD-Commit-ID: d125ab720ca71ccf9baf83e08ddc8c12a328597e


# d637c4ae 03-Sep-2019 djm@openbsd.org

upstream: sshsig tweaks and improvements from and suggested by

Markus

ok markus/me

OpenBSD-Commit-ID: ea4f46ad5a16b27af96e08c4877423918c4253e9


# 2a9c9f72 03-Sep-2019 djm@openbsd.org

upstream: sshsig: lightweight signature and verification ability

for OpenSSH

This adds a simple manual signature scheme to OpenSSH.
Signatures can be made and verified using ssh

upstream: sshsig: lightweight signature and verification ability

for OpenSSH

This adds a simple manual signature scheme to OpenSSH.
Signatures can be made and verified using ssh-keygen -Y sign|verify

Signatures embed the key used to make them. At verification time, this
is matched via principal name against an authorized_keys-like list
of allowed signers.

Mostly by Sebastian Kinne w/ some tweaks by me

ok markus@

OpenBSD-Commit-ID: 2ab568e7114c933346616392579d72be65a4b8fb

show more ...


# 85443f16 03-Sep-2019 djm@openbsd.org

upstream: factor out confirm_overwrite(); ok markus@

OpenBSD-Commit-ID: 304e95381b39c774c8fced7e5328b106a3ff0400


# 9a396e33 02-Sep-2019 djm@openbsd.org

upstream: constify an argument

OpenBSD-Commit-ID: 724bafc9f993746ad4303e95bede2c030de6233b


# 0713322e 01-Sep-2019 djm@openbsd.org

upstream: print comment when printing pubkey from private

bz#3052; ok dtucker

OpenBSD-Commit-ID: a91b2a8d5f1053d34d7fce44523c53fb534ba914


# 7afc45c3 08-Aug-2019 dtucker@openbsd.org

upstream: Allow the maximimum uint32 value for the argument passed to

-b which allows better error messages from later validation. bz#3050, ok
djm@

OpenBSD-Commit-ID: 10adf6876

upstream: Allow the maximimum uint32 value for the argument passed to

-b which allows better error messages from later validation. bz#3050, ok
djm@

OpenBSD-Commit-ID: 10adf6876b2401b3dc02da580ebf67af05861673

show more ...


# c31e4f5f 05-Aug-2019 naddy@openbsd.org

upstream: Many key types are supported now, so take care to check

the size restrictions and apply the default size only to the matching key
type. tweak and ok dtucker@

OpenBSD-C

upstream: Many key types are supported now, so take care to check

the size restrictions and apply the default size only to the matching key
type. tweak and ok dtucker@

OpenBSD-Commit-ID: b825de92d79cc4cba19b298c61e99909488ff57e

show more ...


# bca05820 18-Jul-2019 djm@openbsd.org

upstream: Accept the verbose flag when searching for host keys in known

hosts (i.e. "ssh-keygen -vF host") to print the matching host's random- art
signature too. bz#3003 "amusing, prett

upstream: Accept the verbose flag when searching for host keys in known

hosts (i.e. "ssh-keygen -vF host") to print the matching host's random- art
signature too. bz#3003 "amusing, pretty" deraadt@

OpenBSD-Commit-ID: 686221a5447d6507f40a2ffba5393984d889891f

show more ...


# 16dd8b2c 16-Jul-2019 djm@openbsd.org

upstream: remove mostly vestigal uuencode.[ch]; moving the only unique

functionality there (wrapping of base64-encoded data) to sshbuf functions;
feedback and ok markus@

OpenBSD

upstream: remove mostly vestigal uuencode.[ch]; moving the only unique

functionality there (wrapping of base64-encoded data) to sshbuf functions;
feedback and ok markus@

OpenBSD-Commit-ID: 4dba6735d88c57232f6fccec8a08bdcfea44ac4c

show more ...


# eb0d8e70 15-Jul-2019 djm@openbsd.org

upstream: support PKCS8 as an optional format for storage of

private keys, enabled via "ssh-keygen -m PKCS8" on operations that save
private keys to disk.

The OpenSSH native key

upstream: support PKCS8 as an optional format for storage of

private keys, enabled via "ssh-keygen -m PKCS8" on operations that save
private keys to disk.

The OpenSSH native key format remains the default, but PKCS8 is a
superior format to PEM if interoperability with non-OpenSSH software
is required, as it may use a less terrible KDF (IIRC PEM uses a single
round of MD5 as a KDF).

adapted from patch by Jakub Jelen via bz3013; ok markus

OpenBSD-Commit-ID: 027824e3bc0b1c243dc5188504526d73a55accb1

show more ...


# cec9ee52 05-Jul-2019 djm@openbsd.org

upstream: revert header removal that snuck into previous

OpenBSD-Commit-ID: 3919cdd58989786660b8269b325646ef8856428e


# 569b650f 05-Jul-2019 djm@openbsd.org

upstream: add a local implementation of BSD realpath() for

sftp-server use ahead of OpenBSD's realpath changing to match POSIX;

ok deraadt@ (thanks for snaps testing)

OpenB

upstream: add a local implementation of BSD realpath() for

sftp-server use ahead of OpenBSD's realpath changing to match POSIX;

ok deraadt@ (thanks for snaps testing)

OpenBSD-Commit-ID: 4f8cbf7ed8679f6237264301d104ecec64885d55

show more ...


# 4d28fa78 28-Jun-2019 deraadt@openbsd.org

upstream: When system calls indicate an error they return -1, not

some arbitrary value < 0. errno is only updated in this case. Change all
(most?) callers of syscalls to follow this be

upstream: When system calls indicate an error they return -1, not

some arbitrary value < 0. errno is only updated in this case. Change all
(most?) callers of syscalls to follow this better, and let's see if this
strictness helps us in the future.

OpenBSD-Commit-ID: 48081f00db7518e3b712a49dca06efc2a5428075

show more ...


12345678910>>...30