Path to this page:
./
security/libfido2,
U2F/FIDO/FIDO2 library and tools
Branch: CURRENT,
Version: 1.15.0,
Package name: libfido2-1.15.0,
Maintainer: pkgsrc-userslibfido2 provides library functionality and command-line tools to
communicate with a FIDO device over USB, and to verify attestation and
assertion signatures.
libfido2 supports the FIDO U2F (CTAP 1) and FIDO 2.0 (CTAP 2)
protocols.
Master sites:
Filesize: 654.315 KB
Version history: (Expand)
- (2024-06-14) Updated to version: libfido2-1.15.0
- (2024-02-10) Updated to version: libfido2-1.14.0nb1
- (2023-12-07) Updated to version: libfido2-1.14.0
- (2023-10-25) Updated to version: libfido2-1.13.0nb1
- (2023-03-15) Updated to version: libfido2-1.13.0
- (2022-08-06) Updated to version: libfido2-1.11.0
CVS history: (Expand)
2024-08-25 08:19:21 by Thomas Klausner | Files touched by this commit (575) |
Log message:
*: replace CMAKE_ARGS with CMAKE_CONFIGURE_ARGS
|
2024-06-14 17:12:46 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message:
libfido2: updated to 1.15.0
Version 1.15.0 (2024-06-13)
1.15.0 will be the last release to support OpenSSL 1.1.
bio, credman: improved CTAP 2.1 support.
hid_osx: fix issue where fido_hid_read() may block unnecessarily.
fido2-token -I: print maxcredbloblen.
hid_linux: improved support for uhid devices.
New API calls:
fido_cred_set_attobj;
fido_cred_x5c_list_count;
fido_cred_x5c_list_len;
fido_cred_x5c_list_ptr.
|
2024-02-21 11:47:10 by Nia Alarie | Files touched by this commit (2) |
Log message:
libfido2: Remove even more overzealous warning options that specific
versions of gcc might not even understand
|
2024-02-10 04:10:53 by Taylor R Campbell | Files touched by this commit (3) |
Log message:
security/libfido2: Fix NetBSD build, PR pkg/57919.
Patching away -Werror may be reasonable in general, but in this case
it breaks libfido2's detection of whether ioctl takes int or unsigned
long on NetBSD -- without -Werror, it wrongly concludes int, and
proceeds to build a libfido2 that casts every ioctl command to int
first, which leads to sign extension, which leads to the wrong ioctls
being passed into the kernel, which leads libfido2 to fail in any
attempts to open fido devices on NetBSD.
|
2023-12-07 13:35:46 by Adam Ciarcinski | Files touched by this commit (4) | |
Log message:
libfido2: updated to 1.14.0
Version 1.14.0 (2023-11-13)
fido2-cred -M, fido2-token -G: support raw client data via -w flag.
winhello: support U2F AppID extension for assertions.
winhello: fix restrictive parsing of the hmac-secret on assertions.
winhello: translate NTE_USER_CANCELLED to FIDO_ERR_OPERATION_DENIED.
New API calls:
fido_assert_authdata_raw_len;
fido_assert_authdata_raw_ptr;
fido_assert_set_winhello_appid.
|
2023-12-01 12:00:28 by Nia Alarie | Files touched by this commit (1) |
Log message:
libfido2: Add a platform.mk to determine OS support in options.mk
|
2023-11-07 08:25:30 by Jonathan Perkin | Files touched by this commit (1) |
Log message:
libfido2: Re-enable builds for SunOS.
|
2023-11-07 01:28:07 by Greg Troxel | Files touched by this commit (1) |
Log message:
security/libfido2: Mark BROKEN_EXCEPT_ON_PLATFORM
Upstream has (ignoring Windows) explicit code for 6 platforms,
covering most pkgsrc usage except SunOS. Because it ought to build on
systems that can support usbhid (and upstream even has an option to
disable usbhid), not building is BROKEN rather than ONLY_FOR.
Tested to build and pass tests on NetBSD 10 amd64.
|