Skip to content

Commit

Permalink
Add note about verifying U2F assertion signatures
Browse files Browse the repository at this point in the history
  • Loading branch information
emlun committed Mar 22, 2018
1 parent e155bae commit 632041c
Showing 1 changed file with 4 additions and 0 deletions.
4 changes: 4 additions & 0 deletions index.bs
Original file line number Diff line number Diff line change
Expand Up @@ -3016,6 +3016,10 @@ When verifying a given {{PublicKeyCredential}} structure (|credential|) and an {
1. Using the credential public key looked up in step 3, verify that |sig| is a valid signature over the binary concatenation of
|aData| and |hash|.

Note: This verification step is automatically compatible with signatures generated by FIDO U2F authenticators, because the
first 37 bytes of the U2F signed data constitute a valid [=authenticator data=] structure and the remaining 32 bytes are
|hash|. [[FIDO-U2F-Message-Formats]]

1. If the [=signature counter=] value |adata|.<code>[=signCount=]</code> is nonzero or the value stored
in conjunction with |credential|'s {{Credential/id}} attribute
is nonzero, then run the following sub-step:
Expand Down

0 comments on commit 632041c

Please sign in to comment.