From a44138f2ea367af81d5a3ddc9fc558bd80634e27 Mon Sep 17 00:00:00 2001 From: Robin Krahl Date: Thu, 29 Feb 2024 15:24:59 +0100 Subject: [PATCH] Bump encrypted size by 16 bytes --- src/ctap2/client_pin.rs | 6 +++--- src/ctap2/get_assertion.rs | 4 ++-- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/src/ctap2/client_pin.rs b/src/ctap2/client_pin.rs index 06e9529..ca372fe 100644 --- a/src/ctap2/client_pin.rs +++ b/src/ctap2/client_pin.rs @@ -62,12 +62,12 @@ pub struct Request { // Encrypted new PIN using `sharedSecret`. // (Encryption over UTF-8 representation of new PIN). #[serde(skip_serializing_if = "Option::is_none")] - pub new_pin_enc: Option>, + pub new_pin_enc: Option>, // 0x06 // Encrypted first 16 bytes of SHA-256 of PIN using `sharedSecret`. #[serde(skip_serializing_if = "Option::is_none")] - pub pin_hash_enc: Option>, + pub pin_hash_enc: Option>, // 0x07 #[serde(skip_serializing_if = "Option::is_none")] @@ -97,7 +97,7 @@ pub struct Response { // 0x02, encrypted `pinToken` using `sharedSecret` #[serde(skip_serializing_if = "Option::is_none")] - pub pin_token: Option>, + pub pin_token: Option>, // 0x03, number of PIN attempts remaining before lockout #[serde(skip_serializing_if = "Option::is_none")] diff --git a/src/ctap2/get_assertion.rs b/src/ctap2/get_assertion.rs index 9b56c59..fe57ed6 100644 --- a/src/ctap2/get_assertion.rs +++ b/src/ctap2/get_assertion.rs @@ -19,7 +19,7 @@ use crate::webauthn::*; pub struct HmacSecretInput { pub key_agreement: EcdhEsHkdf256PublicKey, // *either* enc(salt1) *or* enc(salt1 || salt2) - pub salt_enc: Bytes<64>, + pub salt_enc: Bytes<80>, pub salt_auth: Bytes<16>, #[serde(skip_serializing_if = "Option::is_none")] pub pin_protocol: Option, @@ -41,7 +41,7 @@ pub struct ExtensionsOutput { #[serde(rename = "hmac-secret")] #[serde(skip_serializing_if = "Option::is_none")] // *either* enc(output1) *or* enc(output1 || output2) - pub hmac_secret: Option>, + pub hmac_secret: Option>, } pub struct NoAttestedCredentialData(core::marker::PhantomData<()>);