#
1.1.1.2 |
|
11-Aug-2023 |
christos |
Import libfido2 1.13.0 (old one was 1.8.0)
* Version 1.13.0 (2023-02-20) ** Support for linking against OpenSSL on Windows; gh#668. ** New API calls: - fido_assert_empty_allow_list; - fido_cred_empty_exclude_list. ** fido2-token: fix issue when listing large blobs. ** Improved support for different fuzzing engines.
* Version 1.12.0 (2022-09-22) ** Support for COSE_ES384. ** Support for hidraw(4) on FreeBSD; gh#597. ** Improved support for FIDO 2.1 authenticators. ** New API calls: - es384_pk_free; - es384_pk_from_EC_KEY; - es384_pk_from_EVP_PKEY; - es384_pk_from_ptr; - es384_pk_new; - es384_pk_to_EVP_PKEY; - fido_cbor_info_certs_len; - fido_cbor_info_certs_name_ptr; - fido_cbor_info_certs_value_ptr; - fido_cbor_info_maxrpid_minpinlen; - fido_cbor_info_minpinlen; - fido_cbor_info_new_pin_required; - fido_cbor_info_rk_remaining; - fido_cbor_info_uv_attempts; - fido_cbor_info_uv_modality. ** Documentation and reliability fixes.
* Version 1.11.0 (2022-05-03) ** Experimental PCSC support; enable with -DUSE_PCSC. ** Improved OpenSSL 3.0 compatibility. ** Use RFC1951 raw deflate to compress CTAP 2.1 largeBlobs. ** winhello: advertise "uv" instead of "clientPin". ** winhello: support hmac-secret in fido_dev_get_assert(). ** New API calls: - fido_cbor_info_maxlargeblob. ** Documentation and reliability fixes. ** Separate build and regress targets.
* Version 1.10.0 (2022-01-17) ** hid_osx: handle devices with paths > 511 bytes; gh#462. ** bio: fix CTAP2 canonical CBOR encoding in fido_bio_dev_enroll_*(); gh#480. ** winhello: fallback to GetTopWindow() if GetForegroundWindow() fails. ** winhello: fallback to hid_win.c if webauthn.dll isn't available. ** New API calls: - fido_dev_info_set; - fido_dev_io_handle; - fido_dev_new_with_info; - fido_dev_open_with_info. ** Cygwin and NetBSD build fixes. ** Documentation and reliability fixes. ** Support for TPM 2.0 attestation of COSE_ES256 credentials.
* Version 1.9.0 (2021-10-27) ** Enabled NFC support on Linux. ** Added OpenSSL 3.0 compatibility. ** Removed OpenSSL 1.0 compatibility. ** Support for FIDO 2.1 "minPinLength" extension. ** Support for COSE_EDDSA, COSE_ES256, and COSE_RS1 attestation. ** Support for TPM 2.0 attestation. ** Support for device timeouts; see fido_dev_set_timeout(). ** New API calls: - es256_pk_from_EVP_PKEY; - fido_cred_attstmt_len; - fido_cred_attstmt_ptr; - fido_cred_pin_minlen; - fido_cred_set_attstmt; - fido_cred_set_pin_minlen; - fido_dev_set_pin_minlen_rpid; - fido_dev_set_timeout; - rs256_pk_from_EVP_PKEY. ** Reliability and portability fixes. ** Better handling of HID devices without identification strings; gh#381. ** Fixed detection of Windows's native webauthn API; gh#382.
|
#
1.1.1.1 |
|
04-Dec-2020 |
christos |
Version 1.5.0 (2020-09-01) hid_linux: return FIDO_OK if no devices are found. hid_osx: repair communication with U2F tokens, gh#166; reliability fixes. fido2-{assert,cred}: new options to explicitly toggle UP, UV. Support for configurable report lengths. New API calls: fido_cbor_info_maxcredcntlst; fido_cbor_info_maxcredidlen; fido_cred_aaguid_len; fido_cred_aaguid_ptr; fido_dev_get_touch_begin; fido_dev_get_touch_status. Use COSE_ECDH_ES256 with CTAP_CBOR_CLIENT_PIN; gh#154. Allow CTAP messages up to 2048 bytes; gh#171. Ensure we only list USB devices by default. Version 1.4.0 (2020-04-15) hid_hidapi: hidapi backend; enable with -DUSE_HIDAPI=1. Fall back to U2F if the key claims to, but does not support FIDO2. FIDO2 credential protection (credprot) support. New API calls: fido_cbor_info_fwversion; fido_cred_prot; fido_cred_set_prot; fido_dev_set_transport_functions; fido_set_log_handler. Support for FreeBSD. Support for C++. Support for MSYS. Fixed EdDSA and RSA self-attestation. Version 1.3.1 (2020-02-19) fix zero-ing of le1 and le2 when talking to a U2F device. dropping sk-libfido2 middleware, please find it in the openssh tree.
|