/netbsd/external/bsd/libfido2/dist/man/ |
H A D | fido_dev_get_touch_begin.3 | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | NOTES | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | fido_bio_dev_get_info.3 | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | fido_bio_template.3 | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
/netbsd/external/bsd/libfido2/dist/tools/ |
H A D | fido2-detach.sh | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | fido2-attach.sh | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | fido2-unprot.sh | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | cred_verify.c | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | base64.c | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | include_check.sh | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | CMakeLists.txt | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
/netbsd/external/bsd/libfido2/dist/udev/ |
H A D | check.sh | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | genrules.awk | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | fidodevs | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
/netbsd/external/bsd/libfido2/dist/openbsd-compat/ |
H A D | clock_gettime.c | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | time.h | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | openbsd-compat.h | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
/netbsd/external/bsd/libfido2/dist/examples/ |
H A D | extern.h | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | select.c | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | manifest.c | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
/netbsd/external/bsd/libfido2/dist/fuzz/ |
H A D | prng.c | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | dummy.h | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | libfuzzer.c | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
/netbsd/external/bsd/libfido2/dist/src/ |
H A D | diff_exports.sh | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|
H A D | iso7816.c | 5d97138d Fri Dec 04 18:09:13 GMT 2020 christos <christos@NetBSD.org> Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|