| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
via $SSH_ASKPASS_REQUIRE, including force-enable/disable.
bz#69 ok markus@
|
|
|
|
| |
bz#3180; ok dtucker@
|
|
|
|
|
| |
that of the SecurityKeyProvider ssh/sshd_config(5) directive, as the
latter was more descriptive.
|
|
|
|
|
|
|
|
| |
* Rename -O to -K to keep "-O option" available.
* Document -K.
* Trim usage() message down to synopsis, like all other commands.
ok markus@
|
|
|
|
|
| |
The polysemous use of "key" was too confusing. Input from markus@.
ok jmc@
|
|
|
|
| |
ok markus
|
| |
|
| |
|
|
|
|
|
|
| |
against the (previously external) USB HID middleware. The dlopen()
capability still exists for alternate middlewares, e.g. for
Bluetooth, NFC and test/debugging.
|
|
|
|
|
|
|
|
|
|
|
| |
Mention the new key types, the ~/.ssh/id_ecdsa_sk file, ssh's
SecurityKeyProvider keyword, the SSH_SK_PROVIDER environment variable,
and ssh-keygen's new -w and -x options.
Copy the ssh-sk-helper man page from ssh-pkcs11-helper with minimal
substitutions.
ok djm@
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
verbosity.
Make ssh-agent turn on ssh-pkcs11-helper's verbosity when it is run
in debug mode ("ssh-agent -d"), so we get to see errors from the
PKCS#11 code.
ok markus@
|
|
|
|
|
|
| |
- since "..." denotes optional, no need to surround it in []
ok djm
|
|
|
|
|
|
| |
a signature and a verification using each key "ssh-add -T pubkey [...]"
work by markus@, ok djm@
|
| |
|
|
|
|
|
|
|
|
| |
if you want to silence ssh-add without this you generally redirect
the output to /dev/null, but that can hide error output which you
should see.
ok djm@
|
| |
|
| |
|
|
|
|
| |
diff originally from jiri b;
|
|
|
|
|
|
|
| |
fingerprints. Default changes from MD5 to SHA256 and format
from hex to base64.
Feedback and ok naddy@ markus@
|
|
|
|
| |
ok djm@
|
| |
|
| |
|
|
|
|
|
| |
try to delete the corresponding certificate too and respect the -k option
to allow deleting of the key only; feedback and ok markus@
|
|
|
|
| |
"looks ok" markus@
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer
better performance than plain DH and DSA at the same equivalent symmetric
key length, as well as much shorter keys.
Only the mandatory sections of RFC5656 are implemented, specifically the
three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and
ECDSA. Point compression (optional in RFC5656 is NOT implemented).
Certificate host and user keys using the new ECDSA key types are supported.
Note that this code has not been tested for interoperability and may be
subject to change.
feedback and ok markus@
|
|
|
|
| |
they are present; feedback and ok jmc@
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-11/v2-20/pkcs-11v2-20.pdf
ssh(1) and ssh-keygen(1) use dlopen(3) directly to talk to a PKCS#11
provider (shared library) while ssh-agent(1) delegates PKCS#11 to
a forked a ssh-pkcs11-helper process.
PKCS#11 is currently a compile time option.
feedback and ok djm@; inspired by patches from Alon Bar-Lev
|
|
|
|
|
|
|
|
| |
few remaining ".Tn UNIX" macros with ".Ux" ones.
pointed out by ratchov@, thanks!
ok jmc@
|
|
|
|
| |
ok jmc@
|
| |
|
|
|
|
|
| |
new text based on some provided by andrewmc-debian AT celt.dias.ie;
ok dtucker@
|
| |
|
|
|
|
| |
that we do (bz #623); ok deraadt@
|
| |
|
|
|
|
|
|
| |
originally from a pr from f at obiit dot org, but missed by myself;
ok markus@ matthieu@
|
| |
|
|
|
|
|
|
|
|
|
| |
- COMPATIBILITY merge
- macro cleanup
- kill whitespace at EOL
- new sentence, new line
ssh pages ok markus@
|
|
|
|
|
|
|
| |
- new sentence new line
- .Bk for arguments
ok markus@
|
| |
|
|
|
|
| |
private agent key is used; with djm@; test by dugsong@, djm@; ok deraadt@
|
| |
|
|
|
|
| |
use '-t 2h' etc. ok markus@ provos@
|
| |
|
|
|
|
| |
todo: encrypt private keys with locked...
|