template and source for hardware projects
Go to file
King Kévin 8d45bcfa60 lib: update repo 2024-04-18 15:01:59 +02:00
kicad brd: fix USB-A footprint 2024-04-05 05:09:53 +02:00
library@3f3f15e7c3 lib: update repo 2024-04-18 15:01:59 +02:00
.gitignore make: export 3d model 2024-03-08 07:14:21 +01:00
.gitmodules update library 2022-03-07 14:42:51 +01:00
.qeda.yaml lib: add fuse 2024-03-27 06:00:04 +01:00
CHANGELOG.md doc: add USB mirrored issue 2024-04-18 14:56:44 +02:00
DEVELOPMENT.md doc: update dev notes to KiCAD v8 2024-03-28 05:55:56 +01:00
KiBOM_CLI.py make: add bom generator (not included in pip) 2023-03-30 22:30:26 +02:00
LICENSE.txt add CERN-OHL-S license 2021-07-22 12:22:58 +02:00
Makefile make: fix clean 2024-03-29 00:25:01 +01:00
README.md doc: fix typos and add re-enumeration 2024-03-28 05:58:46 +01:00
bom.ini make: include DNF parts 2024-03-08 07:14:21 +01:00
fp-lib-table lib: add logos 2023-03-30 22:25:49 +02:00
passkey.kicad_pcb brd: fix USB-A footprint 2024-04-05 05:09:53 +02:00
passkey.kicad_pro sch: fix placement info 2024-04-18 14:56:10 +02:00
passkey.kicad_sch sch: add bottloader info 2024-04-18 15:00:20 +02:00
sym-lib-table lib: add partdb library 2023-03-30 22:23:41 +02:00
version switch to v2 2024-03-27 03:19:10 +01:00

README.md

passkey types your credentials upon button press.

purpose

This USB dongle will help out if you have to enter your credentials frequently. Temporarily store the credential on it, and press a button for passkey to enter it for you.

usage

  • passkey will appear as USB serial port and keyboard
  • connect to it using a serial terminal (baud rate is not important)
  • enter the credentials you often have to input
  • press on one button for passkey to input the username and password
  • press on the other button for passkey to input password

The credentials are saved in RAM and will clear as soon as power is removed. You can also clear the credentials by pressing on both buttons. And they will be cleared when it gets re-enumerated, e.g. when the hub it is in gets reconnected. The passkey will blink until credentials are saved.

Configuration available in the terminal:

  • which button is for which action
  • the keyboard layout used
  • global timeout to clear the credentials
  • last usage timeout to clear the credentials
  • manufacturer device authentication using challenge response (with unique per device key)
  • user device authentication using challenge response (with user provided key)

The device is protected against firmware read-out, re-flashing, and debug. This should prevent against installing malicious firmware to steal credentials. The challenge response allows authenticating the device. It relies on the micro-controller security though (not rated for security applications), and if this can be circumvented, all is lost.