index
:
delta/openssh-git.git
IBS
PRIVSEP
V_2_5_2
V_2_9_9
V_2_9_P1
V_3_0_2
V_3_2_3
V_3_3
V_3_5
V_3_6
V_3_6_1
V_3_7
V_3_8
V_3_8_1
V_3_9
V_4_0
V_4_1
V_4_2
V_4_3
V_4_4
V_4_5
V_4_6
V_4_7
V_4_9
V_5_3
V_5_4
V_5_6
V_5_8
V_5_9
V_6_0
V_6_2
V_6_3
V_6_4
V_6_5
V_6_6
V_6_7
V_6_8
V_6_9
V_7_0
V_7_1
V_7_2
V_7_3
V_7_4
V_7_5
V_7_6
V_7_7
V_7_8
V_7_9
V_8_0
V_8_1
V_8_2
V_8_3
V_8_4
V_8_5
V_8_6
V_8_7
V_8_8
V_8_9
V_9_0
V_9_1
V_9_2
V_9_3
baserock/6.7-musl
baserock/morph
baserock/tiagogomes/armv8l64
master
anongit.mindrot.org: openssh.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
sk-usbhid.c
Commit message (
Expand
)
Author
Age
Files
Lines
*
upstream: sk_enroll: never drop SSH_SK_USER_VERIFICATION_REQD flag
djm@openbsd.org
2022-09-14
1
-9
/
+1
*
upstream: sk-usbhid: fix key_lookup() on tokens with built-in UV
djm@openbsd.org
2022-09-02
1
-2
/
+11
*
upstream: remove incorrect check that can break enrolling a
djm@openbsd.org
2022-08-19
1
-5
/
+1
*
on Cygwin, prefer WinHello FIDO device
Damien Miller
2022-08-17
1
-0
/
+4
*
upstream: add an extra flag to sk_probe() to indicate whether we're
djm@openbsd.org
2022-08-17
1
-6
/
+6
*
Revert "check_sk_options: add temporary WinHello workaround"
Corinna Vinschen
2022-08-12
1
-9
/
+0
*
fido_dev_is_winhello: return 0, not "false"
Corinna Vinschen
2022-08-12
1
-1
/
+1
*
Give unused param a name.
Darren Tucker
2022-08-08
1
-1
/
+1
*
sk_sign: set FIDO2 uv attribute explicitely for WinHello
Corinna Vinschen
2022-08-05
1
-0
/
+8
*
check_sk_options: add temporary WinHello workaround
Corinna Vinschen
2022-08-05
1
-0
/
+9
*
compat code for fido_dev_is_winhello()
Corinna Vinschen
2022-08-05
1
-0
/
+8
*
upstream: sk-usbhid: preserve error code returned by key_lookup()
djm@openbsd.org
2022-07-20
1
-2
/
+2
*
upstream: when enrolling a resident key on a security token, check
djm@openbsd.org
2022-07-20
1
-2
/
+69
*
upstream: Don't leak SK device. Patch from Pedro Martelletto via
dtucker@openbsd.org
2022-04-29
1
-1
/
+2
*
fix typos in previous
pedro martelletto
2022-02-07
1
-3
/
+3
*
compat code for fido_assert_set_clientdata()
Damien Miller
2022-02-07
1
-2
/
+26
*
upstream: use libfido2 1.8.0+ fido_assert_set_clientdata() instead
djm@openbsd.org
2022-02-07
1
-28
/
+33
*
upstream: better error message for FIDO keys when we can't match
djm@openbsd.org
2021-12-20
1
-1
/
+4
*
upstream: improve the testing of credentials against inserted FIDO
djm@openbsd.org
2021-12-03
1
-2
/
+4
*
upstream: move check_sk_options() up so we can use it earlier
djm@openbsd.org
2021-12-03
1
-43
/
+43
*
upstream: Many downstreams expect ssh to compile as non-C99...
deraadt@openbsd.org
2021-11-06
1
-3
/
+3
*
upstream: Better handle FIDO keys on tokens that provide user
djm@openbsd.org
2021-11-03
1
-9
/
+78
*
upstream: When downloading resident keys from a FIDO token, pass
djm@openbsd.org
2021-10-28
1
-9
/
+26
*
fix FIDO key support for !OPENSSL_HAS_ECC case
Damien Miller
2021-10-01
1
-0
/
+9
*
upstream: unbreak FIDO sk-ed25519 key enrollment for OPENSSL=no builds;
djm@openbsd.org
2021-10-01
1
-2
/
+6
*
upstream: Hash challenge supplied by client during FIDO key enrollment
djm@openbsd.org
2021-05-31
1
-4
/
+9
*
upstream: make names in function prototypes match those in
djm@openbsd.org
2021-02-18
1
-2
/
+2
*
upstream: use the new variant log macros instead of prepending
djm@openbsd.org
2020-10-18
1
-3
/
+3
*
upstream: want time.h here too
djm@openbsd.org
2020-10-03
1
-1
/
+2
*
upstream: when writing an attestation blob for a FIDO key, record all
djm@openbsd.org
2020-09-09
1
-1
/
+12
*
configure.ac: fix libfido2 back-compat
pedro martelletto
2020-09-02
1
-1
/
+1
*
upstream: Add RCS IDs to the few files that are missing them; from
djm@openbsd.org
2020-08-31
1
-0
/
+1
*
tweak back-compat for older libfido2
Damien Miller
2020-08-27
1
-6
/
+20
*
upstream: skip a bit more FIDO token selection logic when only a
djm@openbsd.org
2020-08-27
1
-1
/
+8
*
degrade semi-gracefully when libfido2 is too old
Damien Miller
2020-08-27
1
-0
/
+21
*
upstream: preserve verify-required for resident FIDO keys
djm@openbsd.org
2020-08-27
1
-2
/
+4
*
upstream: major rework of FIDO token selection logic
djm@openbsd.org
2020-08-27
1
-252
/
+326
*
upstream: support for user-verified FIDO keys
djm@openbsd.org
2020-08-27
1
-12
/
+26
*
upstream: we are still aiming for pre-C99 ...
deraadt@openbsd.org
2020-05-27
1
-2
/
+2
*
upstream: Enable credProtect extension when generating a resident
djm@openbsd.org
2020-05-27
1
-0
/
+57
*
upstream: always call fido_init(); previous behaviour only called
djm@openbsd.org
2020-05-27
1
-6
/
+11
*
wrap sha2.h inclusion in #ifdef HAVE_SHA2_H
Damien Miller
2020-05-01
1
-0
/
+2
*
upstream: when signing a challenge using a FIDO toke, perform the
djm@openbsd.org
2020-05-01
1
-3
/
+32
*
upstream: changes to support FIDO attestation
djm@openbsd.org
2020-01-29
1
-0
/
+1
*
upstream: improve the error message for u2f enrollment errors by
djm@openbsd.org
2020-01-26
1
-72
/
+27
*
upstream: missing else in check_enroll_options()
djm@openbsd.org
2020-01-06
1
-1
/
+1
*
upstream: fix error message
djm@openbsd.org
2020-01-06
1
-2
/
+1
*
upstream: Extends the SK API to accept a set of key/value options
djm@openbsd.org
2020-01-06
1
-42
/
+152
*
upstream: translate and return error codes; retry on bad PIN
djm@openbsd.org
2019-12-30
1
-17
/
+32
*
upstream: SK API and sk-helper error/PIN passing
djm@openbsd.org
2019-12-30
1
-5
/
+5
[next]