Commit History

Autor SHA1 Mensaxe Data
  djm@openbsd.org c767735241 upstream: when writing an attestation blob for a FIDO key, record all %!s(int64=3) %!d(string=hai) anos
  djm@openbsd.org 39e88aeff9 upstream: Add RCS IDs to the few files that are missing them; from %!s(int64=3) %!d(string=hai) anos
  djm@openbsd.org bb52e70fa5 upstream: Add support for FIDO webauthn (verification only). %!s(int64=3) %!d(string=hai) anos
  djm@openbsd.org 829451815e upstream: fix non-ASCII quote that snuck in; spotted by Gabriel %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org 5a442cec92 upstream: clarify role of FIDO tokens in multi-factor %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org 59d2de956e upstream: when signing a challenge using a FIDO toke, perform the %!s(int64=4) %!d(string=hai) anos
  dtucker@openbsd.org 0001576a09 upstream: Fix some typos and an incorrect word in docs. Patch from %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org 24c0f752ad upstream: changes to support FIDO attestation %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org 59d01f1d72 upstream: improve the error message for u2f enrollment errors by %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org c312ca077c upstream: Extends the SK API to accept a set of key/value options %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org ef65e7dbaa upstream: document SK API changes in PROTOCOL.u2f %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org 4532bd01d5 upstream: basic support for generating FIDO2 resident keys %!s(int64=4) %!d(string=hai) anos
  naddy@openbsd.org 416f15372b upstream: SSH U2F keys can now be used as host keys. Fix a garden %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org c33d46868c upstream: add a note about the 'extensions' field in the signed %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org a62f4e1960 upstream: some more corrections for documentation problems spotted %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org 22d4beb796 upstream: loading security keys into ssh-agent used the extension %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org c4036fe75e upstream: chop some unnecessary and confusing verbiage from the %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org 18e84bfdc5 upstream: tweak wording %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org a70d92f236 upstream: adjust on-wire signature encoding for ecdsa-sk keys to %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org 1306643448 upstream: document ed25519-sk pubkey, private key and certificate %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org 71856e1142 upstream: correct order or ecdsa-sk private key fields %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org 93fa2a6649 upstream: correct description of fields in pub/private keys (was %!s(int64=4) %!d(string=hai) anos
  markus@openbsd.org b556cc3cbf upstream: remove extra layer for ed25519 signature; ok djm@ %!s(int64=4) %!d(string=hai) anos
  markus@openbsd.org fd1a3b5e38 upstream: update sk-api to version 2 for ed25519 support; ok djm %!s(int64=4) %!d(string=hai) anos
  naddy@openbsd.org ad38406fc9 upstream: fix miscellaneous text problems; ok djm@ %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org 57ecc10628 upstream: Protocol documentation for U2F/FIDO keys in OpenSSH %!s(int64=4) %!d(string=hai) anos