authenticator-rs
authenticator-rs copied to clipboard
Rust library to interact with Security Keys, used by Firefox
This depends on PR #185 and tries to solve #183: We deserialize from CTAP-format and serialize to webauthn-format. This also simplifies the C-API a lot, with the only downside of...
This PR allows downstream users to disable the compilation of the C API exposed by `authenticator`. These may not be used by pure Rust projects and the inclusion of them...
When serialised, the AttestationObject returned is invalid. This is because the types are incorrectly used. A valid attestation object cbor is: ``` AttestationObjectInner v=Map({ Text("fmt"): Text("packed"), Text("attStmt"): Map({ Text("alg"): Integer(-7),...
Instead of pulling in a new dependency to parse DER-format, we can do a lightweight parsing of only the first few bytes, to get the length of the certificate, in...
RegisterResult::CTAP2 currently has the signature `CTAP2(AttestationObject, CollectedClientData)`. However, AttestationObject contains a hash of the *serialised* bytes of CollectedClientData. By returning it in a struct form, the caller needs to re-serialise...
Maybe I'm just doing something wrong, but when my handles are 64 bytes, everything works normally. But when it's greater than that it cannot find the key. Again, not sure...
Looks bigger than it is. Mostly refactoring out some longer things to reuse them, and adding a new test-binary to check the excludeList-feature.
This is a forgotten leftover when switching to storing `File`s directly instead of file-handles. This is not needed at all.
looks like android, apple and windows have their own platform apis that should be used. not sure if there is some kind of dbus api on linux systems. - [0]...