You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
// 1. Verify that attStmt is valid CBOR conforming to the syntax defined above and perform CBOR decoding on it to extract the contained fields
137
138
// (handled in base class)
@@ -220,6 +221,6 @@ public override (AttestationType, X509Certificate2[]) Verify(VerifyAttestationRe
220
221
if(!IsPurposeSign(attExtBytes))
221
222
thrownewFido2VerificationException(Fido2ErrorCode.InvalidAttestation,"Found purpose field not set to KM_PURPOSE_SIGN in android key attestation certificate extension");
@@ -86,6 +87,6 @@ public override (AttestationType, X509Certificate2[]) Verify(VerifyAttestationRe
86
87
thrownewFido2VerificationException(Fido2ErrorCode.InvalidAttestation,"Credential public key in Apple attestation does not match subject public key of credCert");
87
88
88
89
// 7. If successful, return implementation-specific values representing attestation type Anonymous CA and attestation trust path x5c.
// 1. Verify that the x5c array contains the intermediate and leaf certificates for App Attest, starting from the credential certificate in the first data buffer in the array (credcert).
@@ -81,22 +81,20 @@ public override (AttestationType, X509Certificate2[]) Verify(VerifyAttestationRe
81
81
// 4. Obtain the value of the credCert extension with OID 1.2.840.113635.100.8.2, which is a DER - encoded ASN.1 sequence.Decode the sequence and extract the single octet string that it contains. Verify that the string equals nonce.
82
82
// Steps 2 - 4 done in the "apple" format verifier
0 commit comments