doc: fix typos and add re-enumeration

This commit is contained in:
King Kévin 2024-03-28 05:58:46 +01:00
parent 1d06f98af3
commit 7462e5d59a
1 changed files with 13 additions and 5 deletions

View File

@ -1,22 +1,23 @@
passkey type your credentials for you.
passkey types your credentials upon button press.
purpose
=======
This USB dongle will help you out if you have to enter your credentials frequently.
This USB dongle will help out if you have to enter your credentials frequently.
Temporarily store the credential on it, and press a button for passkey to enter it for you.
usage
=====
- passkey will appear as USB serial port and keyboard
- connect to it using a serial terminal (baud rate it not important)
- connect to it using a serial terminal (baud rate is not important)
- enter the credentials you often have to input
- press on one button for passkey to input the username and password
- press on the other button for passkey to input password
- press on the other button for passkey to input password
The credentials are saved in RAM and will clear as soon a power is removed.
The credentials are saved in RAM and will clear as soon as power is removed.
You can also clear the credentials by pressing on both buttons.
And they will be cleared when it gets re-enumerated, e.g. when the hub it is in gets reconnected.
The passkey will blink until credentials are saved.
Configuration available in the terminal:
@ -25,3 +26,10 @@ Configuration available in the terminal:
- the keyboard layout used
- global timeout to clear the credentials
- last usage timeout to clear the credentials
- manufacturer device authentication using challenge response (with unique per device key)
- user device authentication using challenge response (with user provided key)
The device is protected against firmware read-out, re-flashing, and debug.
This should prevent against installing malicious firmware to steal credentials.
The challenge response allows authenticating the device.
It relies on the micro-controller security though (not rated for security applications), and if this can be circumvented, all is lost.