| let publicKey = preformatMakeCredReq(response); |
| /** | |
| * Decodes arrayBuffer required fields. | |
| */ | |
| var preformatMakeCredReq = (makeCredReq) => { | |
| /* ----- DO NOT MODIFY THIS CODE ----- */ | |
| makeCredReq.challenge = base64url.decode(makeCredReq.challenge); | |
| makeCredReq.user.id = base64url.decode(makeCredReq.user.id); | |
| for(let excludeCred of makeCredReq.excludeCredentials) { | |
| excludeCred.id = base64url.decode(excludeCred.id); | |
| } | |
| return makeCredReq | |
| } |
>> an email to fido...@fidoalliance.org
>> <mailto:fido...@fidoalliance.org>.
When you say "wrong none-all-zero aaguid", do you mean the value in authenticatorData is different from that in the attestation certificate?
There is no way to tell the browser which attestation statement
format to use. If your server does not support the "fido_u2f"
attestation statement format, then you will not be able to verify
attestation statements from any U2F-only authenticator.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/314ae7fa-e1c5-47a1-9d87-290cf7b01d3d%40fidoalliance.org.
If the AAGUID in the attested credential data is 16 zero bytes, credentialCreationData.attestationObjectResult.fmt is "packed", and "x5c" & "ecdaaKeyId" are both absent from credentialCreationData.attestationObjectResult, then self attestationis being used and no further action is needed.
Otherwise
Replace the AAGUID in the attested credential data with 16 zero bytes.
Set the value of credentialCreationData.attestationObjectResult.fmt to "none", and set the value of credentialCreationData.attestationObjectResult.attStmt to be an empty CBOR map. (See §8.7 None Attestation Statement Formatand §6.4.4 Generating an Attestation Object).
To unsubscribe from this group and stop receiving emails from it, send an email to fido...@fidoalliance.org.