Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handle pin_protocol field in HmacSecretInput #1

Merged
merged 1 commit into from
Nov 25, 2021

Conversation

robin-nitrokey
Copy link
Member

The December 08, 2020 version of the Client to Authenticator Protocol
(CTAP) specification added the pinUvAuthProtocol(0x04) field to the
input data for the hmac-secret extension in the
authenticatorGetAssertion command. This patch checks that the value of
this field (if present) is set to 1 as we only support this pin
protocol.
https://fidoalliance.org/specs/fido-v2.1-rd-20201208/fido-client-to-authenticator-protocol-v2.1-rd-20201208.html

This is still a draft because it depends on trussed-dev/ctap-types#2.

src/lib.rs Show resolved Hide resolved
Cargo.toml Outdated Show resolved Hide resolved
Cargo.toml Outdated Show resolved Hide resolved
@nickray nickray marked this pull request as ready for review November 24, 2021 23:42
The December 08, 2020 version of the Client to Authenticator Protocol
(CTAP) specification added the pinUvAuthProtocol(0x04) field to the
input data for the hmac-secret extension in the
authenticatorGetAssertion command.  This patch checks that the value of
this field (if present) is set to 1 as we only support this pin
protocol.
	https://fidoalliance.org/specs/fido-v2.1-rd-20201208/fido-client-to-authenticator-protocol-v2.1-rd-20201208.html
@robin-nitrokey
Copy link
Member Author

Rebased onto main and removed the changes to the dependencies.

@nickray nickray merged commit 4c51a15 into trussed-dev:main Nov 25, 2021
@robin-nitrokey robin-nitrokey deleted the hmac-secret branch November 29, 2021 11:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants