You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In Bug 1936283 we have an example of an authenticator that returns a COSEKey with the wrong algorithm field in its GetKeyAgreement response. The authenticator has a built-in fingerprint reader, and does not support the getPinUvAuthTokenUsingUvWithPermissions function, so we should not need to establish a shared secret, however we establish one opportunistically in case we need to use the hmac-secret extension:
In Bug 1936283 we have an example of an authenticator that returns a COSEKey with the wrong
algorithm
field in itsGetKeyAgreement
response. The authenticator has a built-in fingerprint reader, and does not support thegetPinUvAuthTokenUsingUvWithPermissions
function, so we should not need to establish a shared secret, however we establish one opportunistically in case we need to use the hmac-secret extension:authenticator-rs/src/ctap2/mod.rs
Lines 293 to 295 in 1959330
We should avoid establishing a shared secret for CTAP 2.0 authenticators when hmac-secret is not explicitly requested.
The text was updated successfully, but these errors were encountered: