···3434http://www.openssh.com/txt/draft-miller-secsh-compression-delayed-00.txt
353536361.3. transport: New public key algorithms "ssh-rsa-cert-v01@openssh.com",
3737- "ssh-dsa-cert-v01@openssh.com",
3837 "ecdsa-sha2-nistp256-cert-v01@openssh.com",
3938 "ecdsa-sha2-nistp384-cert-v01@openssh.com" and
4039 "ecdsa-sha2-nistp521-cert-v01@openssh.com"
···765764of the public key algorithm name followed by a base64-encoded key blob.
766765The public key blob (before base64 encoding) is the same format used for
767766the encoding of public keys sent on the wire: as described in RFC4253
768768-section 6.6 for RSA and DSA keys, RFC5656 section 3.1 for ECDSA keys
769769-and the "New public key formats" section of PROTOCOL.certkeys for the
770770-OpenSSH certificate formats.
767767+section 6.6 for RSA keys, RFC5656 section 3.1 for ECDSA keys and
768768+https://datatracker.ietf.org/doc/draft-miller-ssh-cert/
769769+for the OpenSSH certificate formats.
7717707727715.2 Private key format
773772774773OpenSSH private keys, as generated by ssh-keygen(1) use the format
775774described in PROTOCOL.key by default. As a legacy option, PEM format
776776-(RFC7468) private keys are also supported for RSA, DSA and ECDSA keys
775775+(RFC7468) private keys are also supported for RSA and ECDSA keys
777776and were the default format before OpenSSH 7.8.
7787777797785.3 KRL format
···792791OpenSSH extends the usual agent protocol. These changes are documented
793792in the PROTOCOL.agent file.
794793795795-$OpenBSD: PROTOCOL,v 1.56 2025/05/05 05:51:11 djm Exp $
794794+$OpenBSD: PROTOCOL,v 1.57 2025/05/06 05:40:56 djm Exp $
+1-3
usr.bin/ssh/authfd.c
···11-/* $OpenBSD: authfd.c,v 1.134 2023/12/18 14:46:56 djm Exp $ */
11+/* $OpenBSD: authfd.c,v 1.135 2025/05/06 05:40:56 djm Exp $ */
22/*
33 * Author: Tatu Ylonen <ylo@cs.hut.fi>
44 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
···600600#ifdef WITH_OPENSSL
601601 case KEY_RSA:
602602 case KEY_RSA_CERT:
603603- case KEY_DSA:
604604- case KEY_DSA_CERT:
605603 case KEY_ECDSA:
606604 case KEY_ECDSA_CERT:
607605 case KEY_ECDSA_SK:
+1-2
usr.bin/ssh/authfile.c
···11-/* $OpenBSD: authfile.c,v 1.145 2024/09/22 12:56:21 jsg Exp $ */
11+/* $OpenBSD: authfile.c,v 1.146 2025/05/06 05:40:56 djm Exp $ */
22/*
33 * Copyright (c) 2000, 2013 Markus Friedl. All rights reserved.
44 *
···323323 switch (type) {
324324#ifdef WITH_OPENSSL
325325 case KEY_RSA:
326326- case KEY_DSA:
327326 case KEY_ECDSA:
328327#endif /* WITH_OPENSSL */
329328 case KEY_ED25519:
···11-/* $OpenBSD: hostfile.c,v 1.98 2025/05/05 02:48:07 djm Exp $ */
11+/* $OpenBSD: hostfile.c,v 1.99 2025/05/06 05:40:56 djm Exp $ */
22/*
33 * Author: Tatu Ylonen <ylo@cs.hut.fi>
44 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
···148148}
149149150150/*
151151- * Parses an RSA (number of bits, e, n) or DSA key from a string. Moves the
152152- * pointer over the key. Skips any whitespace at the beginning and at end.
151151+ * Parses an RSA key from a string. Moves the pointer over the key.
152152+ * Skips any whitespace at the beginning and at end.
153153 */
154154155155int
+1-3
usr.bin/ssh/pathnames.h
···11-/* $OpenBSD: pathnames.h,v 1.34 2025/05/05 02:48:06 djm Exp $ */
11+/* $OpenBSD: pathnames.h,v 1.35 2025/05/06 05:40:56 djm Exp $ */
2233/*
44 * Author: Tatu Ylonen <ylo@cs.hut.fi>
···3030 */
3131#define _PATH_SERVER_CONFIG_FILE SSHDIR "/sshd_config"
3232#define _PATH_HOST_CONFIG_FILE SSHDIR "/ssh_config"
3333-#define _PATH_HOST_DSA_KEY_FILE SSHDIR "/ssh_host_dsa_key"
3433#define _PATH_HOST_ECDSA_KEY_FILE SSHDIR "/ssh_host_ecdsa_key"
3534#define _PATH_HOST_RSA_KEY_FILE SSHDIR "/ssh_host_rsa_key"
3635#define _PATH_HOST_ED25519_KEY_FILE SSHDIR "/ssh_host_ed25519_key"
···7574 * Name of the default file containing client-side authentication key. This
7675 * file should only be readable by the user him/herself.
7776 */
7878-#define _PATH_SSH_CLIENT_ID_DSA _PATH_SSH_USER_DIR "/id_dsa"
7977#define _PATH_SSH_CLIENT_ID_ECDSA _PATH_SSH_USER_DIR "/id_ecdsa"
8078#define _PATH_SSH_CLIENT_ID_RSA _PATH_SSH_USER_DIR "/id_rsa"
8179#define _PATH_SSH_CLIENT_ID_ED25519 _PATH_SSH_USER_DIR "/id_ed25519"