Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Signal credential protection #5

Merged
merged 1 commit into from
Nov 25, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
32 changes: 32 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
# fido-authenticator

Open source [FIDO][fido] authenticator implementation.

Built with [Trussed][trussed].

As used in the [SoloKeys][solokeys] [Solo 2][solo2] and [Nitrokey 3][nitro3].

### Specifications

- [Client to Authenticator Protocol (CTAP)][ctap21ps]
- [W3C Web Authentication][webauthnl2]

[fido]: https://fidoalliance.org/
[trussed]: https://trussed.dev/
[solokeys]: https://solokeys.com/
[solo2]: https://solo2.dev/
[nitro3]: https://www.nitrokey.com/news/2021/new-nitrokey-3-nfc-usb-c-rust-common-criteria-eal-6/
[ctap21ps]: https://fidoalliance.org/specs/fido-v2.1-ps-20210615/fido-client-to-authenticator-protocol-v2.1-ps-20210615.html
[webauthnl2]: https://www.w3.org/TR/webauthn-2/

#### License

`fido-authenticator` is fully open source.

All software, unless otherwise noted, is dual licensed under [Apache 2.0](LICENSE-APACHE) and [MIT](LICENSE-MIT).
You may use `fido-authenticator` software under the terms of either the Apache 2.0 license or MIT license.

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

All documentation, unless otherwise noted, is licensed under [CC-BY-SA](https://creativecommons.org/licenses/by-sa/4.0/).
You may use `fido-authenticator` documentation under the terms of the CC-BY-SA 4.0 license.
1 change: 1 addition & 0 deletions src/lib.rs
Original file line number Diff line number Diff line change
Expand Up @@ -2077,6 +2077,7 @@ where UP: UserPresence,

let mut extensions = Vec::<String<11>, 4>::new();
// extensions.push(String::from_str("credProtect").unwrap()).unwrap();
extensions.push(String::from_str("credProtect").unwrap()).unwrap();
extensions.push(String::from_str("hmac-secret").unwrap()).unwrap();

let mut pin_protocols = Vec::<u8, 1>::new();
Expand Down
2 changes: 1 addition & 1 deletion src/state.rs
Original file line number Diff line number Diff line change
Expand Up @@ -139,7 +139,7 @@ impl Identity {

(Some((key, cert)), aaguid.unwrap())
} else {
info_now!("exist returns none");
info_now!("attestation key does not exist");
(None, *b"AAGUID0123456789")
}
}
Expand Down