2015 Commits

Author SHA1 Message Date
Token2
1f0fd2c51f Merge pull request #2 from mimi89999/main
Regenerate udev rules file
2026-01-09 16:17:42 +01:00
mimi89999
1327618690 Regenerate udev rules file 2026-01-09 16:13:26 +01:00
Token2
5a0be9c205 Merge pull request #1 from mimi89999/main
Cleanup
2026-01-09 15:46:32 +01:00
mimi89999
5c9a6dc43b Cleanup 2026-01-09 15:36:41 +01:00
Token2
6fe6f39d14 Remove duplicate vendor entries in fidodevs
Removed duplicate vendor entries in fidodevs.
2026-01-09 15:30:17 +01:00
Token2
a6db00f642 Add Token2 vendor and product definitions
Added new vendor and product entries for Token2.
2026-01-04 09:43:51 +01:00
Tobias Wiese
a94e52cb9e nfc_linux: Don't close stdin if fido_nl_new fails
The call to nfc_free is not needed because when calloc fails ctx will be
NULL and nfc_free will do nothing, when fido_nl_new() fails ctx->nl will
be null and does not need to be freed.
Additionally ctx->fd is 0 (due to calloc zero-initializing ctx) and
should not be closed.
Therefore I replaced this with a free call to just undo the (potential)
allocation by calloc.

Signed-off-by: Tobias Wiese <tobias@tobiaswiese.com>
2025-12-19 08:46:52 +01:00
Ludvig Michaelsson
b23d41ba41 u2f: enforce a minimum transaction timeout of 20 ms
If we send an APDU without enough time to also read the response, the
next `fido_dev_*()` call may fail spuriously due to there being data
left to read on the bus. To prevent this to the best of our abilities,
enforce a minimum remaining timeout for each `fido_{tx,rx}()` pair.
The exception to this rule is the selection algorithms which are left
the application is responsible for pacing in a sensible manner (the
transaction happens across multiple function calls).

If an application finds itself in a broken state, it can recover by
requesting a new channel ID via closing and re-opening the `fido_dev_t`.

This resolves #917.
2025-12-17 14:06:21 +01:00
Ludvig Michaelsson
62ce5dc108 credman: add support for the third party payment flag 2025-12-08 09:50:01 +01:00
Ludvig Michaelsson
4c7dd494c8 assert: support the thirdPartyPayment extension 2025-12-08 09:50:01 +01:00
Ludvig Michaelsson
87b6f34a22 cred: support the thirdPartyPayment extension 2025-12-08 09:50:00 +01:00
Ludvig Michaelsson
2549b165f8 ecdh: const-qualify hkdf_sha256() arguments
This drops OpenSSL 1.1 support.
2025-12-08 09:13:20 +01:00
Ludvig Michaelsson
8accfa2513 ci: drop last job building with OpenSSL 1.1 2025-12-08 09:13:11 +01:00
Ludvig Michaelsson
bafc045def extern: drop redundant argument name 2025-12-08 08:42:26 +01:00
Ludvig Michaelsson
6fb1be87c0 misc: drop trailing whitespace 2025-12-08 08:42:23 +01:00
Ludvig Michaelsson
66862b0ee1 LICENSE: bump copyright 2025-11-11 18:18:07 +01:00
Ludvig Michaelsson
5a1ac38617 man: adjust CTAP versions
While the FIDO alliance will not be certifying 2.2, these were 2.2
additions, after all.
2025-11-11 18:18:04 +01:00
Ludvig Michaelsson
c881dede2b misc: add .editorconfig
https://editorconfig.org/ is supported out of the box by many text
editors, defining a consistent set of settings to facilitate maintaining
consistent coding styles. Additionally, GitHub's renderer honors these
styles (otherwise defaulting to 4 space tabs) which helps in review
stages.
2025-11-06 09:44:23 +01:00
Ludvig Michaelsson
9f3e3a40ad winhello: support 64 byte hmac-salt 2025-11-05 11:36:45 +01:00
Ludvig Michaelsson
f60855b055 winhello: add pack_hmac_salt() helper function 2025-11-05 08:54:41 +01:00
Ludvig Michaelsson
fb71161544 winhello: support hmac-secret-mc 2025-11-04 16:12:56 +01:00
Ludvig Michaelsson
218ea7282c winhello: refactor helper functions for unpacking hmac-secret 2025-11-04 16:12:56 +01:00
Ludvig Michaelsson
788feb88d3 winhello: pass options to pack_cred_ext()
We'll need to modify the outer structure for hmac-secret-mc.
2025-11-04 16:12:52 +01:00
Ludvig Michaelsson
6b73969827 misc: update webauthn.h
As retrieved from microsoft/webauthn@0ef86c2fe3.
2025-11-04 09:24:57 +01:00
Ludvig Michaelsson
5a9548aa87 man: document hmac-secret-mc 2025-10-31 09:29:58 +01:00