summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* U2F tokens may return FIDO_ERR_USER_PRESENCE_REQUIRED when probed todjm2019-11-151-0/+4
| | | | | see if they own a key handle. Handle this case so the find_device() look can work for them. Reported by Michael Forney
* show the "please touch your security key" notifier when using thedjm2019-11-151-9/+15
| | | | (default) build-in security key support.
* close the "touch your security key" notifier on the error path toodjm2019-11-151-2/+2
|
* correct function name in debug messagedjm2019-11-151-1/+1
|
* follow existing askpass logic for security key notifier: fall backdjm2019-11-151-3/+4
| | | | | to _PATH_SSH_ASKPASS_DEFAULT if no $SSH_ASKPASS environment variable is set.
* remove debugging goop that snuck in to last commitdjm2019-11-141-5/+5
|
* directly support U2F/FIDO2 security keys in OpenSSH by linkingdjm2019-11-1420-41/+779
| | | | | | against the (previously external) USB HID middleware. The dlopen() capability still exists for alternate middlewares, e.g. for Bluetooth, NFC and test/debugging.
* in order to be able to figure out the number of signatures left onmarkus2019-11-131-1/+6
| | | | | a shielded key, we need to transfer the number of signatures left from the private to the public key. ok djm@
* fix check for sig_s; noted by qsa at qualys.commarkus2019-11-131-2/+2
|
* When clients get denied by MaxStartups, send a noification prior todtucker2019-11-131-1/+4
| | | | | the SSH2 protocol banner according to RFC4253 section 4.2. ok djm@ deraadt@ markus@
* fix shield/unshield for xmss keys:markus2019-11-134-15/+64
| | | | | | | | - in ssh-agent we need to delay the call to shield until we have received key specific options. - when serializing xmss keys for shield we need to deal with all optional components (e.g. state might not be loaded). ok djm@
* remove size_t gl_pathc < 0 test, it is invalid. the return value fromderaadt2019-11-131-3/+3
| | | | | glob() is sufficient. discussed with djm
* stdarg.h required more broadly; ok djmderaadt2019-11-1311-11/+22
|
* allow an empty attestation certificate returned by a security keydjm2019-11-121-2/+3
| | | | | | | enrollment - these are possible for tokens that only offer self- attestation. This also needs support from the middleware. ok markus@
* security keys typically need to be tapped/touched in order to performdjm2019-11-123-6/+38
| | | | | | | a signature operation. Notify the user when this is expected via the TTY (if available) or $SSH_ASKPASS if we can. ok markus@
* pass SSH_ASKPASS_PROMPT hint to y/n key confirm toodjm2019-11-121-1/+2
|
* dd API for performing one-shot notifications via tty or SSH_ASKPASSdjm2019-11-122-2/+91
|
* add xvasprintf()djm2019-11-122-8/+17
|
* remove extra layer for ed25519 signature; ok djm@markus2019-11-123-45/+39
|
* check sig_r and sig_s for ssh-sk keys; ok djmmarkus2019-11-121-1/+13
|
* enable ed25519 support; ok djmmarkus2019-11-1212-29/+197
|
* update sk-api to version 2 for ed25519 support; ok djmmarkus2019-11-123-14/+29
|
* implement sshsk_ed25519_assemble(); ok djmmarkus2019-11-122-8/+58
|
* implement sshsk_ed25519_inner_sig(); ok djmmarkus2019-11-123-9/+61
|
* rename sshsk_ecdsa_sign() to sshsk_sign(); ok djmmarkus2019-11-124-11/+11
|
* factor out sshsk_ecdsa_inner_sig(); ok djm@markus2019-11-121-20/+43
|
* factor out sshsk_ecdsa_assemble(); ok djm@markus2019-11-121-37/+59
|
* implement ssh-ed25519-sk verification; ok djm@markus2019-11-124-3/+143
|
* skip demanding -fstack-protector-all on hppa. we never wrote a stack protectorderaadt2019-11-111-1/+3
| | | | | for reverse-stack architectures, and i don't think anyone else did either. a warning per compiled file is just annoying.
* duplicate 'x' character in getopt(3) optstringdjm2019-11-081-2/+2
|
* Fill in missing man page bits for U2F security key support:naddy2019-11-079-44/+177
| | | | | | | | | | | Mention the new key types, the ~/.ssh/id_ecdsa_sk file, ssh's SecurityKeyProvider keyword, the SSH_SK_PROVIDER environment variable, and ssh-keygen's new -w and -x options. Copy the ssh-sk-helper man page from ssh-pkcs11-helper with minimal substitutions. ok djm@
* fix miscellaneous text problems; ok djm@naddy2019-11-011-8/+8
|
* fix a race condition in the SIGCHILD handler that could turn indjm2019-11-011-4/+7
| | | | to a kill(-1); bz3084, reported by Gao Rui, ok dtucker@
* remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL pathdjm2019-11-011-5/+1
|
* sort;jmc2019-11-011-6/+6
|
* undo debugging bits that shouldn't have been committeddjm2019-10-311-3/+3
|
* fix -Wshadow warningdjm2019-10-311-2/+2
|
* Refactor signing - use sshkey_sign for everything, including the newdjm2019-10-3120-86/+94
| | | | | | | | | | | U2F signatures. Don't use sshsk_ecdsa_sign() directly, instead make it reachable via sshkey_sign() like all other signature operations. This means that we need to add a provider argument to sshkey_sign(), so most of this change is mechanically adding that. Suggested by / ok markus@
* ssh-agent support for U2F/FIDO keysdjm2019-10-318-35/+384
| | | | feedback & ok markus@
* ssh AddKeysToAgent support for U2F/FIDO keysdjm2019-10-311-3/+5
| | | | feedback & ok markus@
* ssh-add support for U2F/FIDO keysdjm2019-10-313-14/+40
|
* add new agent key constraint for U2F/FIDO providerdjm2019-10-314-13/+28
| | | | feedback & ok markus@
* ssh client support for U2F/FIDO keysdjm2019-10-315-31/+123
|
* Separate myproposal.h userauth pubkey typesdjm2019-10-312-4/+27
| | | | | | | U2F/FIDO keys are not supported for host authentication, so we need a separate list for user keys. feedback & ok markus@
* ssh-keygen support for generating U2F/FIDO keysdjm2019-10-312-8/+37
|
* U2F/FIDO middleware interfacedjm2019-10-314-1/+490
| | | | | | Supports enrolling (generating) keys and signatures. feedback & ok markus@
* Initial infrastructure for U2F/FIDO supportdjm2019-10-315-31/+381
| | | | | | | Key library support: including allocation, marshalling public/private keys and certificates, signature validation. feedback & ok markus@
* Protocol documentation for U2F/FIDO keys in OpenSSHdjm2019-10-311-0/+224
|
* Signal handler cleanup: remove leftover support for unreliable signalsdtucker2019-10-292-7/+2
| | | | and now-unneeded save and restore of errno. ok deraadt@ markus@
* fixes from lucas;jmc2019-10-221-4/+5
|