forked from mysql/mysql-server
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathfido_assertion.h
84 lines (70 loc) · 3.05 KB
/
fido_assertion.h
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
/* Copyright (c) 2021, 2023, Oracle and/or its affiliates.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License, version 2.0,
as published by the Free Software Foundation.
This program is also distributed with certain software (including
but not limited to OpenSSL) that is licensed under separate terms,
as designated in a particular file or component or in included license
documentation. The authors of MySQL hereby grant you an additional
permission to link the program and your derivative works with the
separately licensed software that they have included with MySQL.
Without limiting anything contained in the foregoing, this file,
which is part of C Driver for MySQL (Connector/C), is also subject to the
Universal FOSS Exception, version 1.0, a copy of which can be found at
http://oss.oracle.com/licenses/universal-foss-exception.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License, version 2.0, for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */
#ifndef FIDO_ASSERTION_H_
#define FIDO_ASSERTION_H_
#include <fido.h>
/**
A wrapper class to access fido2 library APIs to interact with the device.
This class abstracts all access to FIDO device.
*/
class fido_prepare_assert {
public:
fido_prepare_assert();
~fido_prepare_assert();
bool parse_challenge(const unsigned char *challenge);
bool sign_challenge();
void get_signed_challenge(unsigned char **challenge_res,
size_t &challenge_res_len);
private:
/* set client data has */
void set_scramble(unsigned char *scramble, size_t len);
/* set credential ID */
void set_cred_id(unsigned char *cred, size_t len);
/* set relying party ID */
void set_rp_id(const char *rp_id);
/* get method to retrieve authenticator data */
const unsigned char *get_authdata_ptr();
/* get method to retrieve length of authenticator data */
size_t get_authdata_len();
/* get method to retrieve signature */
const unsigned char *get_signature_ptr();
/* get method to retrieve length of signature */
size_t get_signature_len();
private:
/* Abstract type to hold information during authentication */
fido_assert_t *m_assert;
};
/**
Class to initiate authentication(aka assertion in FIDO terminology) on
client side by generating a signed signature by FIDO device which needs
to be sent to server to be verified.
*/
class fido_assertion {
public:
bool prepare_assert(const unsigned char *challenge);
bool sign_challenge();
void get_signed_challenge(unsigned char **challenge_res,
size_t &challenge_res_len);
private:
fido_prepare_assert m_fido_prepare_assert;
};
#endif // FIDO_ASSERTION_H_