#
52113de9 |
| 11-Jan-2024 |
djm <djm@openbsd.org> |
make DSA key support compile-time optional, defaulting to on
ok markus@
|
#
15d7c2bc |
| 05-Mar-2023 |
dtucker <dtucker@openbsd.org> |
Remove unused compat.h includes. We've previously removed a lot of the really old compatibility code, and with it went the need to include compat.h in most of the files that have it.
|
#
a2c931d9 |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
refactor sshkey_private_deserialize
feedback/ok markus@
|
#
d03db38b |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
refactor sshkey_private_serialize_opt()
feedback/ok markus@
|
#
c5c174fa |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
refactor sshkey_sign() and sshkey_verify()
feedback/ok markus@
|
#
c8d92406 |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
refactor sshkey_from_blob_internal()
feedback/ok markus@
|
#
0d39f001 |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
refactor sshkey_from_private()
feedback/ok markus@
|
#
b6025feb |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
factor out key generation
feedback/ok markus@
|
#
eefcf659 |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
factor out public key serialization
feedback/ok markus@
|
#
712f5ecf |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
factor out sshkey_equal_public()
feedback/ok markus@
|
#
9c1667db |
| 28-Oct-2022 |
djm <djm@openbsd.org> |
begin big refactor of sshkey
Move keytype data and some of the type-specific code (allocation, cleanup, etc) out into each key type's implementation. Subsequent commits will move more, with the goal
begin big refactor of sshkey
Move keytype data and some of the type-specific code (allocation, cleanup, etc) out into each key type's implementation. Subsequent commits will move more, with the goal of having each key-*.c file owning as much of its keytype's implementation as possible.
lots of feedback + ok markus@
show more ...
|
#
c9831b39 |
| 26-Feb-2020 |
jsg <jsg@openbsd.org> |
change explicit_bzero();free() to freezero()
While freezero() returns early if the pointer is NULL the tests for NULL in callers are left to avoid warnings about passing an uninitialised size argume
change explicit_bzero();free() to freezero()
While freezero() returns early if the pointer is NULL the tests for NULL in callers are left to avoid warnings about passing an uninitialised size argument across a function boundry.
ok deraadt@ djm@
show more ...
|
#
7c94020a |
| 13-Sep-2018 |
djm <djm@openbsd.org> |
hold our collective noses and use the openssl-1.1.x API in OpenSSH; feedback and ok tb@ jsing@ markus@
|
#
e7fab504 |
| 07-Feb-2018 |
jsing <jsing@openbsd.org> |
Remove all guards for calls to OpenSSL free functions - all of these functions handle NULL, from at least OpenSSL 1.0.1g onwards.
Prompted by dtucker@ asking about guards for RSA_free(), when lookin
Remove all guards for calls to OpenSSL free functions - all of these functions handle NULL, from at least OpenSSL 1.0.1g onwards.
Prompted by dtucker@ asking about guards for RSA_free(), when looking at openssh-portable pr#84 on github.
ok deraadt@ dtucker@
show more ...
|
#
672fe979 |
| 23-Jan-2018 |
djm <djm@openbsd.org> |
Drop compatibility hacks for some ancient SSH implementations, including ssh.com <=2.* and OpenSSH <= 3.*.
These versions were all released in or before 2001 and predate the final SSH RFCs. The hack
Drop compatibility hacks for some ancient SSH implementations, including ssh.com <=2.* and OpenSSH <= 3.*.
These versions were all released in or before 2001 and predate the final SSH RFCs. The hacks in question aren't necessary for RFC- compliant SSH implementations.
ok markus@
show more ...
|
#
2fb1ed3c |
| 21-Apr-2016 |
djm <djm@openbsd.org> |
make argument == NULL tests more consistent
|
#
860b8821 |
| 11-Dec-2015 |
mmcc <mmcc@openbsd.org> |
Remove NULL-checks before sshbuf_free().
ok djm@
|
#
1b895242 |
| 10-Dec-2015 |
mmcc <mmcc@openbsd.org> |
Remove NULL-checks before free().
ok dtucker@
|
#
ea2d8289 |
| 24-Jun-2014 |
djm <djm@openbsd.org> |
New key API: refactor key-related functions to be more library-like, existing API is offered as a set of wrappers.
with and ok markus@
Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matt
New key API: refactor key-related functions to be more library-like, existing API is offered as a set of wrappers.
with and ok markus@
Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew Dempsky and Ron Bowes for a detailed review a few months ago.
show more ...
|
#
c671dcf1 |
| 02-Feb-2014 |
djm <djm@openbsd.org> |
convert memset of potentially-private data to explicit_bzero()
|
#
8df5df93 |
| 09-Jan-2014 |
djm <djm@openbsd.org> |
Introduce digest API and use it to perform all hashing operations rather than calling OpenSSL EVP_Digest* directly. Will make it easier to build a reduced-feature OpenSSH without OpenSSL in future; f
Introduce digest API and use it to perform all hashing operations rather than calling OpenSSL EVP_Digest* directly. Will make it easier to build a reduced-feature OpenSSH without OpenSSL in future; feedback, ok markus@
show more ...
|
#
fda9d0f9 |
| 27-Dec-2013 |
djm <djm@openbsd.org> |
make the original RSA and DSA signing/verification code look more like the ECDSA/Ed25519 ones: use key_type_plain() when checking the key type rather than tediously listing all variants, use __func__
make the original RSA and DSA signing/verification code look more like the ECDSA/Ed25519 ones: use key_type_plain() when checking the key type rather than tediously listing all variants, use __func__ for debug/ error messages
show more ...
|
#
0d40fefd |
| 17-May-2013 |
djm <djm@openbsd.org> |
bye, bye xfree(); ok markus@
|
#
867f0cff |
| 31-Aug-2010 |
djm <djm@openbsd.org> |
Add buffer_get_cstring() and related functions that verify that the string extracted from the buffer contains no embedded \0 characters* This prevents random (possibly malicious) crap from being appe
Add buffer_get_cstring() and related functions that verify that the string extracted from the buffer contains no embedded \0 characters* This prevents random (possibly malicious) crap from being appended to strings where it would not be noticed if the string is used with a string(3) function.
Use the new API in a few sensitive places.
* actually, we allow a single one at the end of the string for now because we don't know how many deployed implementations get this wrong, but don't count on this to remain indefinitely.
show more ...
|
#
c3ded031 |
| 16-Apr-2010 |
djm <djm@openbsd.org> |
revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with the following changes:
move the nonce field to the beginning of the certificate where it can better protect against chosen-prefix a
revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with the following changes:
move the nonce field to the beginning of the certificate where it can better protect against chosen-prefix attacks on the signature hash
Rename "constraints" field to "critical options"
Add a new non-critical "extensions" field
Add a serial number
The older format is still support for authentication and cert generation (use "ssh-keygen -t v00 -s ca_key ..." to generate a v00 certificate)
ok markus@
show more ...
|