| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
indentation on continuation lines. Prompted by GHPR#185
|
|
|
|
|
|
| |
where sizeof(int) != sizeof(long), convtime could accept values
>MAX_INT which subsequently truncate when stored in an int during
config parsing. bz#3250, ok djm@
|
|
|
|
| |
appending ssh_err(r) manually; ok markus@
|
|
|
|
| |
the agent supports them properly
|
|
|
|
| |
bz#3180; ok dtucker@
|
|
|
|
| |
warning on 32bit arches. Spotted by deraadt, ok djm.
|
|
|
|
|
|
|
|
| |
While freezero() returns early if the pointer is NULL the tests for
NULL in callers are left to avoid warnings about passing an
uninitialised size argument across a function boundry.
ok deraadt@ djm@
|
|
|
|
|
| |
the wire format (u32). Prevents integer wraparound of the timeout values.
bz#3119, ok markus@ djm@
|
|
|
|
|
|
|
| |
This replaces "security key" in error/usage/verbose messages and
distinguishes between "authenticator" and "authenticator-hosted key".
ok djm@
|
|
|
|
| |
feedback and ok markus@
|
|
|
|
|
|
|
|
| |
* Rename -O to -K to keep "-O option" available.
* Document -K.
* Trim usage() message down to synopsis, like all other commands.
ok markus@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
operations. These are intended to future-proof the API a little by
making it easier to specify additional fields for without having to
change the API version for each.
At present, only two options are defined: one to explicitly specify
the device for an operation (rather than accepting the middleware's
autoselection) and another to specify the FIDO2 username that may
be used when generating a resident key. These new options may be
invoked at key generation time via ssh-keygen -O
This also implements a suggestion from Markus to avoid "int" in favour
of uint32_t for the algorithm argument in the API, to make implementation
of ssh-sk-client/helper a little easier.
feedback, fixes and ok markus@
|
|
|
|
|
|
|
| |
"ssh-add -O" will load resident keys from a FIDO2 token and add them
to a ssh-agent.
feedback and ok markus@
|
|
|
|
|
|
|
|
|
| |
This is populated during signature verification with additional fields
that are present in and covered by the signature. At the moment, it is
only used to record security key-specific options, especially the flags
field.
with and ok markus@
|
| |
|
|
|
|
|
|
| |
against the (previously external) USB HID middleware. The dlopen()
capability still exists for alternate middlewares, e.g. for
Bluetooth, NFC and test/debugging.
|
| |
|
| |
|
|
|
|
| |
feedback & ok markus@
|
| |
|
|
|
|
|
|
| |
value < 0. errno is only updated in this case. Change all (most?)
callers of syscalls to follow this better, and let's see if this strictness
helps us in the future.
|
|
|
|
| |
Prepares for changes in the way malloc is initialized. ok guenther@ dtucker@
|
|
|
|
|
|
|
|
|
|
| |
verbosity.
Make ssh-agent turn on ssh-pkcs11-helper's verbosity when it is run
in debug mode ("ssh-agent -d"), so we get to see errors from the
PKCS#11 code.
ok markus@
|
|
|
|
|
|
| |
a signature and a verification using each key "ssh-add -T pubkey [...]"
work by markus@, ok djm@
|
|
|
|
|
|
| |
successful operations.
Based on patch from Thijs van Dijk; ok dtucker@ deraadt@
|
|
|
|
|
|
|
| |
The code is not compiled in by default (see WITH_XMSS in Makefile.inc)
Joint work with stefan-lukas_gazdag at genua.eu
See https://tools.ietf.org/html/draft-irtf-cfrg-xmss-hash-based-signatures-12
ok djm@
|
|
|
|
|
|
|
|
| |
if you want to silence ssh-add without this you generally redirect
the output to /dev/null, but that can hide error output which you
should see.
ok djm@
|
|
|
|
| |
remaining bit that it still used into ssh-rsa.c; ok markus
|
| |
|
| |
|
|
|
|
| |
retain SSH v.1 support in the "delete all keys from agent" path.
|
|
|
|
| |
ok markus@
|
|
|
|
| |
deraadt@, something similar has been in the snaps for a while.
|
|
|
|
| |
ok djm@
|
|
|
|
| |
strings; reported by Nicholas Lemonias
|
|
|
|
|
|
|
| |
- Remove unused function argument.
- Remove two unnecessary variables.
OK djm@
|
|
|
|
|
|
| |
user is prompted for a passphrase.
Tweak and OK djm@
|
| |
|
| |
|
|
|
|
| |
ok djm@
|
|
|
|
|
|
| |
not whine and fail if there is none
ok djm@
|
|
|
|
|
|
| |
give the user a chance to notice if unintentionally running without it
wording tweak and ok djm@
|
|
|
|
|
| |
check sshkey_fingerprint return values;
ok markus
|
|
|
|
|
|
|
|
|
| |
possible. Annotate <sys/param.h> lines with their current reasons. Switch
to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc. Change
MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where
sensible to avoid pulling in the pollution. These are the files confirmed
through binary verification.
ok guenther, millert, doug (helped with the verification protocol)
|
|
|
|
| |
ok markus@
|
|
|
|
|
|
|
| |
fingerprints. Default changes from MD5 to SHA256 and format
from hex to base64.
Feedback and ok naddy@ markus@
|
| |
|
|
|
|
| |
ok markus@
|
|
|
|
|
|
| |
ssh-add fatal()s part-way through (e.g. when listing keys from an
agent that supports key types that ssh-add doesn't);
bz#2234, reported by Phil Pennock
|
| |
|