Crates.io | ctap_hmac |
lib.rs | ctap_hmac |
version | 0.4.5 |
source | src |
created_at | 2019-10-09 14:40:19.599627 |
updated_at | 2021-07-26 16:42:04.444922 |
description | A Rust implementation of the FIDO2 CTAP protocol, including the HMAC extension |
homepage | https://github.com/shimunn/ctap |
repository | https://github.com/shimunn/ctap |
max_upload_size | |
id | 171230 |
size | 121,985 |
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
ctap is a library implementing the FIDO2 CTAP protocol.
use ctap_hmac::*;
let device_info = get_devices()?.next().expect("no device connected");
let mut device = FidoDevice::new(&device_info)?;
// This can be omitted if the FIDO device is not configured with a PIN.
let pin = "test";
device.unlock(pin)?;
// In a real application these values would come from the requesting app.
let cred_request = FidoCredentialRequestBuilder::default()
.rp_id("rp_id")
.user_name("user_name")
.build().unwrap();
let cred = device.make_credential(&cred_request)?;
let cred = &&cred;
let assertion_request = FidoAssertionRequestBuilder::default()
.rp_id("rp_id")
.credential(&&cred)
.build().unwrap();
// In a real application the credential would be stored and used later.
let result = device.get_assertion(&assertion_request);
Currently, this library only supports Linux. Testing and contributions for other platforms is welcome.
Licensed under either of
at your option.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.