index
:
wireguard-openbsd
jd/histogram
jd/queueboosts
jd/simplify-queueing
master
WireGuard implementation for the OpenBSD kernel
Matt Dunwoodie
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
usr.bin
/
ssh
/
ssh-sk.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
a bit more debugging behind #ifdef DEBUG_SK
djm
2021-02-26
1
-2
/
+7
*
unbreak SK_DEBUG builds
djm
2021-02-18
1
-3
/
+3
*
use the new variant log macros instead of prepending __func__ and
djm
2020-10-18
1
-45
/
+42
*
when writing an attestation blob for a FIDO key, record all the data
djm
2020-09-09
1
-14
/
+30
*
preserve verify-required for resident FIDO keys
djm
2020-08-27
1
-2
/
+3
*
when signing a challenge using a FIDO toke, perform the hashing in the
djm
2020-04-28
1
-12
/
+2
*
return correct error in sshsk_ed25519_sig; ok djm
markus
2020-03-06
1
-2
/
+2
*
better error message when trying to use a FIDO key function and
djm
2020-02-28
1
-1
/
+5
*
Replace "security key" with "authenticator" in program messages.
naddy
2020-02-06
1
-14
/
+12
*
changes to support FIDO attestation
djm
2020-01-28
1
-5
/
+5
*
improve the error message for u2f enrollment errors by making
djm
2020-01-25
1
-2
/
+4
*
Extends the SK API to accept a set of key/value options for all
djm
2020-01-06
1
-17
/
+104
*
translate and return error codes; retry on bad PIN
djm
2019-12-30
1
-3
/
+18
*
improve some error messages; ok markus@
djm
2019-12-30
1
-11
/
+11
*
SK API and sk-helper error/PIN passing
djm
2019-12-30
1
-14
/
+17
*
resident keys support in SK API
djm
2019-12-30
1
-4
/
+112
*
Factor out parsing of struct sk_enroll_response
djm
2019-12-30
1
-37
/
+64
*
use ssh-sk-helper for all security key signing operations
djm
2019-12-13
1
-2
/
+2
*
remove stray semicolon after closing brace of function;
djm
2019-11-27
1
-3
/
+3
*
adjust on-wire signature encoding for ecdsa-sk keys to better match
djm
2019-11-19
1
-5
/
+5
*
add the missing WITH_OPENSSL ifdefs after the ED25519-SK addition; ok djm@
naddy
2019-11-18
1
-1
/
+15
*
tweak debug message
djm
2019-11-16
1
-2
/
+2
*
a little debug() in the security key interface
djm
2019-11-16
1
-1
/
+8
*
directly support U2F/FIDO2 security keys in OpenSSH by linking
djm
2019-11-14
1
-1
/
+16
*
fix check for sig_s; noted by qsa at qualys.com
markus
2019-11-13
1
-2
/
+2
*
allow an empty attestation certificate returned by a security key
djm
2019-11-12
1
-2
/
+3
*
remove extra layer for ed25519 signature; ok djm@
markus
2019-11-12
1
-38
/
+27
*
check sig_r and sig_s for ssh-sk keys; ok djm
markus
2019-11-12
1
-1
/
+13
*
update sk-api to version 2 for ed25519 support; ok djm
markus
2019-11-12
1
-7
/
+14
*
implement sshsk_ed25519_assemble(); ok djm
markus
2019-11-12
1
-4
/
+54
*
implement sshsk_ed25519_inner_sig(); ok djm
markus
2019-11-12
1
-6
/
+53
*
rename sshsk_ecdsa_sign() to sshsk_sign(); ok djm
markus
2019-11-12
1
-2
/
+2
*
factor out sshsk_ecdsa_inner_sig(); ok djm@
markus
2019-11-12
1
-20
/
+43
*
factor out sshsk_ecdsa_assemble(); ok djm@
markus
2019-11-12
1
-37
/
+59
*
U2F/FIDO middleware interface
djm
2019-10-31
1
-0
/
+375