summaryrefslogtreecommitdiffstats
path: root/ssh-sk-helper.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* upstream: Remove duplicate includes.dtucker@openbsd.org2022-12-041-2/+1
* upstream: Don't leak SK device. Patch from Pedro Martelletto viadtucker@openbsd.org2022-04-291-1/+2
* upstream: When downloading resident keys from a FIDO token, passdjm@openbsd.org2021-10-281-15/+18
* upstream: use the new variant log macros instead of prependingdjm@openbsd.org2020-10-181-23/+24
* upstream: fix memleak of signature; from Pedro Martellettodjm@openbsd.org2020-05-271-5/+8
* upstream: improve the error message for u2f enrollment errors bydjm@openbsd.org2020-01-261-2/+2
* upstream: pass the log-on-stderr flag and log level through todjm@openbsd.org2020-01-211-7/+12
* upstream: Extends the SK API to accept a set of key/value optionsdjm@openbsd.org2020-01-061-18/+27
* upstream: SK API and sk-helper error/PIN passingdjm@openbsd.org2019-12-301-22/+84
* upstream: implement loading of resident keys in ssh-sk-helperdjm@openbsd.org2019-12-301-1/+48
* fixupDamien Miller2019-12-131-0/+1
* upstream: perform security key enrollment via ssh-sk-helper too.djm@openbsd.org2019-12-131-39/+121
* upstream: enable ed25519 support; ok djmmarkus@openbsd.org2019-11-121-2/+2
* upstream: rename sshsk_ecdsa_sign() to sshsk_sign(); ok djmmarkus@openbsd.org2019-11-121-2/+2
* autoconf pieces for U2F supportDamien Miller2019-11-011-0/+11
* upstream: ssh-agent support for U2F/FIDO keysdjm@openbsd.org2019-10-311-0/+143