History log of /openbsd-src/usr.bin/ssh/ssh-add.c (Results 1 – 25 of 173)
Revision Date Author Comments
# 93d5c996 06-Sep-2024 djm <djm@openbsd.org>

make parsing user@host consistently look for the last '@' in the
string rather than the first. This makes it possible to use usernames
that contain '@' characters.

Prompted by Max Zettlmeißl; feedba

make parsing user@host consistently look for the last '@' in the
string rather than the first. This makes it possible to use usernames
that contain '@' characters.

Prompted by Max Zettlmeißl; feedback/ok millert@

show more ...


# 52113de9 11-Jan-2024 djm <djm@openbsd.org>

make DSA key support compile-time optional, defaulting to on

ok markus@


# 0956b51c 08-Jan-2024 djm <djm@openbsd.org>

fix typo; spotted by Albert Chin


# 45032496 19-Dec-2023 jmc <jmc@openbsd.org>

sort -C, and add to usage(); ok djm


# eead3eb2 18-Dec-2023 djm <djm@openbsd.org>

Make it possible to load certs from PKCS#11 tokens

Adds a protocol extension to allow grafting certificates supplied by
ssh-add to keys loaded from PKCS#11 tokens in the agent.

feedback/ok markus@


# 228cff34 06-Jul-2023 dtucker <dtucker@openbsd.org>

minleft and maxsign are u_int so cast appropriately. Prompted by
github PR#410, ok deraadt.


# 8265defc 08-Mar-2023 djm <djm@openbsd.org>

use RSA/SHA256 when testing usability of private key in agent;
with/ok dtucker


# 0c10332a 18-Jun-2022 dtucker <dtucker@openbsd.org>

Don't attempt to fprintf a null identity comment. From Martin Vahlensieck
via tech@.


# 4344e822 04-Feb-2022 dtucker <dtucker@openbsd.org>

Since they are deprecated, move DSA to the end of the default list of
public keys so that they will be tried last. From github PR#295 from
"ProBackup-nl", ok djm@


# f361212a 14-Jan-2022 djm <djm@openbsd.org>

allow pin-required FIDO keys to be added to ssh-agent(1).
ssh-askpass will be used to request the PIN at authentication time.

From Pedro Martelletto, ok djm


# 6c290b83 22-Dec-2021 jmc <jmc@openbsd.org>

sort -H and -h in SYNOPSIS/usage();
tweak the -H text;

ok djm


# 82d651da 19-Dec-2021 djm <djm@openbsd.org>

ssh-add side of destination constraints

Have ssh-add accept a list of "destination constraints" that allow
restricting where keys may be used in conjunction with a ssh-agent/ssh
that supports sessio

ssh-add side of destination constraints

Have ssh-add accept a list of "destination constraints" that allow
restricting where keys may be used in conjunction with a ssh-agent/ssh
that supports session ID/hostkey binding.

Constraints are specified as either "[user@]host-pattern" or
"host-pattern>[user@]host-pattern".

The first form permits a key to be used to authenticate as the
specified user to the specified host.

The second form permits a key that has previously been permitted
for use at a host to be available via a forwarded agent to an
additional host.

For example, constraining a key with "user1@host_a" and
"host_a>host_b". Would permit authentication as "user1" at
"host_a", and allow the key to be available on an agent forwarded
to "host_a" only for authentication to "host_b". The key would not
be visible on agent forwarded to other hosts or usable for
authentication there.

Internally, destination constraints use host keys to identify hosts.
The host patterns are used to obtain lists of host keys for that
destination that are communicated to the agent. The user/hostkeys are
encoded using a new restrict-destination-v00@openssh.com key
constraint.

host keys are looked up in the default client user/system known_hosts
files. It is possible to override this set on the command-line.

feedback Jann Horn & markus@
ok markus@

show more ...


# 991d5a20 28-Oct-2021 djm <djm@openbsd.org>

When downloading resident keys from a FIDO token, pass back the
user ID that was used when the key was created and append it to
the filename the key is written to (if it is not the default).

Avoids

When downloading resident keys from a FIDO token, pass back the
user ID that was used when the key was created and append it to
the filename the key is written to (if it is not the default).

Avoids keys being clobbered if the user created multiple
resident keys with the same application string but different
user IDs.

feedback Pedro Martelletto; ok markus

NB. increments SSH_SK_VERSION_MAJOR

show more ...


# 74cb32ae 03-Apr-2021 djm <djm@openbsd.org>

highly polished whitespace, mostly fixing spaces-for-tab and bad
indentation on continuation lines. Prompted by GHPR#185


# ca5450d6 11-Jan-2021 dtucker <dtucker@openbsd.org>

Change convtime() from returning long to returning int. On platforms
where sizeof(int) != sizeof(long), convtime could accept values
>MAX_INT which subsequently truncate when stored in an int during

Change convtime() from returning long to returning int. On platforms
where sizeof(int) != sizeof(long), convtime could accept values
>MAX_INT which subsequently truncate when stored in an int during
config parsing. bz#3250, ok djm@

show more ...


# 48e6b99d 18-Oct-2020 djm <djm@openbsd.org>

use the new variant log macros instead of prepending __func__ and
appending ssh_err(r) manually; ok markus@


# 8b827e99 31-Aug-2020 djm <djm@openbsd.org>

refuse to add verify-required (PINful) FIDO keys to ssh-agent until
the agent supports them properly


# e6d0367b 26-Jun-2020 djm <djm@openbsd.org>

allow "ssh-add -d -" to read keys to be deleted from stdin
bz#3180; ok dtucker@


# 75a70985 16-Mar-2020 dtucker <dtucker@openbsd.org>

Cast lifetime to u_long for comparison to prevent unsigned comparison
warning on 32bit arches. Spotted by deraadt, ok djm.


# c9831b39 26-Feb-2020 jsg <jsg@openbsd.org>

change explicit_bzero();free() to freezero()

While freezero() returns early if the pointer is NULL the tests for
NULL in callers are left to avoid warnings about passing an
uninitialised size argume

change explicit_bzero();free() to freezero()

While freezero() returns early if the pointer is NULL the tests for
NULL in callers are left to avoid warnings about passing an
uninitialised size argument across a function boundry.

ok deraadt@ djm@

show more ...


# b0acf2e1 18-Feb-2020 dtucker <dtucker@openbsd.org>

Ensure that the key lifetime provided fits within the values allowed by
the wire format (u32). Prevents integer wraparound of the timeout values.
bz#3119, ok markus@ djm@


# 5f47a660 06-Feb-2020 naddy <naddy@openbsd.org>

Replace "security key" with "authenticator" in program messages.

This replaces "security key" in error/usage/verbose messages and
distinguishes between "authenticator" and "authenticator-hosted key"

Replace "security key" with "authenticator" in program messages.

This replaces "security key" in error/usage/verbose messages and
distinguishes between "authenticator" and "authenticator-hosted key".

ok djm@

show more ...


# 62af2284 25-Jan-2020 djm <djm@openbsd.org>

factor out reading/writing sshbufs to dedicated functions;
feedback and ok markus@


# eb0971ce 17-Jan-2020 naddy <naddy@openbsd.org>

Document loading of resident keys from a FIDO authenticator.

* Rename -O to -K to keep "-O option" available.
* Document -K.
* Trim usage() message down to synopsis, like all other commands.

ok mar

Document loading of resident keys from a FIDO authenticator.

* Rename -O to -K to keep "-O option" available.
* Document -K.
* Trim usage() message down to synopsis, like all other commands.

ok markus@

show more ...


# a0caf565 06-Jan-2020 djm <djm@openbsd.org>

Extends the SK API to accept a set of key/value options for all
operations. These are intended to future-proof the API a little by
making it easier to specify additional fields for without having to

Extends the SK API to accept a set of key/value options for all
operations. These are intended to future-proof the API a little by
making it easier to specify additional fields for without having to
change the API version for each.

At present, only two options are defined: one to explicitly specify
the device for an operation (rather than accepting the middleware's
autoselection) and another to specify the FIDO2 username that may
be used when generating a resident key. These new options may be
invoked at key generation time via ssh-keygen -O

This also implements a suggestion from Markus to avoid "int" in favour
of uint32_t for the algorithm argument in the API, to make implementation
of ssh-sk-client/helper a little easier.

feedback, fixes and ok markus@

show more ...


1234567