Path to this page:
./
security/libfido2,
U2F/FIDO/FIDO2 library and tools
Branch: CURRENT,
Version: 1.16.0,
Package name: libfido2-1.16.0,
Maintainer: pkgsrc-userslibfido2 provides library functionality and command-line tools to
communicate with a FIDO device over USB, and to verify attestation and
assertion signatures.
libfido2 supports the FIDO U2F (CTAP 1) and FIDO 2.0 (CTAP 2)
protocols.
Master sites:
Filesize: 667.787 KB
Version history: (Expand)
- (2025-10-24) Package has been reborn
- (2025-10-24) Package deleted from pkgsrc
- (2025-07-15) Package has been reborn
- (2025-07-15) Package deleted from pkgsrc
- (2025-05-09) Updated to version: libfido2-1.16.0
- (2024-06-14) Updated to version: libfido2-1.15.0
CVS history: (Expand)
2025-05-09 16:07:44 by Adam Ciarcinski | Files touched by this commit (3) |  |
Log message:
libfido2: updated to 1.16.0
Version 1.16.0 (2025-05-06)
* Added support for enterprise attestation.
* Improved handling of invalid key handles in U2F key lookup.
* Fixed issue where storing small CTAP 2.1 largeBlobs failed.
* Fixed APDU chaining issues for certain authenticators.
* Improved documentation and examples.
* New API calls:
- fido_cred_entattest;
- fido_cred_set_entattest.
|
| 2024-08-25 08:19:21 by Thomas Klausner | Files touched by this commit (575) |
Log message:
*: replace CMAKE_ARGS with CMAKE_CONFIGURE_ARGS
|
2024-06-14 17:12:46 by Adam Ciarcinski | Files touched by this commit (3) |  |
Log message:
libfido2: updated to 1.15.0
Version 1.15.0 (2024-06-13)
1.15.0 will be the last release to support OpenSSL 1.1.
bio, credman: improved CTAP 2.1 support.
hid_osx: fix issue where fido_hid_read() may block unnecessarily.
fido2-token -I: print maxcredbloblen.
hid_linux: improved support for uhid devices.
New API calls:
fido_cred_set_attobj;
fido_cred_x5c_list_count;
fido_cred_x5c_list_len;
fido_cred_x5c_list_ptr.
|
| 2024-02-21 11:47:10 by Nia Alarie | Files touched by this commit (2) |
Log message:
libfido2: Remove even more overzealous warning options that specific
versions of gcc might not even understand
|
| 2024-02-10 04:10:53 by Taylor R Campbell | Files touched by this commit (3) |
Log message:
security/libfido2: Fix NetBSD build, PR pkg/57919.
Patching away -Werror may be reasonable in general, but in this case
it breaks libfido2's detection of whether ioctl takes int or unsigned
long on NetBSD -- without -Werror, it wrongly concludes int, and
proceeds to build a libfido2 that casts every ioctl command to int
first, which leads to sign extension, which leads to the wrong ioctls
being passed into the kernel, which leads libfido2 to fail in any
attempts to open fido devices on NetBSD.
|
2023-12-07 13:35:46 by Adam Ciarcinski | Files touched by this commit (4) |  |
Log message:
libfido2: updated to 1.14.0
Version 1.14.0 (2023-11-13)
fido2-cred -M, fido2-token -G: support raw client data via -w flag.
winhello: support U2F AppID extension for assertions.
winhello: fix restrictive parsing of the hmac-secret on assertions.
winhello: translate NTE_USER_CANCELLED to FIDO_ERR_OPERATION_DENIED.
New API calls:
fido_assert_authdata_raw_len;
fido_assert_authdata_raw_ptr;
fido_assert_set_winhello_appid.
|
| 2023-12-01 12:00:28 by Nia Alarie | Files touched by this commit (1) |
Log message:
libfido2: Add a platform.mk to determine OS support in options.mk
|
| 2023-11-07 08:25:30 by Jonathan Perkin | Files touched by this commit (1) |
Log message:
libfido2: Re-enable builds for SunOS.
|