FIDO2 hardware key generation now handles diverse security keys: - Detect ed25519-sk vs ecdsa-sk support via ykman/fido2-token, with automatic fallback chain: ed25519-sk → ecdsa-sk → ecdsa-sk -O resident - Detect FIDO hardware by HID usage page (0xF1D0) instead of hardcoded Yubico vendor ID — works with SoloKeys, Titan, Nitrokey, etc. - Check libfido2 availability via ldconfig, dpkg-query, and rpm - Warn on Qubes OS vhci_hcd USB passthrough (corrupts CTAP2 messages) - Suppress admin recommendations when dependency is missing so install instructions stay visible - Accept ecdsa-sk keys in signing key filter New --reset-signing flag clears git signing config, removes allowed_signers entries, and moves/deletes key files so a fresh key can be generated. Bump version to 0.3.0. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
60 KiB
Executable File
60 KiB
Executable File