summaryrefslogtreecommitdiffstats
path: root/ssh-sk.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* upstream: Ensure FIDO/PKCS11 libraries contain expected symbolsdjm@openbsd.org2023-07-191-3/+5
* upstream: when enrolling a resident key on a security token, checkdjm@openbsd.org2022-07-201-1/+3
* fix possible NULL deref when built without FIDODamien Miller2022-06-241-1/+2
* upstream: ssh-sk: free a resident key's user iddjm@openbsd.org2022-01-141-1/+2
* upstream: Better handle FIDO keys on tokens that provide userdjm@openbsd.org2021-11-031-2/+2
* upstream: When downloading resident keys from a FIDO token, passdjm@openbsd.org2021-10-281-26/+64
* fix FIDO key support for !OPENSSL_HAS_ECC caseDamien Miller2021-10-011-2/+11
* upstream: a bit more debugging behind #ifdef DEBUG_SKdjm@openbsd.org2021-02-261-2/+7
* upstream: unbreak SK_DEBUG buildsdjm@openbsd.org2021-02-181-3/+3
* upstream: use the new variant log macros instead of prependingdjm@openbsd.org2020-10-181-45/+42
* upstream: when writing an attestation blob for a FIDO key, record alldjm@openbsd.org2020-09-091-14/+30
* upstream: preserve verify-required for resident FIDO keysdjm@openbsd.org2020-08-271-2/+3
* upstream: when signing a challenge using a FIDO toke, perform thedjm@openbsd.org2020-05-011-12/+2
* upstream: return correct error in sshsk_ed25519_sig; ok djmmarkus@openbsd.org2020-03-131-2/+2
* upstream: better error message when trying to use a FIDO keydjm@openbsd.org2020-02-281-1/+5
* upstream: Replace "security key" with "authenticator" in programnaddy@openbsd.org2020-02-061-14/+12
* upstream: changes to support FIDO attestationdjm@openbsd.org2020-01-291-5/+5
* upstream: improve the error message for u2f enrollment errors bydjm@openbsd.org2020-01-261-2/+4
* Wrap stdint.h inside HAVE_STDINT_H.Darren Tucker2020-01-141-1/+3
* upstream: Extends the SK API to accept a set of key/value optionsdjm@openbsd.org2020-01-061-17/+104
* upstream: translate and return error codes; retry on bad PINdjm@openbsd.org2019-12-301-3/+18
* upstream: improve some error messages; ok markus@djm@openbsd.org2019-12-301-11/+11
* upstream: SK API and sk-helper error/PIN passingdjm@openbsd.org2019-12-301-14/+17
* upstream: resident keys support in SK APIdjm@openbsd.org2019-12-301-4/+112
* upstream: Factor out parsing of struct sk_enroll_responsedjm@openbsd.org2019-12-301-37/+64
* upstream: use ssh-sk-helper for all security key signing operationsdjm@openbsd.org2019-12-131-2/+2
* upstream: remove stray semicolon after closing brace of function;djm@openbsd.org2019-11-271-3/+3
* upstream: adjust on-wire signature encoding for ecdsa-sk keys todjm@openbsd.org2019-11-191-5/+5
* upstream: add the missing WITH_OPENSSL ifdefs after the ED25519-SKnaddy@openbsd.org2019-11-191-1/+15
* upstream: tweak debug messagedjm@openbsd.org2019-11-181-2/+2
* upstream: a little debug() in the security key interfacedjm@openbsd.org2019-11-161-1/+8
* upstream: directly support U2F/FIDO2 security keys in OpenSSH bydjm@openbsd.org2019-11-141-1/+20
* upstream: fix check for sig_s; noted by qsa at qualys.commarkus@openbsd.org2019-11-141-2/+2
* upstream: allow an empty attestation certificate returned by adjm@openbsd.org2019-11-131-2/+3
* upstream: remove extra layer for ed25519 signature; ok djm@markus@openbsd.org2019-11-121-38/+27
* upstream: check sig_r and sig_s for ssh-sk keys; ok djmmarkus@openbsd.org2019-11-121-1/+13
* upstream: update sk-api to version 2 for ed25519 support; ok djmmarkus@openbsd.org2019-11-121-7/+14
* upstream: implement sshsk_ed25519_assemble(); ok djmmarkus@openbsd.org2019-11-121-4/+54
* upstream: implement sshsk_ed25519_inner_sig(); ok djmmarkus@openbsd.org2019-11-121-6/+53
* upstream: rename sshsk_ecdsa_sign() to sshsk_sign(); ok djmmarkus@openbsd.org2019-11-121-2/+2
* upstream: factor out sshsk_ecdsa_inner_sig(); ok djm@markus@openbsd.org2019-11-121-20/+43
* upstream: factor out sshsk_ecdsa_assemble(); ok djm@markus@openbsd.org2019-11-121-37/+59
* autoconf pieces for U2F supportDamien Miller2019-11-011-0/+3
* upstream: U2F/FIDO middleware interfacedjm@openbsd.org2019-10-311-0/+377