Commit graph

7 commits

Author SHA1 Message Date
Mingshen Sun
a410c9480a
Refactor YubiKey decryptor (#663)
- Add YKFSmartCardInterface extension to simplify smart card related calls
- Use async/await to rewrite callback closures
- Update YubiKeyConnection
- Better error handling
2024-12-15 21:08:27 -08:00
Mingshen Sun
c5d9d258d8
Use createPGPMessage instead of CryptoNewPGPMessage to support ASCII-armored password with YubiKey (#658) 2024-11-30 11:29:27 -08:00
Anton Krasovsky
f6b2316324 Add support for Yubikey command chaining 2023-03-09 11:40:33 -08:00
Tony Wang
51ad0c2920
fix #540, duplicate entries in auto fill extension (#593)
* fix #540, duplicate entries in auto fill extension

`prepareCredentialList` is called twice, once before unlock and once
after. If the lists are already prepared, i.e. not empty, skip this
step.

* fix format and lint
2023-01-19 11:39:05 -08:00
Bradley Walters
6f5385fe4a
Force weak linking of CryptoTokenKit (#543)
Apple's CryptoTokenKit is only present in iOS 13.0+ however it exports
symbols with availability annotations going back to iOS 10.0.

In the Pass app we have a deployment target of iOS 12.0. Apple's
automatic weak linking system apparently only looks at the
symbol-level availability annotations so it assumes the symbols
we use will always be present (even though they won't pre-iOS-13).

We can work around this issue by forcing weak linking using the
"Optional" framework setting. (Note that this workaround would not
work if CryptoTokenKit was used from a third-party swift package.)

This is necessary to restore iOS 12 support after #533.

For further history see https://github.com/mssun/passforios/issues/539
2022-05-22 22:35:53 -07:00
Mingshen Sun
955e50c3d3
Initial implementation of using YubiKey for decryption (#533) 2022-01-09 21:38:39 -08:00
Mingshen Sun
68077bf04c
Rewrite PasswordViewController 2021-01-17 19:49:05 -08:00
Renamed from passAutoFillExtension/Services/PasswordDecryptor.swift (Browse further)