You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/07b15103-c405-4bea-b2af-8528c584967cn%40fidoalliance.org.
From the actual version of Client to Authenticator Protocol,
An authenticator MAY impose arbitrary, additional constraints on PINs. If newPin fails to satisfy such ad-
ditional constraints, the authenticator returns CTAP2_ERR_PIN_POLICY_VIOLATION.
You can indeed add arbitrary constraints if you need to comply with existing standards, but note that this should only be configuration specific in order to pass the conformance tests.
It’s impossible for the conformance tests to be both thorough and take into account every possible pin policy.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/CACHSkNrAyB_0Oz5zTdQgotRmf5LKrN5BB_Hwwe6QVqzUTZ%2Be6g%40mail.gmail.com.