path: root/sk-usbhid.c
AgeCommit message (Expand)Author
2020-09-09upstream: when writing an attestation blob for a FIDO key, record fix libfido2 back-compatpedro martelletto
2020-08-31upstream: Add RCS IDs to the few files that are missing them;
2020-08-27tweak back-compat for older libfido2Damien Miller
2020-08-27upstream: skip a bit more FIDO token selection logic when only
2020-08-27degrade semi-gracefully when libfido2 is too oldDamien Miller
2020-08-27upstream: preserve verify-required for resident FIDO
2020-08-27upstream: major rework of FIDO token selection
2020-08-27upstream: support for user-verified FIDO
2020-05-27upstream: we are still aiming for pre-C99
2020-05-27upstream: Enable credProtect extension when generating a
2020-05-27upstream: always call fido_init(); previous behaviour only
2020-05-01wrap sha2.h inclusion in #ifdef HAVE_SHA2_HDamien Miller
2020-05-01upstream: when signing a challenge using a FIDO toke, perform
2020-01-29upstream: changes to support FIDO
2020-01-26upstream: improve the error message for u2f enrollment errors
2020-01-06upstream: missing else in check_enroll_options()
2020-01-06upstream: fix error
2020-01-06upstream: Extends the SK API to accept a set of key/value
2019-12-30upstream: translate and return error codes; retry on bad
2019-12-30upstream: SK API and sk-helper error/PIN
2019-12-30upstream: resident keys support in SK
2019-12-30upstream: basic support for generating FIDO2 resident
2019-11-20upstream: add the missing WITH_OPENSSL ifdefs after the
2019-11-17upstream: fix typos in
2019-11-17upstream: remove most uses of
2019-11-15upstream: rewrite
2019-11-15upstream: U2F tokens may return FIDO_ERR_USER_PRESENCE_REQUIRED
2019-11-15upstream: correct function name in debug
2019-11-15upstream: directly support U2F/FIDO2 security keys in OpenSSH