History log of /openbsd-src/usr.bin/ssh/ssh-add/Makefile (Results 1 – 25 of 32)
Revision Date Author Comments
# eeca08d0 19-Dec-2021 djm <djm@openbsd.org>

ssh-add side of destination constraints

Have ssh-add accept a list of "destination constraints" that allow
restricting where keys may be used in conjunction with a ssh-agent/ssh
that supports sessio

ssh-add side of destination constraints

Have ssh-add accept a list of "destination constraints" that allow
restricting where keys may be used in conjunction with a ssh-agent/ssh
that supports session ID/hostkey binding.

Constraints are specified as either "[user@]host-pattern" or
"host-pattern>[user@]host-pattern".

The first form permits a key to be used to authenticate as the
specified user to the specified host.

The second form permits a key that has previously been permitted
for use at a host to be available via a forwarded agent to an
additional host.

For example, constraining a key with "user1@host_a" and
"host_a>host_b". Would permit authentication as "user1" at
"host_a", and allow the key to be available on an agent forwarded
to "host_a" only for authentication to "host_b". The key would not
be visible on agent forwarded to other hosts or usable for
authentication there.

Internally, destination constraints use host keys to identify hosts.
The host patterns are used to obtain lists of host keys for that
destination that are communicated to the agent. The user/hostkeys are
encoded using a new restrict-destination-v00@openssh.com key
constraint.

host keys are looked up in the default client user/system known_hosts
files. It is possible to override this set on the command-line.

feedback Jann Horn & markus@
ok markus@

show more ...


# 6e2e0391 03-Apr-2020 djm <djm@openbsd.org>

give ssh-keygen the ability to dump the contents of a binary key
revocation list: ssh-keygen -lQf /path bz#3132; ok dtucker


# 62af2284 25-Jan-2020 djm <djm@openbsd.org>

factor out reading/writing sshbufs to dedicated functions;
feedback and ok markus@


# 4852100a 13-Dec-2019 djm <djm@openbsd.org>

use ssh-sk-helper for all security key signing operations

This extracts and refactors the client interface for ssh-sk-helper
from ssh-agent and generalises it for use by the other programs.
This mea

use ssh-sk-helper for all security key signing operations

This extracts and refactors the client interface for ssh-sk-helper
from ssh-agent and generalises it for use by the other programs.
This means that most OpenSSH tools no longer need to link against
libfido2 or directly interact with /dev/uhid*

requested by, feedback and ok markus@

show more ...


# 094c80e0 14-Nov-2019 djm <djm@openbsd.org>

directly support U2F/FIDO2 security keys in OpenSSH by linking
against the (previously external) USB HID middleware. The dlopen()
capability still exists for alternate middlewares, e.g. for
Bluetooth

directly support U2F/FIDO2 security keys in OpenSSH by linking
against the (previously external) USB HID middleware. The dlopen()
capability still exists for alternate middlewares, e.g. for
Bluetooth, NFC and test/debugging.

show more ...


# e3a62e69 31-Oct-2019 djm <djm@openbsd.org>

Refactor signing - use sshkey_sign for everything, including the new
U2F signatures.

Don't use sshsk_ecdsa_sign() directly, instead make it reachable via
sshkey_sign() like all other signature opera

Refactor signing - use sshkey_sign for everything, including the new
U2F signatures.

Don't use sshsk_ecdsa_sign() directly, instead make it reachable via
sshkey_sign() like all other signature operations. This means that
we need to add a provider argument to sshkey_sign(), so most of this
change is mechanically adding that.

Suggested by / ok markus@

show more ...


# 8867a42f 31-Oct-2019 djm <djm@openbsd.org>

ssh-add support for U2F/FIDO keys


# 4ae7035e 25-Jul-2018 deraadt <deraadt@openbsd.org>

Don't redefine Makefile choices which come correct from bsd.*.mk
ok markus


# 9938e17f 08-Jan-2018 markus <markus@openbsd.org>

group shared source files (e.g. SRCS_KEX) and allow compilation w/o OPENSSL
ok djm@


# c0c5a1b7 14-Dec-2017 naddy <naddy@openbsd.org>

Replace ED25519's private SHA-512 implementation with a call to the
regular digest code. This speeds up compilation considerably.
ok markus@


# e34d2894 10-Dec-2017 deraadt <deraadt@openbsd.org>

ssh/lib hasn't worked towards our code-sharing goals for a quit while,
perhaps it is too verbose? Change each */Makefile to specifying exactly
what sources that program requires, compiling it sepera

ssh/lib hasn't worked towards our code-sharing goals for a quit while,
perhaps it is too verbose? Change each */Makefile to specifying exactly
what sources that program requires, compiling it seperate. Maybe we'll
iterate by sorting those into seperatable chunks, splitting up files
which contain common code + server/client specific code, or whatnot. But
this isn't one step, or we'd have done it a long time ago..
ok dtucker markus djm

show more ...


# db0c671b 10-Jul-2017 espie <espie@openbsd.org>

zap redundant Makefile variables.
okay djm@


# 076d84dc 04-Mar-2001 markus <markus@openbsd.org>

don't link unused libs


# 9a241266 03-Mar-2001 markus <markus@openbsd.org>

log*.c -> log.c


# d4e7c603 29-Jan-2001 niklas <niklas@openbsd.org>

$OpenBSD$


# 911ba6f1 29-Jun-2000 todd <todd@openbsd.org>

no longer needed; good riddance for static archs


# 3f9d1bb0 06-Dec-1999 deraadt <deraadt@openbsd.org>

atomicio() via lib


# b84216c7 06-Dec-1999 deraadt <deraadt@openbsd.org>

move atomicio into it's own file. wrap all socket write()s which were doing
write(sock, buf, len) != len, with atomicio() calls.


# cebcbd21 27-Oct-1999 deraadt <deraadt@openbsd.org>

fix for stupid binutils linker


# 492e465e 25-Oct-1999 markus <markus@openbsd.org>

move common files to ./lib and link libssh.a, tested with and w/o obj


# ec5851cd 07-Oct-1999 deraadt <deraadt@openbsd.org>

on static machines, install these as mode 0


# 546de495 06-Oct-1999 deraadt <deraadt@openbsd.org>

scp should not link against kerberos stuff


# 1e11c2e6 04-Oct-1999 deraadt <deraadt@openbsd.org>

more shrinking


# 84f5e31b 04-Oct-1999 markus <markus@openbsd.org>

nuked minfd. sigh. hope this is the last one.


# eb4dabb9 01-Oct-1999 beck <beck@openbsd.org>

Remove kerberos libdes - it's all in libcrypto


12