summaryrefslogtreecommitdiffstats
path: root/sk-usbhid.c
AgeCommit message (Expand)Author
2023-07-18conditionalise stdint.h inclusion on HAVE_STDINT_HDamien Miller
2023-03-28upstream: Remove compat code for OpenSSL < 1.1.*dtucker@openbsd.org
2022-09-14upstream: sk_enroll: never drop SSH_SK_USER_VERIFICATION_REQD flagdjm@openbsd.org
2022-09-02upstream: sk-usbhid: fix key_lookup() on tokens with built-in UVdjm@openbsd.org
2022-08-19upstream: remove incorrect check that can break enrolling adjm@openbsd.org
2022-08-17on Cygwin, prefer WinHello FIDO deviceDamien Miller
2022-08-17upstream: add an extra flag to sk_probe() to indicate whether we'redjm@openbsd.org
2022-08-12Revert "check_sk_options: add temporary WinHello workaround"Corinna Vinschen
2022-08-12fido_dev_is_winhello: return 0, not "false"Corinna Vinschen
2022-08-08Give unused param a name.Darren Tucker
2022-08-05sk_sign: set FIDO2 uv attribute explicitely for WinHelloCorinna Vinschen
2022-08-05check_sk_options: add temporary WinHello workaroundCorinna Vinschen
2022-08-05compat code for fido_dev_is_winhello()Corinna Vinschen
2022-07-20upstream: sk-usbhid: preserve error code returned by key_lookup()djm@openbsd.org
2022-07-20upstream: when enrolling a resident key on a security token, checkdjm@openbsd.org
2022-04-29upstream: Don't leak SK device. Patch from Pedro Martelletto viadtucker@openbsd.org
2022-02-07fix typos in previouspedro martelletto
2022-02-07compat code for fido_assert_set_clientdata()Damien Miller
2022-02-07upstream: use libfido2 1.8.0+ fido_assert_set_clientdata() insteaddjm@openbsd.org
2021-12-20upstream: better error message for FIDO keys when we can't matchdjm@openbsd.org
2021-12-03upstream: improve the testing of credentials against inserted FIDOdjm@openbsd.org
2021-12-03upstream: move check_sk_options() up so we can use it earlierdjm@openbsd.org
2021-11-06upstream: Many downstreams expect ssh to compile as non-C99...deraadt@openbsd.org
2021-11-03upstream: Better handle FIDO keys on tokens that provide userdjm@openbsd.org
2021-10-28upstream: When downloading resident keys from a FIDO token, passdjm@openbsd.org
2021-10-01fix FIDO key support for !OPENSSL_HAS_ECC caseDamien Miller
2021-10-01upstream: unbreak FIDO sk-ed25519 key enrollment for OPENSSL=no builds;djm@openbsd.org
2021-05-31upstream: Hash challenge supplied by client during FIDO key enrollmentdjm@openbsd.org
2021-02-18upstream: make names in function prototypes match those indjm@openbsd.org
2020-10-18upstream: use the new variant log macros instead of prependingdjm@openbsd.org
2020-10-03upstream: want time.h here toodjm@openbsd.org
2020-09-09upstream: when writing an attestation blob for a FIDO key, record alldjm@openbsd.org
2020-09-02configure.ac: fix libfido2 back-compatpedro martelletto
2020-08-31upstream: Add RCS IDs to the few files that are missing them; fromdjm@openbsd.org
2020-08-27tweak back-compat for older libfido2Damien Miller
2020-08-27upstream: skip a bit more FIDO token selection logic when only adjm@openbsd.org
2020-08-27degrade semi-gracefully when libfido2 is too oldDamien Miller
2020-08-27upstream: preserve verify-required for resident FIDO keysdjm@openbsd.org
2020-08-27upstream: major rework of FIDO token selection logicdjm@openbsd.org
2020-08-27upstream: support for user-verified FIDO keysdjm@openbsd.org
2020-05-27upstream: we are still aiming for pre-C99 ...deraadt@openbsd.org
2020-05-27upstream: Enable credProtect extension when generating a residentdjm@openbsd.org
2020-05-27upstream: always call fido_init(); previous behaviour only calleddjm@openbsd.org
2020-05-01wrap sha2.h inclusion in #ifdef HAVE_SHA2_HDamien Miller
2020-05-01upstream: when signing a challenge using a FIDO toke, perform thedjm@openbsd.org
2020-01-29upstream: changes to support FIDO attestationdjm@openbsd.org
2020-01-26upstream: improve the error message for u2f enrollment errors bydjm@openbsd.org
2020-01-06upstream: missing else in check_enroll_options()djm@openbsd.org
2020-01-06upstream: fix error messagedjm@openbsd.org
2020-01-06upstream: Extends the SK API to accept a set of key/value optionsdjm@openbsd.org