index
:
openssh
master
openssh
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
sk-usbhid.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
conditionalise stdint.h inclusion on HAVE_STDINT_H
Damien Miller
2023-07-18
1
-1
/
+3
*
upstream: Remove compat code for OpenSSL < 1.1.*
dtucker@openbsd.org
2023-03-28
1
-9
/
+1
*
upstream: sk_enroll: never drop SSH_SK_USER_VERIFICATION_REQD flag
djm@openbsd.org
2022-09-14
1
-9
/
+1
*
upstream: sk-usbhid: fix key_lookup() on tokens with built-in UV
djm@openbsd.org
2022-09-02
1
-2
/
+11
*
upstream: remove incorrect check that can break enrolling a
djm@openbsd.org
2022-08-19
1
-5
/
+1
*
on Cygwin, prefer WinHello FIDO device
Damien Miller
2022-08-17
1
-0
/
+4
*
upstream: add an extra flag to sk_probe() to indicate whether we're
djm@openbsd.org
2022-08-17
1
-6
/
+6
*
Revert "check_sk_options: add temporary WinHello workaround"
Corinna Vinschen
2022-08-12
1
-9
/
+0
*
fido_dev_is_winhello: return 0, not "false"
Corinna Vinschen
2022-08-12
1
-1
/
+1
*
Give unused param a name.
Darren Tucker
2022-08-08
1
-1
/
+1
*
sk_sign: set FIDO2 uv attribute explicitely for WinHello
Corinna Vinschen
2022-08-05
1
-0
/
+8
*
check_sk_options: add temporary WinHello workaround
Corinna Vinschen
2022-08-05
1
-0
/
+9
*
compat code for fido_dev_is_winhello()
Corinna Vinschen
2022-08-05
1
-0
/
+8
*
upstream: sk-usbhid: preserve error code returned by key_lookup()
djm@openbsd.org
2022-07-20
1
-2
/
+2
*
upstream: when enrolling a resident key on a security token, check
djm@openbsd.org
2022-07-20
1
-2
/
+69
*
upstream: Don't leak SK device. Patch from Pedro Martelletto via
dtucker@openbsd.org
2022-04-29
1
-1
/
+2
*
fix typos in previous
pedro martelletto
2022-02-07
1
-3
/
+3
*
compat code for fido_assert_set_clientdata()
Damien Miller
2022-02-07
1
-2
/
+26
*
upstream: use libfido2 1.8.0+ fido_assert_set_clientdata() instead
djm@openbsd.org
2022-02-07
1
-28
/
+33
*
upstream: better error message for FIDO keys when we can't match
djm@openbsd.org
2021-12-19
1
-1
/
+4
*
upstream: improve the testing of credentials against inserted FIDO
djm@openbsd.org
2021-12-03
1
-2
/
+4
*
upstream: move check_sk_options() up so we can use it earlier
djm@openbsd.org
2021-12-03
1
-43
/
+43
*
upstream: Many downstreams expect ssh to compile as non-C99...
deraadt@openbsd.org
2021-11-06
1
-3
/
+3
*
upstream: Better handle FIDO keys on tokens that provide user
djm@openbsd.org
2021-11-03
1
-9
/
+78
*
upstream: When downloading resident keys from a FIDO token, pass
djm@openbsd.org
2021-10-28
1
-9
/
+26
*
fix FIDO key support for !OPENSSL_HAS_ECC case
Damien Miller
2021-10-01
1
-0
/
+9
*
upstream: unbreak FIDO sk-ed25519 key enrollment for OPENSSL=no builds;
djm@openbsd.org
2021-10-01
1
-2
/
+6
*
upstream: Hash challenge supplied by client during FIDO key enrollment
djm@openbsd.org
2021-05-31
1
-4
/
+9
*
upstream: make names in function prototypes match those in
djm@openbsd.org
2021-02-18
1
-2
/
+2
*
upstream: use the new variant log macros instead of prepending
djm@openbsd.org
2020-10-18
1
-3
/
+3
*
upstream: want time.h here too
djm@openbsd.org
2020-10-03
1
-1
/
+2
*
upstream: when writing an attestation blob for a FIDO key, record all
djm@openbsd.org
2020-09-09
1
-1
/
+12
*
configure.ac: fix libfido2 back-compat
pedro martelletto
2020-09-02
1
-1
/
+1
*
upstream: Add RCS IDs to the few files that are missing them; from
djm@openbsd.org
2020-08-31
1
-0
/
+1
*
tweak back-compat for older libfido2
Damien Miller
2020-08-27
1
-6
/
+20
*
upstream: skip a bit more FIDO token selection logic when only a
djm@openbsd.org
2020-08-27
1
-1
/
+8
*
degrade semi-gracefully when libfido2 is too old
Damien Miller
2020-08-27
1
-0
/
+21
*
upstream: preserve verify-required for resident FIDO keys
djm@openbsd.org
2020-08-27
1
-2
/
+4
*
upstream: major rework of FIDO token selection logic
djm@openbsd.org
2020-08-27
1
-252
/
+326
*
upstream: support for user-verified FIDO keys
djm@openbsd.org
2020-08-27
1
-12
/
+26
*
upstream: we are still aiming for pre-C99 ...
deraadt@openbsd.org
2020-05-27
1
-2
/
+2
*
upstream: Enable credProtect extension when generating a resident
djm@openbsd.org
2020-05-27
1
-0
/
+57
*
upstream: always call fido_init(); previous behaviour only called
djm@openbsd.org
2020-05-27
1
-6
/
+11
*
wrap sha2.h inclusion in #ifdef HAVE_SHA2_H
Damien Miller
2020-05-01
1
-0
/
+2
*
upstream: when signing a challenge using a FIDO toke, perform the
djm@openbsd.org
2020-05-01
1
-3
/
+32
*
upstream: changes to support FIDO attestation
djm@openbsd.org
2020-01-29
1
-0
/
+1
*
upstream: improve the error message for u2f enrollment errors by
djm@openbsd.org
2020-01-26
1
-72
/
+27
*
upstream: missing else in check_enroll_options()
djm@openbsd.org
2020-01-06
1
-1
/
+1
*
upstream: fix error message
djm@openbsd.org
2020-01-06
1
-2
/
+1
*
upstream: Extends the SK API to accept a set of key/value options
djm@openbsd.org
2020-01-06
1
-42
/
+152
[next]