<feed xmlns='http://www.w3.org/2005/Atom'>
<title>platform_external_openssh/sk-usbhid.c, branch master</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_openssh/'/>
<entry>
<title>wrap sha2.h inclusion in #ifdef HAVE_SHA2_H</title>
<updated>2020-05-01T03:29:16+00:00</updated>
<author>
<name>Damien Miller</name>
<email>djm@mindrot.org</email>
</author>
<published>2020-05-01T03:29:16+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_openssh/commit/?id=c0dfd18dd1c2107c73d18f70cd164f7ebd434b08'/>
<id>c0dfd18dd1c2107c73d18f70cd164f7ebd434b08</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>upstream: when signing a challenge using a FIDO toke, perform the</title>
<updated>2020-05-01T03:13:29+00:00</updated>
<author>
<name>djm@openbsd.org</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-04-28T04:02:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_openssh/commit/?id=59d2de956ed29aa5565ed5e5947a7abdb27ac013'/>
<id>59d2de956ed29aa5565ed5e5947a7abdb27ac013</id>
<content type='text'>
hashing in the middleware layer rather than in ssh code. This allows
middlewares that call APIs that perform the hashing implicitly (including
Microsoft's AFAIK). ok markus@

OpenBSD-Commit-ID: c9fc8630aba26c75d5016884932f08a5a237f37d
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
hashing in the middleware layer rather than in ssh code. This allows
middlewares that call APIs that perform the hashing implicitly (including
Microsoft's AFAIK). ok markus@

OpenBSD-Commit-ID: c9fc8630aba26c75d5016884932f08a5a237f37d
</pre>
</div>
</content>
</entry>
<entry>
<title>upstream: changes to support FIDO attestation</title>
<updated>2020-01-29T07:52:55+00:00</updated>
<author>
<name>djm@openbsd.org</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-01-28T08:01:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_openssh/commit/?id=24c0f752adf9021277a7b0a84931bb5fe48ea379'/>
<id>24c0f752adf9021277a7b0a84931bb5fe48ea379</id>
<content type='text'>
Allow writing to disk the attestation certificate that is generated by
the FIDO token at key enrollment time. These certificates may be used
by an out-of-band workflow to prove that a particular key is held in
trustworthy hardware.

Allow passing in a challenge that will be sent to the card during
key enrollment. These are needed to build an attestation workflow
that resists replay attacks.

ok markus@

OpenBSD-Commit-ID: 457dc3c3d689ba39eed328f0817ed9b91a5f78f6
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Allow writing to disk the attestation certificate that is generated by
the FIDO token at key enrollment time. These certificates may be used
by an out-of-band workflow to prove that a particular key is held in
trustworthy hardware.

Allow passing in a challenge that will be sent to the card during
key enrollment. These are needed to build an attestation workflow
that resists replay attacks.

ok markus@

OpenBSD-Commit-ID: 457dc3c3d689ba39eed328f0817ed9b91a5f78f6
</pre>
</div>
</content>
</entry>
<entry>
<title>upstream: improve the error message for u2f enrollment errors by</title>
<updated>2020-01-25T23:18:42+00:00</updated>
<author>
<name>djm@openbsd.org</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-01-25T23:13:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_openssh/commit/?id=59d01f1d720ebede4da42882f592d1093dac7adc'/>
<id>59d01f1d720ebede4da42882f592d1093dac7adc</id>
<content type='text'>
making ssh-keygen be solely responsible for printing the error message and
convertint some more common error responses from the middleware to a useful
ssherr.h status code. more detail remains visible via -v of course.

also remove indepedent copy of sk-api.h declarations in sk-usbhid.c
and just include it.

feedback &amp; ok markus@

OpenBSD-Commit-ID: a4a8ffa870d9a3e0cfd76544bcdeef5c9fb1f1bb
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
making ssh-keygen be solely responsible for printing the error message and
convertint some more common error responses from the middleware to a useful
ssherr.h status code. more detail remains visible via -v of course.

also remove indepedent copy of sk-api.h declarations in sk-usbhid.c
and just include it.

feedback &amp; ok markus@

OpenBSD-Commit-ID: a4a8ffa870d9a3e0cfd76544bcdeef5c9fb1f1bb
</pre>
</div>
</content>
</entry>
<entry>
<title>upstream: missing else in check_enroll_options()</title>
<updated>2020-01-06T02:40:28+00:00</updated>
<author>
<name>djm@openbsd.org</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-01-06T02:39:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_openssh/commit/?id=3cc60c899a92a469e5118310ba6b74cb57215618'/>
<id>3cc60c899a92a469e5118310ba6b74cb57215618</id>
<content type='text'>
OpenBSD-Commit-ID: e058fb918fda56ddbbf0bee910101004cec421d4
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
OpenBSD-Commit-ID: e058fb918fda56ddbbf0bee910101004cec421d4
</pre>
</div>
</content>
</entry>
<entry>
<title>upstream: fix error message</title>
<updated>2020-01-06T02:25:26+00:00</updated>
<author>
<name>djm@openbsd.org</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-01-06T02:24:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_openssh/commit/?id=ff5784e2698d6c41e9f39ce4df24968c1beeb2bb'/>
<id>ff5784e2698d6c41e9f39ce4df24968c1beeb2bb</id>
<content type='text'>
OpenBSD-Commit-ID: 1eb52025658eb78ea6223181e552862198d3d505
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
OpenBSD-Commit-ID: 1eb52025658eb78ea6223181e552862198d3d505
</pre>
</div>
</content>
</entry>
<entry>
<title>upstream: Extends the SK API to accept a set of key/value options</title>
<updated>2020-01-06T02:12:46+00:00</updated>
<author>
<name>djm@openbsd.org</name>
<email>djm@openbsd.org</email>
</author>
<published>2020-01-06T02:00:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_openssh/commit/?id=c312ca077cd2a6c15545cd6b4d34ee2f69289174'/>
<id>c312ca077cd2a6c15545cd6b4d34ee2f69289174</id>
<content type='text'>
for all operations. These are intended to future-proof the API a little by
making it easier to specify additional fields for without having to change
the API version for each.

At present, only two options are defined: one to explicitly specify
the device for an operation (rather than accepting the middleware's
autoselection) and another to specify the FIDO2 username that may
be used when generating a resident key. These new options may be
invoked at key generation time via ssh-keygen -O

This also implements a suggestion from Markus to avoid "int" in favour
of uint32_t for the algorithm argument in the API, to make implementation
of ssh-sk-client/helper a little easier.

feedback, fixes and ok markus@

OpenBSD-Commit-ID: 973ce11704609022ab36abbdeb6bc23c8001eabc
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
for all operations. These are intended to future-proof the API a little by
making it easier to specify additional fields for without having to change
the API version for each.

At present, only two options are defined: one to explicitly specify
the device for an operation (rather than accepting the middleware's
autoselection) and another to specify the FIDO2 username that may
be used when generating a resident key. These new options may be
invoked at key generation time via ssh-keygen -O

This also implements a suggestion from Markus to avoid "int" in favour
of uint32_t for the algorithm argument in the API, to make implementation
of ssh-sk-client/helper a little easier.

feedback, fixes and ok markus@

OpenBSD-Commit-ID: 973ce11704609022ab36abbdeb6bc23c8001eabc
</pre>
</div>
</content>
</entry>
<entry>
<title>upstream: translate and return error codes; retry on bad PIN</title>
<updated>2019-12-30T10:01:51+00:00</updated>
<author>
<name>djm@openbsd.org</name>
<email>djm@openbsd.org</email>
</author>
<published>2019-12-30T09:24:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_openssh/commit/?id=43ce96427b76c4918e39af654e2fc9ee18d5d478'/>
<id>43ce96427b76c4918e39af654e2fc9ee18d5d478</id>
<content type='text'>
Define some well-known error codes in the SK API and pass
them back via ssh-sk-helper.

Use the new "wrong PIN" error code to retry PIN prompting during
ssh-keygen of resident keys.

feedback and ok markus@

OpenBSD-Commit-ID: 9663c6a2bb7a0bc8deaccc6c30d9a2983b481620
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Define some well-known error codes in the SK API and pass
them back via ssh-sk-helper.

Use the new "wrong PIN" error code to retry PIN prompting during
ssh-keygen of resident keys.

feedback and ok markus@

OpenBSD-Commit-ID: 9663c6a2bb7a0bc8deaccc6c30d9a2983b481620
</pre>
</div>
</content>
</entry>
<entry>
<title>upstream: SK API and sk-helper error/PIN passing</title>
<updated>2019-12-30T09:59:33+00:00</updated>
<author>
<name>djm@openbsd.org</name>
<email>djm@openbsd.org</email>
</author>
<published>2019-12-30T09:23:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_openssh/commit/?id=c54cd1892c3e7f268b21e1f07ada9f0d9816ffc0'/>
<id>c54cd1892c3e7f268b21e1f07ada9f0d9816ffc0</id>
<content type='text'>
Allow passing a PIN via the SK API (API major crank) and let the
ssh-sk-helper API follow.

Also enhance the ssh-sk-helper API to support passing back an error
code instead of a complete reply. Will be used to signal "wrong PIN",
etc.

feedback and ok markus@

OpenBSD-Commit-ID: a1bd6b0a2421646919a0c139b8183ad76d28fb71
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Allow passing a PIN via the SK API (API major crank) and let the
ssh-sk-helper API follow.

Also enhance the ssh-sk-helper API to support passing back an error
code instead of a complete reply. Will be used to signal "wrong PIN",
etc.

feedback and ok markus@

OpenBSD-Commit-ID: a1bd6b0a2421646919a0c139b8183ad76d28fb71
</pre>
</div>
</content>
</entry>
<entry>
<title>upstream: resident keys support in SK API</title>
<updated>2019-12-30T09:58:19+00:00</updated>
<author>
<name>djm@openbsd.org</name>
<email>djm@openbsd.org</email>
</author>
<published>2019-12-30T09:21:16+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_external_openssh/commit/?id=14cea36df397677b8f8568204300ef654114fd76'/>
<id>14cea36df397677b8f8568204300ef654114fd76</id>
<content type='text'>
Adds a sk_load_resident_keys() function to the security key
API that accepts a security key provider and a PIN and returns
a list of keys.

Implement support for this in the usbhid middleware.

feedback and ok markus@

OpenBSD-Commit-ID: 67e984e4e87f4999ce447a6178c4249a9174eff0
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Adds a sk_load_resident_keys() function to the security key
API that accepts a security key provider and a PIN and returns
a list of keys.

Implement support for this in the usbhid middleware.

feedback and ok markus@

OpenBSD-Commit-ID: 67e984e4e87f4999ce447a6178c4249a9174eff0
</pre>
</div>
</content>
</entry>
</feed>
