index
:
openssh.git
master
sid
ssh_8.3
v7.9
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
ssh-keygen.c
Age
Commit message (
Expand
)
Author
2020-01-21
upstream: don't #ifdef out the KRL code when compiling without
djm@openbsd.org
2020-01-21
upstream: sync ssh-keygen.1 and ssh-keygen's usage() with each
naddy@openbsd.org
2020-01-06
upstream: Extends the SK API to accept a set of key/value options
djm@openbsd.org
2020-01-03
upstream: ability to download FIDO2 resident keys from a token via
djm@openbsd.org
2019-12-30
upstream: Remove the -x option currently used for
djm@openbsd.org
2019-12-30
upstream: translate and return error codes; retry on bad PIN
djm@openbsd.org
2019-12-30
upstream: SK API and sk-helper error/PIN passing
djm@openbsd.org
2019-12-30
upstream: basic support for generating FIDO2 resident keys
djm@openbsd.org
2019-12-30
upstream: remove single-letter flags for moduli options
djm@openbsd.org
2019-12-30
upstream: prepare for use of ssh-keygen -O flag beyond certs
djm@openbsd.org
2019-12-14
remove a bunch of ENABLE_SK #ifdefs
Damien Miller
2019-12-11
upstream: when acting as a CA and using a security key as the CA
djm@openbsd.org
2019-11-25
upstream: Print a key touch reminder when generating a security
djm@openbsd.org
2019-11-25
upstream: allow "ssh-keygen -x no-touch-required" when generating a
djm@openbsd.org
2019-11-25
upstream: add a "no-touch-required" option for authorized_keys and
djm@openbsd.org
2019-11-25
upstream: Add new structure for signature options
djm@openbsd.org
2019-11-20
upstream: more missing mentions of ed25519-sk; ok djm@
naddy@openbsd.org
2019-11-20
upstream: additional missing stdarg.h includes when built without
naddy@openbsd.org
2019-11-18
upstream: Fix incorrect error message when key certification fails
djm@openbsd.org
2019-11-18
upstream: allow *-sk key types to be turned into certificates
djm@openbsd.org
2019-11-18
upstream: missing break in getopt switch; spotted by Sebastian Kinne
djm@openbsd.org
2019-11-15
upstream: directly support U2F/FIDO2 security keys in OpenSSH by
djm@openbsd.org
2019-11-13
upstream: security keys typically need to be tapped/touched in
djm@openbsd.org
2019-11-13
Remove leftover if statement from sync.
Darren Tucker
2019-11-13
upstream: enable ed25519 support; ok djm
markus@openbsd.org
2019-11-11
upstream: duplicate 'x' character in getopt(3) optstring
djm@openbsd.org
2019-11-08
upstream: Fill in missing man page bits for U2F security key support:
naddy@openbsd.org
2019-11-01
autoconf pieces for U2F support
Damien Miller
2019-11-01
upstream: fix -Wshadow warning
djm@openbsd.org
2019-11-01
upstream: Refactor signing - use sshkey_sign for everything,
djm@openbsd.org
2019-11-01
upstream: ssh-keygen support for generating U2F/FIDO keys
djm@openbsd.org
2019-10-16
upstream: free buf before return; reported by krishnaiah bommu
djm@openbsd.org
2019-10-09
wrap stdint.h include in HAVE_STDINT_H
Damien Miller
2019-10-04
upstream: use a more common options order in SYNOPSIS and sync
jmc@openbsd.org
2019-10-02
upstream: thinko in previous; spotted by Mantas
djm@openbsd.org
2019-10-02
upstream: ban empty namespace strings for s
djm@openbsd.org
2019-10-01
upstream: group and sort single letter options; ok deraadt
jmc@openbsd.org
2019-10-01
upstream: identity_file[] should be PATH_MAX, not the arbitrary
deraadt@openbsd.org
2019-09-16
upstream: Allow testing signature syntax and validity without verifying
djm@openbsd.org
2019-09-08
upstream: key conversion should fail for !openssl builds, not fall
djm@openbsd.org
2019-09-06
upstream: fixes for !WITH_OPENSSL compilation; ok dtucker@
djm@openbsd.org
2019-09-06
upstream: lots of things were relying on libcrypto headers to
djm@openbsd.org
2019-09-05
upstream: repair typo and editing mishap
naddy@openbsd.org
2019-09-03
upstream: sshsig tweaks and improvements from and suggested by
djm@openbsd.org
2019-09-03
upstream: sshsig: lightweight signature and verification ability
djm@openbsd.org
2019-09-03
upstream: factor out confirm_overwrite(); ok markus@
djm@openbsd.org
2019-09-03
upstream: constify an argument
djm@openbsd.org
2019-09-02
upstream: print comment when printing pubkey from private
djm@openbsd.org
2019-08-08
upstream: Allow the maximimum uint32 value for the argument passed to
dtucker@openbsd.org
2019-08-08
upstream: Many key types are supported now, so take care to check
naddy@openbsd.org
[next]