Displaying 4 results from an estimated 4 matches for "fidoalliance".
2014 Nov 05
2
[PATCH] Early request for comments: U2F authentication
...y keys.
7) I?d like to use SSL_load_error_strings() so that the human-readable
error messages actually contain some content and are not just NULL :).
It?ll require linking with -lssl. Is that okay or is there a reason
why we don?t do it so far?
Thank you very much for any replies :).
[1] https://fidoalliance.org/
[2] http://googleonlinesecurity.blogspot.ch/2014/10/strengthening-2-step-verification-with.html
[3] https://www.noname-ev.de/w/File:C14h-u2f-how-security-keys-work.pdf
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-add-u2f-to-automake.patch
Type: text/...
2014 Nov 18
55
[Bug 2319] New: [PATCH REVIEW] U2F authentication
...y keys.
7) I?d like to use SSL_load_error_strings() so that the human-readable
error messages actually contain some content and are not just NULL :).
It?ll require linking with -lssl. Is that okay or is there a reason
why we don?t do it so far?
Thank you very much for any replies :).
[1] https://fidoalliance.org/
[2]
http://googleonlinesecurity.blogspot.ch/2014/10/strengthening-2-step-verification-with.html
[3] https://www.noname-ev.de/w/File:C14h-u2f-how-security-keys-work.pdf
"""
--
You are receiving this mail because:
You are watching the assignee of the bug.
2014 Dec 24
2
[PATCH] U2F support in OpenSSH
...ch the registered U2F security
key after successful publickey authentication.
In case you want to register another U2F security key, just repeat the
process.
Thanks to Thomas Habets, Christian Svensson and Axel Wagner for their
support in implementing/discussing/testing this feature.
[1] https://fidoalliance.org/
[2]
http://googleonlinesecurity.blogspot.ch/2014/10/strengthening-2-step-verification-with.html
[3] https://www.noname-ev.de/w/File:C14h-u2f-how-security-keys-work.pdf
-------------------------------------------------------------------------------
Best regards,
Michael
-------------- next pa...
2021 Oct 17
16
[Bug 3355] New: no-touch-required flag not restored from hardware token
https://bugzilla.mindrot.org/show_bug.cgi?id=3355
Bug ID: 3355
Summary: no-touch-required flag not restored from hardware
token
Product: Portable OpenSSH
Version: 8.4p1
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: ssh-keygen