You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Aug 6, 2024. It is now read-only.
In CTAP2.1 the max pin length is 63 bytes and is padded out to 64 bytes.
In CTAP2.0 "The decrypted padded newPin should be of at least 64 bytes length"
So 64 bytes is what should be tested for.
Just for fun CTAP2.0 doesn't define errors.
For CTAP2.1 the error for too short is CTAP1_ERR_INVALID_PARAMETER someone needs to speak up if they want that changed.
For paddedNewPin being longer than 64 bytes nether spec mentions an error.
I will see about fixing that in CTAP2.1
The text was updated successfully, but these errors were encountered:
LGTM and thanks for the spec fix for longer padded PINs.
Here's my reasoning for the test. CTAP 2.0 says:
The decrypted padded newPin should be of at least 64 bytes length and authenticator determines actual PIN
length by looking for first 0x00 byte which terminates the PIN.
Therefore, CTAP 2.1 seemed like a clarification to me. The sentence above seems to imply at least one byte of padding, and 2.1 makes this explicit. Also, this sentence speaks about "padded" first, which is correctly stated to be 64 bytes at least, and then later talks about "actual" length. This test is checking for the "actual" PIN length.
For more anecdotal evidence, I think this is the "majority" interpretation on my small sample of tested devices.
To be fair, I always found this sentence strange. Because "looking for the first" byte implies that it's important from what direction you start looking.
ve7jtb
changed the title
client_pin_new_requirements_set_pin and get_assertion_empty_user_id pin padding is to 64 bytes not 32
client_pin_new_requirements_set_pin and client_pin_new_requirements_change_pin pin padding is to 64 bytes not 32
Nov 23, 2020
Oh, I thought this is about actual PIN length vs padded PIN length. Your last error message sounds more like a padded PIN length problem. Are you saying the test is incorrect, or just the message misleading?
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
In CTAP2.1 the max pin length is 63 bytes and is padded out to 64 bytes.
In CTAP2.0 "The decrypted padded newPin should be of at least 64 bytes length"
So 64 bytes is what should be tested for.
Just for fun CTAP2.0 doesn't define errors.
For CTAP2.1 the error for too short is CTAP1_ERR_INVALID_PARAMETER someone needs to speak up if they want that changed.
For paddedNewPin being longer than 64 bytes nether spec mentions an error.
I will see about fixing that in CTAP2.1
The text was updated successfully, but these errors were encountered: