summaryrefslogtreecommitdiff
path: root/ssh-keygen.c
AgeCommit message (Expand)Author
2019-11-15upstream: directly support U2F/FIDO2 security keys in OpenSSH bydjm@openbsd.org
2019-11-13upstream: security keys typically need to be tapped/touched indjm@openbsd.org
2019-11-13Remove leftover if statement from sync.Darren Tucker
2019-11-13upstream: enable ed25519 support; ok djmmarkus@openbsd.org
2019-11-11upstream: duplicate 'x' character in getopt(3) optstringdjm@openbsd.org
2019-11-08upstream: Fill in missing man page bits for U2F security key support:naddy@openbsd.org
2019-11-01autoconf pieces for U2F supportDamien Miller
2019-11-01upstream: fix -Wshadow warningdjm@openbsd.org
2019-11-01upstream: Refactor signing - use sshkey_sign for everything,djm@openbsd.org
2019-11-01upstream: ssh-keygen support for generating U2F/FIDO keysdjm@openbsd.org
2019-10-16upstream: free buf before return; reported by krishnaiah bommudjm@openbsd.org
2019-10-09wrap stdint.h include in HAVE_STDINT_HDamien Miller
2019-10-04upstream: use a more common options order in SYNOPSIS and syncjmc@openbsd.org
2019-10-02upstream: thinko in previous; spotted by Mantasdjm@openbsd.org
2019-10-02upstream: ban empty namespace strings for sdjm@openbsd.org
2019-10-01upstream: group and sort single letter options; ok deraadtjmc@openbsd.org
2019-10-01upstream: identity_file[] should be PATH_MAX, not the arbitraryderaadt@openbsd.org
2019-09-16upstream: Allow testing signature syntax and validity without verifyingdjm@openbsd.org
2019-09-08upstream: key conversion should fail for !openssl builds, not falldjm@openbsd.org
2019-09-06upstream: fixes for !WITH_OPENSSL compilation; ok dtucker@djm@openbsd.org
2019-09-06upstream: lots of things were relying on libcrypto headers todjm@openbsd.org
2019-09-05upstream: repair typo and editing mishapnaddy@openbsd.org
2019-09-03upstream: sshsig tweaks and improvements from and suggested bydjm@openbsd.org
2019-09-03upstream: sshsig: lightweight signature and verification abilitydjm@openbsd.org
2019-09-03upstream: factor out confirm_overwrite(); ok markus@djm@openbsd.org
2019-09-03upstream: constify an argumentdjm@openbsd.org
2019-09-02upstream: print comment when printing pubkey from privatedjm@openbsd.org
2019-08-08upstream: Allow the maximimum uint32 value for the argument passed todtucker@openbsd.org
2019-08-08upstream: Many key types are supported now, so take care to checknaddy@openbsd.org
2019-07-19upstream: Accept the verbose flag when searching for host keys in knowndjm@openbsd.org
2019-07-16upstream: remove mostly vestigal uuencode.[ch]; moving the only uniquedjm@openbsd.org
2019-07-15upstream: support PKCS8 as an optional format for storage ofdjm@openbsd.org
2019-07-08upstream: revert header removal that snuck into previousdjm@openbsd.org
2019-07-08upstream: add a local implementation of BSD realpath() fordjm@openbsd.org
2019-07-05upstream: When system calls indicate an error they return -1, notderaadt@openbsd.org
2019-06-21upstream: Add protection for private keys at rest in RAM againstdjm@openbsd.org
2019-06-08upstream: Replace calls to ssh_malloc_init() by a static init ofotto@openbsd.org
2019-06-08upstream: Make the standard output messages of both methods oflum@openbsd.org
2019-03-26upstream: Expand comment to document rationale for default keydtucker@openbsd.org
2019-03-26upstream: Increase the default RSA key size to 3072 bits. Based ondtucker@openbsd.org
2019-02-11upstream: ssh-keygen -D pkcs11.so needs to initialize pkcs11benno@openbsd.org
2019-01-23upstream: allow auto-incrementing certificate serial number for certsdjm@openbsd.org
2019-01-23upstream: move a bunch of global flag variables to main(); make thedjm@openbsd.org
2019-01-23upstream: add -m to usage(); reminded by jmc@djm@openbsd.org
2018-11-23refactor libcrypto initialisationDamien Miller
2018-11-10Fix error message w/out nistp521.Manoj Ampalam
2018-10-22upstream: when printing certificate contents "ssh-keygen -Lfdjm@openbsd.org
2018-09-14upstream: garbage-collect moribund ssh_new_private() API.djm@openbsd.org
2018-09-13upstream: hold our collective noses and use the openssl-1.1.x API indjm@openbsd.org
2018-09-12upstream: allow key revocation by SHA256 hash and allow ssh-keygendjm@openbsd.org