Pol Henarejos
a59cdef8e6
Merge branch 'main' into development
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
# Conflicts:
# pico-keys-sdk
2025-10-26 20:12:26 +01:00
Pol Henarejos
d4f2d04487
Relicense project under the GNU Affero General Public License v3 (AGPLv3)
...
and add the Enterprise / Commercial licensing option.
Main changes:
- Replace GPLv3 headers with AGPLv3 headers in source files.
- Update LICENSE file to the full AGPLv3 text.
- Add ENTERPRISE.md describing the dual-licensing model:
* Community Edition: AGPLv3 (strong copyleft, including network use).
* Enterprise / Commercial Edition: proprietary license for production /
multi-user / OEM use without the obligation to disclose derivative code.
- Update README with a new "License and Commercial Use" section pointing to
ENTERPRISE.md and clarifying how companies can obtain a commercial license.
Why this change:
- AGPLv3 ensures that modified versions offered as a service or deployed
in production environments must provide corresponding source code.
- The Enterprise / Commercial edition provides organizations with an
alternative proprietary license that allows internal, large-scale, or OEM
use (bulk provisioning, policy enforcement, inventory / revocation,
custom attestation, signed builds) without AGPL disclosure obligations.
This commit formally marks the first release that is dual-licensed:
AGPLv3 for the Community Edition and a proprietary commercial license
for Enterprise customers.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2025-10-26 20:10:06 +01:00
Pol Henarejos
b25e4bed6c
Fix build for non-pico boards.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2025-09-22 23:35:55 +02:00
Pol Henarejos
e4ed703b6b
Rename scan_files to scan_files_fido
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2025-05-24 14:25:33 +02:00
Pol Henarejos
b91ece8ec3
Add EDDSA support as a conditional build.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2025-02-21 19:00:44 +01:00
Pol Henarejos
f43bc9701f
Added support for silent authentication.
...
Fixes #91 .
It requires FIDO22 credential protocol, meaning that old credentials have to be reissued.
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2025-02-08 15:00:12 +01:00
Pol Henarejos
1d20321d69
Add BE/LE functions to pack uint16, uint32 and uint64.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-12-23 20:51:09 +01:00
Pol Henarejos
3fad6baf89
Rename CCID_ code names to PICOKEY_
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-11-05 18:21:42 +01:00
Pol Henarejos
902a988350
Fix memory cleanups.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-08-24 02:34:15 +02:00
Pol Henarejos
6c74db9763
Fix warnings.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-08-23 13:17:51 +02:00
Pol Henarejos
1f0e1fb8f4
Use latest Pico Keys SDK.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2024-05-05 00:58:51 +02:00
Pol Henarejos
d78d9d10aa
Use new names and defines.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-11-06 15:22:28 +01:00
Pol Henarejos
8b2be54ede
Update code style.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2023-03-04 14:05:30 +01:00
Pol Henarejos
b1fdb9b1d1
Cleaning unused includes.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-12-30 19:39:01 +01:00
Pol Henarejos
4cea6ebe87
U2F keys shall be verified only when the credID is u2f.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-10-04 11:42:41 +02:00
Pol Henarejos
9cbb53716b
Fix return errors.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-23 18:29:23 +02:00
Pol Henarejos
7a6b8a6af4
Added size check.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-23 18:20:39 +02:00
Pol Henarejos
2c4c618e3b
Loading credential if it belongs to U2F.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-23 11:40:39 +02:00
Pol Henarejos
dd4b52faf3
Fix authenticating MSG from CTAP2 and U2F.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-23 11:03:13 +02:00
Pol Henarejos
cbfe66e89b
Not necessary scan on every call.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-22 23:56:48 +02:00
Pol Henarejos
61b10b7971
Fix get sign counter.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-22 22:52:10 +02:00
Pol Henarejos
2d496fd8fc
Random functions shall be called for each core, otherwise it will hung.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-22 20:18:05 +02:00
Pol Henarejos
5da2af2c34
Accepting curves for key_derivation as a parameter.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-16 00:49:59 +02:00
Pol Henarejos
73f88b6882
Moving from U2F to CTAP1.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-08 17:35:56 +02:00
Pol Henarejos
573cb15e69
Replace some constants with defines.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-08 14:00:05 +02:00
Pol Henarejos
b178b139fb
Added user presence flag and global counter on authentication.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-07 20:03:34 +02:00
Pol Henarejos
8a139e70b7
Fix verifying key handle.
...
Now it works in Firefox!
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-06 21:47:13 +02:00
Pol Henarejos
dda5c25e85
Fix computing HMAC of key path.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-06 21:35:23 +02:00
Pol Henarejos
046706058d
Added support for user enforcement and key check (P1 0x07, 0x03 and 0x08).
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-06 16:54:12 +02:00
Pol Henarejos
6e56874d3e
Adding test user presence on authentication.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-06 16:30:01 +02:00
Pol Henarejos
cf68a6b61f
Adding msg authenticate.
...
Signed-off-by: Pol Henarejos <pol.henarejos@cttc.es >
2022-09-05 16:48:18 +02:00