Displaying 2 results from an estimated 2 matches for "fido_assert_free".
2019 Nov 15
2
U2F support in OpenSSH HEAD
...hat makes this
change and it seems to fix my issue.
-------------- next part --------------
diff --git a/sk-usbhid.c b/sk-usbhid.c
index c0a6bd0d..00c07685 100644
--- a/sk-usbhid.c
+++ b/sk-usbhid.c
@@ -204,7 +204,7 @@ try_device(fido_dev_t *dev, const uint8_t *message, size_t message_len,
out:
fido_assert_free(&assert);
- return r != FIDO_OK ? -1 : 0;
+ return r != FIDO_OK && r != FIDO_ERR_USER_PRESENCE_REQUIRED ? -1 : 0;
}
/* Iterate over configured devices looking for a specific key handle */
2019 Nov 01
10
U2F support in OpenSSH HEAD
Hi,
As of this morning, OpenSSH now has experimental U2F/FIDO support, with
U2F being added as a new key type "sk-ecdsa-sha2-nistp256 at openssh.com"
or "ecdsa-sk" for short (the "sk" stands for "security key").
If you're not familiar with U2F, this is an open standard for making
inexpensive hardware security tokens. These are easily the cheapest way