index
:
openssh
IBS
PRIVSEP
V_2_5_2
V_2_9_9
V_2_9_P1
V_3_0_2
V_3_2_3
V_3_3
V_3_5
V_3_6
V_3_6_1
V_3_7
V_3_8
V_3_8_1
V_3_9
V_4_0
V_4_1
V_4_2
V_4_3
V_4_4
V_4_5
V_4_6
V_4_7
V_4_9
V_5_3
V_5_4
V_5_6
V_5_8
V_5_9
V_6_0
V_6_2
V_6_3
V_6_4
V_6_5
V_6_6
V_6_7
V_6_8
V_6_9
V_7_0
V_7_1
V_7_2
V_7_3
V_7_4
V_7_5
V_7_6
V_7_7
V_7_8
V_7_9
V_8_0
V_8_1
V_8_2
V_8_3
V_8_4
V_8_5
V_8_6
V_8_7
V_8_8
V_8_9
V_9_0
V_9_1
V_9_2
V_9_3
V_9_4
V_9_5
V_9_6
V_9_7
V_9_8
master
Mirror of https://anongit.mindrot.org/openssh.git
matthias
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
sk-usbhid.c
Age
Commit message (
Expand
)
Author
2023-07-18
conditionalise stdint.h inclusion on HAVE_STDINT_H
Damien Miller
2023-03-28
upstream: Remove compat code for OpenSSL < 1.1.*
dtucker@openbsd.org
2022-09-14
upstream: sk_enroll: never drop SSH_SK_USER_VERIFICATION_REQD flag
djm@openbsd.org
2022-09-02
upstream: sk-usbhid: fix key_lookup() on tokens with built-in UV
djm@openbsd.org
2022-08-19
upstream: remove incorrect check that can break enrolling a
djm@openbsd.org
2022-08-17
on Cygwin, prefer WinHello FIDO device
Damien Miller
2022-08-17
upstream: add an extra flag to sk_probe() to indicate whether we're
djm@openbsd.org
2022-08-12
Revert "check_sk_options: add temporary WinHello workaround"
Corinna Vinschen
2022-08-12
fido_dev_is_winhello: return 0, not "false"
Corinna Vinschen
2022-08-08
Give unused param a name.
Darren Tucker
2022-08-05
sk_sign: set FIDO2 uv attribute explicitely for WinHello
Corinna Vinschen
2022-08-05
check_sk_options: add temporary WinHello workaround
Corinna Vinschen
2022-08-05
compat code for fido_dev_is_winhello()
Corinna Vinschen
2022-07-20
upstream: sk-usbhid: preserve error code returned by key_lookup()
djm@openbsd.org
2022-07-20
upstream: when enrolling a resident key on a security token, check
djm@openbsd.org
2022-04-29
upstream: Don't leak SK device. Patch from Pedro Martelletto via
dtucker@openbsd.org
2022-02-07
fix typos in previous
pedro martelletto
2022-02-07
compat code for fido_assert_set_clientdata()
Damien Miller
2022-02-07
upstream: use libfido2 1.8.0+ fido_assert_set_clientdata() instead
djm@openbsd.org
2021-12-20
upstream: better error message for FIDO keys when we can't match
djm@openbsd.org
2021-12-03
upstream: improve the testing of credentials against inserted FIDO
djm@openbsd.org
2021-12-03
upstream: move check_sk_options() up so we can use it earlier
djm@openbsd.org
2021-11-06
upstream: Many downstreams expect ssh to compile as non-C99...
deraadt@openbsd.org
2021-11-03
upstream: Better handle FIDO keys on tokens that provide user
djm@openbsd.org
2021-10-28
upstream: When downloading resident keys from a FIDO token, pass
djm@openbsd.org
2021-10-01
fix FIDO key support for !OPENSSL_HAS_ECC case
Damien Miller
2021-10-01
upstream: unbreak FIDO sk-ed25519 key enrollment for OPENSSL=no builds;
djm@openbsd.org
2021-05-31
upstream: Hash challenge supplied by client during FIDO key enrollment
djm@openbsd.org
2021-02-18
upstream: make names in function prototypes match those in
djm@openbsd.org
2020-10-18
upstream: use the new variant log macros instead of prepending
djm@openbsd.org
2020-10-03
upstream: want time.h here too
djm@openbsd.org
2020-09-09
upstream: when writing an attestation blob for a FIDO key, record all
djm@openbsd.org
2020-09-02
configure.ac: fix libfido2 back-compat
pedro martelletto
2020-08-31
upstream: Add RCS IDs to the few files that are missing them; from
djm@openbsd.org
2020-08-27
tweak back-compat for older libfido2
Damien Miller
2020-08-27
upstream: skip a bit more FIDO token selection logic when only a
djm@openbsd.org
2020-08-27
degrade semi-gracefully when libfido2 is too old
Damien Miller
2020-08-27
upstream: preserve verify-required for resident FIDO keys
djm@openbsd.org
2020-08-27
upstream: major rework of FIDO token selection logic
djm@openbsd.org
2020-08-27
upstream: support for user-verified FIDO keys
djm@openbsd.org
2020-05-27
upstream: we are still aiming for pre-C99 ...
deraadt@openbsd.org
2020-05-27
upstream: Enable credProtect extension when generating a resident
djm@openbsd.org
2020-05-27
upstream: always call fido_init(); previous behaviour only called
djm@openbsd.org
2020-05-01
wrap sha2.h inclusion in #ifdef HAVE_SHA2_H
Damien Miller
2020-05-01
upstream: when signing a challenge using a FIDO toke, perform the
djm@openbsd.org
2020-01-29
upstream: changes to support FIDO attestation
djm@openbsd.org
2020-01-26
upstream: improve the error message for u2f enrollment errors by
djm@openbsd.org
2020-01-06
upstream: missing else in check_enroll_options()
djm@openbsd.org
2020-01-06
upstream: fix error message
djm@openbsd.org
2020-01-06
upstream: Extends the SK API to accept a set of key/value options
djm@openbsd.org
[next]