index
:
openssh.git
master
sid
ssh_8.3
v7.9
summary
refs
log
tree
commit
diff
log msg
author
committer
range
Age
Commit message (
Expand
)
Author
2020-01-02
ssh-sk-null.cc needs extern "C" {}
Damien Miller
2020-01-02
add dummy ssh-sk API for linking with fuzzers
Damien Miller
2019-12-30
refresh depend
Damien Miller
2019-12-30
upstream: Remove the -x option currently used for
djm@openbsd.org
2019-12-30
upstream: document SK API changes in PROTOCOL.u2f
djm@openbsd.org
2019-12-30
upstream: translate and return error codes; retry on bad PIN
djm@openbsd.org
2019-12-30
upstream: improve some error messages; ok markus@
djm@openbsd.org
2019-12-30
upstream: SK API and sk-helper error/PIN passing
djm@openbsd.org
2019-12-30
upstream: implement loading resident keys in ssh-add
djm@openbsd.org
2019-12-30
upstream: implement loading of resident keys in ssh-sk-helper
djm@openbsd.org
2019-12-30
upstream: resident keys support in SK API
djm@openbsd.org
2019-12-30
upstream: Factor out parsing of struct sk_enroll_response
djm@openbsd.org
2019-12-30
upstream: basic support for generating FIDO2 resident keys
djm@openbsd.org
2019-12-30
upstream: remove single-letter flags for moduli options
djm@openbsd.org
2019-12-30
upstream: prepare for use of ssh-keygen -O flag beyond certs
djm@openbsd.org
2019-12-30
upstream: sort -Y internally in the options list, as is already
jmc@openbsd.org
2019-12-30
upstream: in the options list, sort -Y and -y;
jmc@openbsd.org
2019-12-30
upstream: Replace the term "security key" with "(FIDO)
naddy@openbsd.org
2019-12-21
upstream: unit tests for ForwardAgent=/path; from Eric Chiang
djm@openbsd.org
2019-12-21
upstream: test security key host keys in addition to user keys
djm@openbsd.org
2019-12-21
upstream: Allow forwarding a different agent socket to the path
djm@openbsd.org
2019-12-21
upstream: SSH U2F keys can now be used as host keys. Fix a garden
naddy@openbsd.org
2019-12-20
upstream: Move always unsupported keywords to be grouped with the other
dtucker@openbsd.org
2019-12-20
upstream: Remove obsolete opcodes from the configuation enum.
dtucker@openbsd.org
2019-12-20
upstream: Remove now-obsolete config options from example in
dtucker@openbsd.org
2019-12-20
upstream: Document that security key-hosted keys can act as host
naddy@openbsd.org
2019-12-20
upstream: "Forward security" -> "Forward secrecy" since that's the
dtucker@openbsd.org
2019-12-20
upstream: cut obsolete lists of crypto algorithms from outline of
naddy@openbsd.org
2019-12-20
upstream: strdup may return NULL if memory allocation fails. Use
tobhe@openbsd.org
2019-12-20
upstream: sort sk-* methods behind their plain key methods cousins
djm@openbsd.org
2019-12-18
Mac OS X has PAM too.
Darren Tucker
2019-12-18
Show portable tarball pattern in example.
Darren Tucker
2019-12-18
OpenSSL is now optional.
Darren Tucker
2019-12-16
upstream: adapt to ssh-sk-client change
djm@openbsd.org
2019-12-16
upstream: it's no longer possible to disable privilege separation
djm@openbsd.org
2019-12-16
upstream: don't treat HostKeyAgent=none as a path either; avoids
djm@openbsd.org
2019-12-16
upstream: do not attempt to find an absolute path for sshd_config
djm@openbsd.org
2019-12-16
upstream: allow ssh-keyscan to find security key hostkeys
djm@openbsd.org
2019-12-16
upstream: allow security keys to act as host keys as well as user
djm@openbsd.org
2019-12-16
Allow clock_nanosleep_time64 in seccomp sandbox.
Darren Tucker
2019-12-15
Put SK ECDSA bits inside ifdef OPENSSL_HAS_ECC.
Darren Tucker
2019-12-14
remove a bunch of ENABLE_SK #ifdefs
Damien Miller
2019-12-14
ssh-sk-client.c needs includes.h
Damien Miller
2019-12-14
only link ssh-sk-helper against libfido2
Damien Miller
2019-12-14
adapt Makefile to ssh-sk-client everywhere
Damien Miller
2019-12-14
fixup
Damien Miller
2019-12-14
upstream: actually commit the ssh-sk-helper client code; ok markus
djm@openbsd.org
2019-12-14
upstream: perform security key enrollment via ssh-sk-helper too.
djm@openbsd.org
2019-12-14
upstream: allow sshbuf_put_stringb(buf, NULL); ok markus@
djm@openbsd.org
2019-12-14
upstream: use ssh-sk-helper for all security key signing operations
djm@openbsd.org
[prev]
[next]