On Tue, Dec 9, 2014 at 12:46 PM, Andy Lutomirski wrote:
> On Mon, Nov 3, 2014 at 12:41 PM, Andy Lutomirski wrote:
>> On Mon, Nov 3, 2014 at 12:21 PM, Jiri Kosina wrote:
>>> On Mon, 3 Nov 2014, David Herrmann wrote:
>>>
> Agreed, mostly. My only real concern is that this could be annoying
>
On Mon, Nov 3, 2014 at 12:41 PM, Andy Lutomirski wrote:
> On Mon, Nov 3, 2014 at 12:21 PM, Jiri Kosina wrote:
>> On Mon, 3 Nov 2014, David Herrmann wrote:
>>
>>> > Agreed, mostly. My only real concern is that this could be annoying
>>> > for the userspace developers who will need to target Linux
On Mon, Nov 3, 2014 at 12:21 PM, Jiri Kosina wrote:
> On Mon, 3 Nov 2014, David Herrmann wrote:
>
>> > Agreed, mostly. My only real concern is that this could be annoying
>> > for the userspace developers who will need to target Linux and HIDAPI
>> > separately. Admittedly the Linux support will
On Mon, 3 Nov 2014, David Herrmann wrote:
> > Agreed, mostly. My only real concern is that this could be annoying
> > for the userspace developers who will need to target Linux and HIDAPI
> > separately. Admittedly the Linux support will be trivial.
>
> I see. I'll not stop you from using hidra
Hi
On Mon, Nov 3, 2014 at 8:19 PM, Andy Lutomirski wrote:
> On Mon, Nov 3, 2014 at 11:03 AM, David Herrmann wrote:
>> Hi
>>
>> On Sun, Nov 2, 2014 at 7:57 PM, Andy Lutomirski wrote:
>>> I want to get U2F (universal second factor, sometimes called "security
>>> key" or even "gnubby") working on
On Mon, Nov 3, 2014 at 11:03 AM, David Herrmann wrote:
> Hi
>
> On Sun, Nov 2, 2014 at 7:57 PM, Andy Lutomirski wrote:
>> I want to get U2F (universal second factor, sometimes called "security
>> key" or even "gnubby") working on Linux. U2F tokens are HID devices
>> that speak a custom protocol.
Hi
On Sun, Nov 2, 2014 at 7:57 PM, Andy Lutomirski wrote:
> I want to get U2F (universal second factor, sometimes called "security
> key" or even "gnubby") working on Linux. U2F tokens are HID devices
> that speak a custom protocol. The intent is that user code will speak
> to then using someth
On Sun, Nov 2, 2014 at 4:40 PM, Benjamin Tissoires
wrote:
> On Sun, Nov 2, 2014 at 6:34 PM, Andy Lutomirski wrote:
>> On Sun, Nov 2, 2014 at 3:01 PM, Benjamin Tissoires
>> wrote:
>>> On Sun, Nov 2, 2014 at 5:49 PM, Andy Lutomirski wrote:
On Sun, Nov 2, 2014 at 2:45 PM, Benjamin Tissoires
>
On Sun, Nov 2, 2014 at 6:34 PM, Andy Lutomirski wrote:
> On Sun, Nov 2, 2014 at 3:01 PM, Benjamin Tissoires
> wrote:
>> On Sun, Nov 2, 2014 at 5:49 PM, Andy Lutomirski wrote:
>>> On Sun, Nov 2, 2014 at 2:45 PM, Benjamin Tissoires
>>> wrote:
On Sun, Nov 2, 2014 at 4:40 PM, Jiri Kosina wrot
On Sun, Nov 2, 2014 at 3:01 PM, Benjamin Tissoires
wrote:
> On Sun, Nov 2, 2014 at 5:49 PM, Andy Lutomirski wrote:
>> On Sun, Nov 2, 2014 at 2:45 PM, Benjamin Tissoires
>> wrote:
>>> On Sun, Nov 2, 2014 at 4:40 PM, Jiri Kosina wrote:
On Sun, 2 Nov 2014, Jiri Kosina wrote:
> Altern
On Sun, Nov 2, 2014 at 5:49 PM, Andy Lutomirski wrote:
> On Sun, Nov 2, 2014 at 2:45 PM, Benjamin Tissoires
> wrote:
>> On Sun, Nov 2, 2014 at 4:40 PM, Jiri Kosina wrote:
>>> On Sun, 2 Nov 2014, Jiri Kosina wrote:
>>>
Alternatively, you can just write udev rule which triggers on HID devices
On Sun, Nov 2, 2014 at 2:45 PM, Benjamin Tissoires
wrote:
> On Sun, Nov 2, 2014 at 4:40 PM, Jiri Kosina wrote:
>> On Sun, 2 Nov 2014, Jiri Kosina wrote:
>>
>>> Alternatively, you can just write udev rule which triggers on HID devices,
>>> issues HIDIOCGRDESC ioctl() on the just-created hidraw nod
On Sun, Nov 2, 2014 at 10:13 PM, Andy Lutomirski wrote:
> On Sun, Nov 2, 2014 at 12:47 PM, Tom Gundersen wrote:
>> Hi Andy,
>>
>> On Sun, Nov 2, 2014 at 7:57 PM, Andy Lutomirski wrote:
>>> I want to get U2F (universal second factor, sometimes called "security
>>> key" or even "gnubby") working o
On Sun, 2 Nov 2014, Jiri Kosina wrote:
> Alternatively, you can just write udev rule which triggers on HID devices,
> issues HIDIOCGRDESC ioctl() on the just-created hidraw node, and decides
> afterwards whether node permissions need to be altered ... right?
Just to make myself clear here -- th
On Sun, 2 Nov 2014, Andy Lutomirski wrote:
> > Hmmm ... please keep in mind that report_descriptor is actually in
> > debugfs, so it's a bit questionable whether you can rely on it being
> > present on well-defined location on all systems.
>
> Huh? I have
> /sys/devices/pci:00/:00:1a.
On Sun, Nov 2, 2014 at 12:47 PM, Tom Gundersen wrote:
> Hi Andy,
>
> On Sun, Nov 2, 2014 at 7:57 PM, Andy Lutomirski wrote:
>> I want to get U2F (universal second factor, sometimes called "security
>> key" or even "gnubby") working on Linux. U2F tokens are HID devices
>> that speak a custom prot
On Sun, Nov 2, 2014 at 12:42 PM, Jiri Kosina wrote:
> On Sun, 2 Nov 2014, Andy Lutomirski wrote:
>
>> I want to get U2F (universal second factor, sometimes called "security
>> key" or even "gnubby") working on Linux. U2F tokens are HID devices
>> that speak a custom protocol. The intent is that
Hi Andy,
On Sun, Nov 2, 2014 at 7:57 PM, Andy Lutomirski wrote:
> I want to get U2F (universal second factor, sometimes called "security
> key" or even "gnubby") working on Linux. U2F tokens are HID devices
> that speak a custom protocol. The intent is that user code will speak
> to then using
On Sun, 2 Nov 2014, Andy Lutomirski wrote:
> I want to get U2F (universal second factor, sometimes called "security
> key" or even "gnubby") working on Linux. U2F tokens are HID devices
> that speak a custom protocol. The intent is that user code will speak
> to then using something like HIDAPI.
I want to get U2F (universal second factor, sometimes called "security
key" or even "gnubby") working on Linux. U2F tokens are HID devices
that speak a custom protocol. The intent is that user code will speak
to then using something like HIDAPI.
The trick is that, for HIDAPI to work, something n
20 matches
Mail list logo