b4c8bd9fe4
This involves mostly creation of host keys proofs but needs to follow the same procedure as the client authentication signatures. At the same time, the SHA2 extension is enabled in the pkd so we are able to atomicaly provide correct signatures and pass tests. Signed-off-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> |
||
---|---|---|
.. | ||
CMakeLists.txt | ||
pkd_client.h | ||
pkd_daemon.c | ||
pkd_daemon.h | ||
pkd_hello.c | ||
pkd_keyutil.c | ||
pkd_keyutil.h | ||
pkd_util.c | ||
pkd_util.h |