15 Commits

Author SHA1 Message Date
Conor Patrick
ce3ad0e56f bugfix 2019-03-20 16:51:58 -04:00
Conor Patrick
00d86379e5 parse full hmac-secret 2019-03-20 16:21:21 -04:00
Conor Patrick
821880a8d6 parse extension info in MC 2019-03-20 15:45:10 -04:00
Conor Patrick
ed676151f1 update license to apache2 + mit 2019-02-12 17:18:17 -05:00
Szczepan Zalega
449faea7d3
Fix buffer overread in ctap_encode_der_sig()
Take into account leading zeroes in the size to copy, for both R and S
ingredients of the signature.
Issue was occuring only in cases, when there was a leading zero for the
S part.

Refactor ctap_encode_der_sig():
- add in_ and out_ prefixes to the function arguments
- mark pointers const
- clear out buffer

Tested via simulated device on:
- Fedora 29
- gcc (GCC) 8.2.1 20181215 (Red Hat 8.2.1-6)
- libasan 8.2.1 / 6.fc29
(same machine, as in the related issue description)
by running ctap_test() Python test in a loop for 20 minutes (dev's
counter 400k+). Earlier issue was occuring in first minutes.

Tested on Nucleo32 board, by running the ctap_test() 20 times.

Fixes https://github.com/solokeys/solo/issues/94

Signed-off-by: Szczepan Zalega <szczepan@nitrokey.com>
2019-02-02 18:33:10 +01:00
Emanuele Cesena
bbc61d5743 New README and license 2018-12-16 16:19:40 -08:00
Conor Patrick
feceeb0a22 passing certification and interop with rk 2018-11-18 11:15:00 -08:00
Conor Patrick
fc8bc892c1 add initial resident key support 2018-11-18 11:15:00 -08:00
Conor Patrick
693bac9c15 increase max msg size 2018-11-18 11:15:00 -08:00
Conor Patrick
2fd96f8e4b pass fido2 tests 2018-10-28 16:30:55 -04:00
Conor Patrick
476178b3d3 use MIT license 2018-09-13 17:58:34 -04:00
Conor Patrick
eaa7e15499 all core functionality *works* 2018-07-11 21:55:20 -04:00
Conor Patrick
156dc3163a complete pin support 2018-07-10 19:16:41 -04:00
Conor Patrick
b9220defcc pin auth working 2018-07-08 22:36:16 -04:00
Conor Patrick
fb9a592d50 move things around and add efm8 and efm32 builds 2018-06-27 21:39:19 -04:00