mirror of
https://github.com/bitwarden/mobile.git
synced 2024-06-26 10:36:21 +02:00
* [PM-5731] feat: implement get assertion params object * [PM-5731] feat: add first test * [PM-5731] feat: add rp mismatch test * [PM-5731] feat: ask for credentials when found * [PM-5731] feat: find discoverable credentials * [PM-5731] feat: add tests for successful UV requests * [PM-5731] feat: add user does not consent test * [PM-5731] feat: check for UV when reprompt is active * [PM-5731] fix: tests a bit, needed some additional "arrange" steps * [PM-5731] feat: add support for counter * [PM-5731] feat: implement assertion without signature * [PM-5732] feat: finish authenticator assertion implementation note: CryptoFunctionService still needs Sign implemenation * [PM-5731] chore: minor clean up * [PM-5731] feat: scaffold make credential * [PM-5731] feat: start implementing attestation * [PM-5731] feat: implement credential exclusion * [PM-5731] feat: add new credential confirmaiton * [PM-5731] feat: implement credential creation * [PM-5731] feat: add user verification checks * [PM-5731] feat: add unknown error handling * [PM-5731] chore: clean up unusued params * [PM-5731] feat: partial attestation implementation * [PM-5731] feat: implement key generation * [PM-5731] feat: return public key in DER format * [PM-5731] feat: implement signing * [PM-5731] feat: remove logging * [PM-5731] chore: use primary constructor * [PM-5731] chore: add Async to method names * [PM-5731] feat: add support for silent discoverability * [PM-5731] feat: add support for specifying user presence requirement * [PM-5731] feat: ensure unlocked vault * [PM-5731] chore: clean up and refactor assertion tests * [PM-5731] chore: clean up and refactor attestation tests * [PM-5731] chore: add user presence todo comment * [PM-5731] feat: scaffold fido2 client * PM-5731 Fix build updating discoverable flag * [PM-5731] fix: failing test * [PM-5731] feat: add sameOriginWithAncestor and user id length checks * [PM-5731] feat: add incomplete rpId verification * [PM-5731] chore: document uri helpers * [PM-5731] feat: implement fido2 client createCredential * [PM-5731] feat: implement credential assertion in client * fix wrong signature format (cherry picked from commita1c9ebf01f
) * [PM-5731] fix: issues after cherry-pick * Fix incompatible GUID conversions (cherry picked from commitc801b2fc3a
) * [PM-5731] chore: remove default constructor * [PM-5731] feat: refactor user interface to increase flexibility * [PM-5731] feat: implement generic assertion user interface class * [PM-5731] feat: remove ability to make user presence optional * [PM-5731] chore: remove logging comments * [PM-5731] feat: add native reprompt support to the authenticator * [PM-5731] feat: allow pre and post UV * [PM-5731] chore: add `Async` to method name. Remove `I` from struct * [PM-5731] fix: discoverable string repr lowercase * [PM-5731] chore: don't use C# 12 features * [PM-5731] fix: replace magic strings and numbers with contants and enums * [PM-5731] fix: use UTC creation date * [PM-5731] fix: formatting * [PM-5731] chore: use properties for public fields * [PM-5731] chore: remove TODO * [PM-5731] fix: IsValidRpId --------- Co-authored-by: Federico Maccaroni <fedemkr@gmail.com> Co-authored-by: mpbw2 <59324545+mpbw2@users.noreply.github.com>
36 lines
1.5 KiB
C#
36 lines
1.5 KiB
C#
namespace Bit.Core.Utilities.Fido2
|
|
{
|
|
/// <summary>
|
|
/// This class represents an authenticator's response to a client's request for generation of a
|
|
/// new authentication assertion given the WebAuthn Relying Party's challenge.
|
|
/// This response contains a cryptographic signature proving possession of the credential private key,
|
|
/// and optionally evidence of user consent to a specific transaction.
|
|
///
|
|
/// See: https://www.w3.org/TR/webauthn-2/#iface-authenticatorassertionresponse
|
|
/// </summary>
|
|
public class Fido2ClientAuthenticatorAssertionResponse
|
|
{
|
|
/// <summary>
|
|
/// The JSON-compatible serialization of client data passed to the authenticator by the client
|
|
/// in order to generate this assertion. The exact JSON serialization MUST be preserved, as the
|
|
/// hash of the serialized client data has been computed over it.
|
|
/// </summary>
|
|
public required byte[] ClientDataJSON { get; set; }
|
|
|
|
/// <summary>
|
|
/// The authenticator data returned by the authenticator.
|
|
/// </summary>
|
|
public required byte[] AuthenticatorData { get; set; }
|
|
|
|
/// <summary>
|
|
/// Raw signature returned from the authenticator.
|
|
/// </summary>
|
|
public required byte[] Signature { get; set; }
|
|
|
|
/// <summary>
|
|
/// The user handle returned from the authenticator, or null if the authenticator did not return a user handle.
|
|
/// </summary>
|
|
public byte[] UserHandle { get; set; } = null;
|
|
}
|
|
}
|