fwupd/plugins/solokey
Richard Hughes 9b688d0b73 trivial: Set FWUPD_STATUS_DECOMPRESSING when preparing firmware
This avoids the plugins forgetting to do it themselves.
2020-09-08 14:18:46 +01:00
..
data Add support for the SoloKey Secure 2019-07-30 16:16:14 +01:00
fu-plugin-solokey.c Set the protocol per-device not per-plugin 2019-11-25 18:01:54 +00:00
fu-solokey-device.c trivial: Set FWUPD_STATUS_DECOMPRESSING when preparing firmware 2020-09-08 14:18:46 +01:00
fu-solokey-device.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
fu-solokey-firmware.c trivial: Provide some defines for common image names 2019-11-08 09:30:09 -06:00
fu-solokey-firmware.h trivial: Remove G_BEGIN_DECLS from all private headers 2019-10-09 20:02:16 +01:00
meson.build Convert libfwupdprivate to a shared library libfwupdplugin 2019-11-27 11:32:43 +00:00
README.md trivial: Document the use of vendor-id in each plugin 2019-12-11 18:10:44 +00:00
solokey.quirk Add support for the SoloKey Secure 2019-07-30 16:16:14 +01:00

SoloKey Support

Introduction

The SoloKey Secure and Hacker is an affordable open source FIDO2 security key.

All hardware supports the U2F HID flashing protocol. The Hacker version is not supported and the existing DFU update procedure should be used.

Firmware Format

The daemon will decompress the cabinet archive and extract a firmware blob in a JSON wrapped, base-64, Intel hex file.

This plugin supports the following protocol ID:

  • com.solokeys

GUID Generation

These devices use the standard USB DeviceInstanceId values, e.g.

  • USB\VID_0483&PID_A2CA&REV_0001
  • USB\VID_0483&PID_A2CA

Vendor ID Security

The vendor ID is set from the USB vendor, in this instance set to USB:0x0483