summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Jinkeun Jo [Mon, 3 Apr 2017 01:37:50 +0000 (18:37 -0700)]
Merge "Fix for Roaming mode Authentication" into tizen
Manasij Sur Roy [Thu, 30 Mar 2017 09:51:30 +0000 (15:21 +0530)]
Fix for Roaming mode Authentication
Change-Id: Ia24440083427ed5d96c024dce2baf76a81dff761
Signed-off-by: Manasij Sur Roy <manasij.r@samsung.com>
Jinkeun Jo [Fri, 24 Mar 2017 09:48:33 +0000 (02:48 -0700)]
Merge "Auth-FW based FIDO Authenticator implementation" into tizen
Manasij Sur Roy [Tue, 21 Mar 2017 09:05:07 +0000 (14:35 +0530)]
Auth-FW based FIDO Authenticator implementation
Change-Id: Id408afb6a2a4c2036bea095150871e11f798e901
Signed-off-by: Manasij Sur Roy <manasij.r@samsung.com>
jkjo92 [Mon, 13 Feb 2017 10:55:12 +0000 (19:55 +0900)]
apply 4.0 tool chain build error
Change-Id: I726c4ca9e30b71d9cd03ad2000e849c484abe52a
Signed-off-by: jkjo92 <jkjo92@samsung.com>
Manasij Sur Roy [Thu, 15 Dec 2016 12:21:54 +0000 (17:51 +0530)]
FIDO UAF ASM Framework initial version
- Authenticator Specific Module (ASM) acts as abstraction layer on top of Authenticator(s).
- Tizen FIDO UAF ASM supports various types of FIDO Authenticators via plugin architecture.
- Both Bound and Roaming types supported.
- BT and IoTivity connectivity supported.
- Only First Factor support is provided.
- Applications can not directly call ASM, instead they need to use fido-client APIs.
- Includes a test authenticator : To interact with FIDO server, the product must have commercial authenticator(s).
(Test Authenticator certificates are just self signed dummy, so it will fail if used with commercial FIDO server)
Change-Id: If654570eeaad6072e9f87220c25627fefe5b3335
Signed-off-by: Manasij Sur Roy <manasij.r@samsung.com>
Jeonghoon Jeon [Thu, 11 Jun 2015 06:42:20 +0000 (23:42 -0700)]
Initial empty repository