| #
62af2284 |
| 25-Jan-2020 |
djm <djm@openbsd.org> |
factor out reading/writing sshbufs to dedicated functions; feedback and ok markus@
|
| #
6db35375 |
| 13-Dec-2019 |
djm <djm@openbsd.org> |
perform security key enrollment via ssh-sk-helper too. This means that ssh-keygen no longer needs to link against ssh-sk-helper, and only ssh-sk-helper needs libfido2 and /dev/uhid* access;
feedback
perform security key enrollment via ssh-sk-helper too. This means that ssh-keygen no longer needs to link against ssh-sk-helper, and only ssh-sk-helper needs libfido2 and /dev/uhid* access;
feedback & ok markus@
show more ...
|
| #
4852100a |
| 13-Dec-2019 |
djm <djm@openbsd.org> |
use ssh-sk-helper for all security key signing operations
This extracts and refactors the client interface for ssh-sk-helper from ssh-agent and generalises it for use by the other programs. This mea
use ssh-sk-helper for all security key signing operations
This extracts and refactors the client interface for ssh-sk-helper from ssh-agent and generalises it for use by the other programs. This means that most OpenSSH tools no longer need to link against libfido2 or directly interact with /dev/uhid*
requested by, feedback and ok markus@
show more ...
|
| #
094c80e0 |
| 14-Nov-2019 |
djm <djm@openbsd.org> |
directly support U2F/FIDO2 security keys in OpenSSH by linking against the (previously external) USB HID middleware. The dlopen() capability still exists for alternate middlewares, e.g. for Bluetooth
directly support U2F/FIDO2 security keys in OpenSSH by linking against the (previously external) USB HID middleware. The dlopen() capability still exists for alternate middlewares, e.g. for Bluetooth, NFC and test/debugging.
show more ...
|
| #
e3a62e69 |
| 31-Oct-2019 |
djm <djm@openbsd.org> |
Refactor signing - use sshkey_sign for everything, including the new U2F signatures.
Don't use sshsk_ecdsa_sign() directly, instead make it reachable via sshkey_sign() like all other signature opera
Refactor signing - use sshkey_sign for everything, including the new U2F signatures.
Don't use sshsk_ecdsa_sign() directly, instead make it reachable via sshkey_sign() like all other signature operations. This means that we need to add a provider argument to sshkey_sign(), so most of this change is mechanically adding that.
Suggested by / ok markus@
show more ...
|
| #
530750f7 |
| 31-Oct-2019 |
djm <djm@openbsd.org> |
ssh-keygen support for generating U2F/FIDO keys
|
| #
00af78b5 |
| 06-Sep-2019 |
djm <djm@openbsd.org> |
avoid compiling certain files that deeply depend on libcrypto when WITH_OPENSSL isn't set
|
| #
1fa0c92b |
| 03-Sep-2019 |
djm <djm@openbsd.org> |
sshsig: lightweight signature and verification ability for OpenSSH
This adds a simple manual signature scheme to OpenSSH. Signatures can be made and verified using ssh-keygen -Y sign|verify
Signatu
sshsig: lightweight signature and verification ability for OpenSSH
This adds a simple manual signature scheme to OpenSSH. Signatures can be made and verified using ssh-keygen -Y sign|verify
Signatures embed the key used to make them. At verification time, this is matched via principal name against an authorized_keys-like list of allowed signers.
Mostly by Sebastian Kinne w/ some tweaks by me
ok markus@
show more ...
|
| #
bbb0e5b6 |
| 16-Jul-2019 |
djm <djm@openbsd.org> |
remove mostly vestigal uuencode.[ch]; moving the only unique functionality there (wrapping of base64-encoded data) to sshbuf functions; feedback and ok markus@
|
| #
1cbb533c |
| 05-Jul-2019 |
deraadt <deraadt@openbsd.org> |
still compile uuencode.c, unbreaks build
|
| #
a1ec2b37 |
| 05-Jul-2019 |
djm <djm@openbsd.org> |
add a local implementation of BSD realpath() for sftp-server use ahead of OpenBSD's realpath changing to match POSIX;
ok deraadt@ (thanks for snaps testing)
|
| #
4ae7035e |
| 25-Jul-2018 |
deraadt <deraadt@openbsd.org> |
Don't redefine Makefile choices which come correct from bsd.*.mk ok markus
|
| #
9938e17f |
| 08-Jan-2018 |
markus <markus@openbsd.org> |
group shared source files (e.g. SRCS_KEX) and allow compilation w/o OPENSSL ok djm@
|
| #
c0c5a1b7 |
| 14-Dec-2017 |
naddy <naddy@openbsd.org> |
Replace ED25519's private SHA-512 implementation with a call to the regular digest code. This speeds up compilation considerably. ok markus@
|
| #
e34d2894 |
| 10-Dec-2017 |
deraadt <deraadt@openbsd.org> |
ssh/lib hasn't worked towards our code-sharing goals for a quit while, perhaps it is too verbose? Change each */Makefile to specifying exactly what sources that program requires, compiling it sepera
ssh/lib hasn't worked towards our code-sharing goals for a quit while, perhaps it is too verbose? Change each */Makefile to specifying exactly what sources that program requires, compiling it seperate. Maybe we'll iterate by sorting those into seperatable chunks, splitting up files which contain common code + server/client specific code, or whatnot. But this isn't one step, or we'd have done it a long time ago.. ok dtucker markus djm
show more ...
|
| #
db0c671b |
| 10-Jul-2017 |
espie <espie@openbsd.org> |
zap redundant Makefile variables. okay djm@
|
| #
a025dd79 |
| 28-Jul-2003 |
djm <djm@openbsd.org> |
Support for generating Diffie-Hellman groups (/etc/moduli) from ssh-keygen. Based on code from Phil Karn, William Allen Simpson and Niels Provos. ok markus@, thanks jmc@
|
| #
b89b612b |
| 27-Jun-2001 |
markus <markus@openbsd.org> |
move -lsectok to Makefile.inc for now
|
| #
10bfcb1d |
| 26-Jun-2001 |
markus <markus@openbsd.org> |
add smartcard support to the makefiles (commented out); the smartcard support is based on work by itoi@eecs.umich.edu
|
| #
ab7a97f4 |
| 26-Jun-2001 |
markus <markus@openbsd.org> |
unbreak
|
| #
790315b0 |
| 26-Jun-2001 |
markus <markus@openbsd.org> |
more smartcard support.
|
| #
076d84dc |
| 04-Mar-2001 |
markus <markus@openbsd.org> |
don't link unused libs
|
| #
9a241266 |
| 03-Mar-2001 |
markus <markus@openbsd.org> |
log*.c -> log.c
|
| #
d4e7c603 |
| 29-Jan-2001 |
niklas <niklas@openbsd.org> |
$OpenBSD$
|
| #
911ba6f1 |
| 29-Jun-2000 |
todd <todd@openbsd.org> |
no longer needed; good riddance for static archs
|