@@ -50,7 +50,6 @@ <h1>Full-run test for MakeCredential/GetAssertion for W3C Web Authentication</h1
50
50
- response : AuthenticatorAttestationResponse : AuthenticatorResponse
51
51
- attestationObject: CBOR object
52
52
- clientDataJSON: serialized JSON
53
- - clientExtensionResults: (not yet supported)
54
53
*/
55
54
56
55
is ( aCredInfo . type , "public-key" , "Credential type must be public-key" )
@@ -66,13 +65,8 @@ <h1>Full-run test for MakeCredential/GetAssertion for W3C Web Authentication</h1
66
65
let clientData = JSON . parse ( buffer2string ( aCredInfo . response . clientDataJSON ) ) ;
67
66
is ( clientData . challenge , bytesToBase64UrlSafe ( gCredentialChallenge ) , "Challenge is correct" ) ;
68
67
is ( clientData . origin , window . location . origin , "Origin is correct" ) ;
69
- is ( clientData . hashAlgorithm , "SHA-256" , "Hash algorithm is correct" ) ;
70
68
is ( clientData . type , "webauthn.create" , "Type is correct" ) ;
71
69
72
- let extensions = aCredInfo . getClientExtensionResults ( ) ;
73
- is ( extensions . appid , undefined , "appid extension wasn't used" ) ;
74
- is ( clientData . clientExtensions . appid , undefined , "appid extension wasn't sent" ) ;
75
-
76
70
return webAuthnDecodeCBORAttestation ( aCredInfo . response . attestationObject )
77
71
. then ( function ( aAttestationObj ) {
78
72
// Make sure the RP ID hash matches what we calculate.
@@ -118,13 +112,11 @@ <h1>Full-run test for MakeCredential/GetAssertion for W3C Web Authentication</h1
118
112
ok ( aAssertion . response . signature === aAssertion . response . signature , "AuthenticatorAssertionResponse.Signature is SameObject" ) ;
119
113
ok ( aAssertion . response . signature instanceof ArrayBuffer , "AuthenticatorAssertionResponse.Signature is an ArrayBuffer" ) ;
120
114
ok ( aAssertion . response . userHandle === null , "AuthenticatorAssertionResponse.UserHandle is null for u2f authenticators" ) ;
121
- isDeeply ( aAssertion . getClientExtensionResults ( ) , { } , "No extensions should be reported" ) ;
122
115
123
116
ok ( aAssertion . response . authenticatorData . byteLength > 0 , "Authenticator data exists" ) ;
124
117
let clientData = JSON . parse ( buffer2string ( aAssertion . response . clientDataJSON ) ) ;
125
118
is ( clientData . challenge , bytesToBase64UrlSafe ( gAssertionChallenge ) , "Challenge is correct" ) ;
126
119
is ( clientData . origin , window . location . origin , "Origin is correct" ) ;
127
- is ( clientData . hashAlgorithm , "SHA-256" , "Hash algorithm is correct" ) ;
128
120
is ( clientData . type , "webauthn.get" , "Type is correct" ) ;
129
121
130
122
return webAuthnDecodeAuthDataArray ( aAssertion . response . authenticatorData )
0 commit comments