#
5d97138d |
| 04-Dec-2020 |
christos <christos@NetBSD.org> |
Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}
Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
show more ...
|