summaryrefslogtreecommitdiffstats
path: root/ssh-sk-helper.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* upstream: Remove duplicate includes.dtucker@openbsd.org2022-12-041-2/+1
| | | | | | Patch from AtariDreams via github PR#364. OpenBSD-Commit-ID: b9186638a05cb8b56ef7c0de521922b6723644ea
* upstream: Don't leak SK device. Patch from Pedro Martelletto viadtucker@openbsd.org2022-04-291-1/+2
| | | | | | github PR#316. ok djm@ OpenBSD-Commit-ID: 17d11327545022e727d95fd08b213171c5a4585d
* upstream: When downloading resident keys from a FIDO token, passdjm@openbsd.org2021-10-281-15/+18
| | | | | | | | | | | | | | | back the user ID that was used when the key was created and append it to the filename the key is written to (if it is not the default). Avoids keys being clobbered if the user created multiple resident keys with the same application string but different user IDs. feedback Pedro Martelletto; ok markus NB. increments SSH_SK_VERSION_MAJOR OpenBSD-Commit-ID: dbd658b5950f583106d945641a634bc6562dd3a3
* upstream: use the new variant log macros instead of prependingdjm@openbsd.org2020-10-181-23/+24
| | | | | | __func__ and appending ssh_err(r) manually; ok markus@ OpenBSD-Commit-ID: 1f14b80bcfa85414b2a1a6ff714fb5362687ace8
* upstream: fix memleak of signature; from Pedro Martellettodjm@openbsd.org2020-05-271-5/+8
| | | | OpenBSD-Commit-ID: d0a6eb07e77c001427d738b220dd024ddc64b2bb
* upstream: improve the error message for u2f enrollment errors bydjm@openbsd.org2020-01-261-2/+2
| | | | | | | | | | | | | making ssh-keygen be solely responsible for printing the error message and convertint some more common error responses from the middleware to a useful ssherr.h status code. more detail remains visible via -v of course. also remove indepedent copy of sk-api.h declarations in sk-usbhid.c and just include it. feedback & ok markus@ OpenBSD-Commit-ID: a4a8ffa870d9a3e0cfd76544bcdeef5c9fb1f1bb
* upstream: pass the log-on-stderr flag and log level through todjm@openbsd.org2020-01-211-7/+12
| | | | | | ssh-sk-helper, making debugging a bit easier. ok markus@ OpenBSD-Commit-ID: 2e7aea6bf5770d3f38b7c7bba891069256c5a49a
* upstream: Extends the SK API to accept a set of key/value optionsdjm@openbsd.org2020-01-061-18/+27
| | | | | | | | | | | | | | | | | | | | for all operations. These are intended to future-proof the API a little by making it easier to specify additional fields for without having to change the API version for each. At present, only two options are defined: one to explicitly specify the device for an operation (rather than accepting the middleware's autoselection) and another to specify the FIDO2 username that may be used when generating a resident key. These new options may be invoked at key generation time via ssh-keygen -O This also implements a suggestion from Markus to avoid "int" in favour of uint32_t for the algorithm argument in the API, to make implementation of ssh-sk-client/helper a little easier. feedback, fixes and ok markus@ OpenBSD-Commit-ID: 973ce11704609022ab36abbdeb6bc23c8001eabc
* upstream: SK API and sk-helper error/PIN passingdjm@openbsd.org2019-12-301-22/+84
| | | | | | | | | | | | | Allow passing a PIN via the SK API (API major crank) and let the ssh-sk-helper API follow. Also enhance the ssh-sk-helper API to support passing back an error code instead of a complete reply. Will be used to signal "wrong PIN", etc. feedback and ok markus@ OpenBSD-Commit-ID: a1bd6b0a2421646919a0c139b8183ad76d28fb71
* upstream: implement loading of resident keys in ssh-sk-helperdjm@openbsd.org2019-12-301-1/+48
| | | | | | feedback and ok markus@ OpenBSD-Commit-ID: b273c23769ea182c55c4a7b8f9cbd9181722011a
* fixupDamien Miller2019-12-131-0/+1
|
* upstream: perform security key enrollment via ssh-sk-helper too.djm@openbsd.org2019-12-131-39/+121
| | | | | | | | | This means that ssh-keygen no longer needs to link against ssh-sk-helper, and only ssh-sk-helper needs libfido2 and /dev/uhid* access; feedback & ok markus@ OpenBSD-Commit-ID: 9464233fab95708d2ff059f8bee29c0d1f270800
* upstream: enable ed25519 support; ok djmmarkus@openbsd.org2019-11-121-2/+2
| | | | OpenBSD-Commit-ID: 1a399c5b3ef15bd8efb916110cf5a9e0b554ab7e
* upstream: rename sshsk_ecdsa_sign() to sshsk_sign(); ok djmmarkus@openbsd.org2019-11-121-2/+2
| | | | OpenBSD-Commit-ID: 1524042e09d81e54c4470d7bfcc0194c5b46fe19
* autoconf pieces for U2F supportDamien Miller2019-11-011-0/+11
| | | | | Mostly following existing logic for PKCS#11 - turning off support when either libcrypto or dlopen(3) are unavailable.
* upstream: ssh-agent support for U2F/FIDO keysdjm@openbsd.org2019-10-311-0/+143
feedback & ok markus@ OpenBSD-Commit-ID: bb544a44bc32e45d2ec8bf652db2046f38360acb