FreeBSD manual

download PDF document: fido_assert_new.3.pdf

FIDO_ASSERT_NEW(3) FreeBSD Library Functions Manual FIDO_ASSERT_NEW(3)
NAME fido_assert_new, fido_assert_free, fido_assert_count, fido_assert_rp_id, fido_assert_user_display_name, fido_assert_user_icon, fido_assert_user_name, fido_assert_authdata_ptr, fido_assert_blob_ptr, fido_assert_clientdata_hash_ptr, fido_assert_hmac_secret_ptr, fido_assert_largeblob_key_ptr, fido_assert_user_id_ptr, fido_assert_sig_ptr, fido_assert_id_ptr, fido_assert_authdata_len, fido_assert_blob_len, fido_assert_clientdata_hash_len, fido_assert_hmac_secret_len, fido_assert_largeblob_key_len, fido_assert_user_id_len, fido_assert_sig_len, fido_assert_id_len, fido_assert_sigcount, fido_assert_flags - FIDO2 assertion API
SYNOPSIS #include <fido.h>
fido_assert_t * fido_assert_new(void);
void fido_assert_free(fido_assert_t **assert_p);
size_t fido_assert_count(const fido_assert_t *assert);
const char * fido_assert_rp_id(const fido_assert_t *assert);
const char * fido_assert_user_display_name(const fido_assert_t *assert, size_t idx);
const char * fido_assert_user_icon(const fido_assert_t *assert, size_t idx);
const char * fido_assert_user_name(const fido_assert_t *assert, size_t idx);
const unsigned char * fido_assert_authdata_ptr(const fido_assert_t *assert, size_t idx);
const unsigned char * fido_assert_clientdata_hash_ptr(const fido_assert_t *assert);
const unsigned char * fido_assert_blob_ptr(const fido_assert_t *assert, size_t idx);
const unsigned char * fido_assert_hmac_secret_ptr(const fido_assert_t *assert, size_t idx);
const unsigned char * fido_assert_largeblob_key_ptr(const fido_assert_t *assert, size_t idx);
const unsigned char * fido_assert_user_id_ptr(const fido_assert_t *assert, size_t idx);
const unsigned char * fido_assert_sig_ptr(const fido_assert_t *assert, size_t idx);
fido_assert_clientdata_hash_len(const fido_assert_t *assert);
size_t fido_assert_blob_len(const fido_assert_t *assert, size_t idx);
size_t fido_assert_hmac_secret_len(const fido_assert_t *assert, size_t idx);
size_t fido_assert_largeblob_key_len(const fido_assert_t *assert, size_t idx);
size_t fido_assert_user_id_len(const fido_assert_t *assert, size_t idx);
size_t fido_assert_sig_len(const fido_assert_t *assert, size_t idx);
size_t fido_assert_id_len(const fido_assert_t *assert, size_t idx);
uint32_t fido_assert_sigcount(const fido_assert_t *assert, size_t idx);
uint8_t fido_assert_flags(const fido_assert_t *assert, size_t idx);
DESCRIPTION A FIDO2 assertion is a collection of statements, each statement a map between a challenge, a credential, a signature, and ancillary attributes. In libfido2, a FIDO2 assertion is abstracted by the fido_assert_t type. The functions described in this page allow a fido_assert_t type to be allocated, deallocated, and inspected. For other operations on fido_assert_t, please refer to fido_assert_set_authdata(3), fido_assert_allow_cred(3), fido_assert_verify(3), and fido_dev_get_assert(3).
The fido_assert_new() function returns a pointer to a newly allocated, empty fido_assert_t type. If memory cannot be allocated, NULL is returned.
The fido_assert_free() function releases the memory backing *assert_p, where *assert_p must have been previously allocated by fido_assert_new(). On return, *assert_p is set to NULL. Either assert_p or *assert_p may be NULL, in which case fido_assert_free() is a NOP.
The fido_assert_count() function returns the number of statements in assert.
The fido_assert_rp_id() function returns a pointer to a NUL-terminated string holding the relying party ID of assert.
The fido_assert_user_display_name(), fido_assert_user_icon(), and fido_assert_user_name(), functions return pointers to the user display name, icon, and name attributes of statement idx in assert. If not NULL, the values returned by these functions point to NUL-terminated UTF-8 strings. The user display name, icon, and name attributes will typically only be returned by the authenticator if user verification was performed by the authenticator and multiple resident/discoverable credentials were involved in the assertion.
The fido_assert_hmac_secret_ptr() function returns a pointer to the hmac- secret attribute of statement idx in assert. The HMAC Secret Extension (hmac-secret) is a CTAP 2.0 extension. Note that the resulting hmac- secret varies according to whether user verification was performed by the authenticator.
The fido_assert_blob_ptr() and fido_assert_largeblob_key_ptr() functions return pointers to the "credBlob" and "largeBlobKey" attributes of statement idx in assert. Credential Blob (credBlob) and Large Blob Key (largeBlobKey) are CTAP 2.1 extensions.
The fido_assert_authdata_len(), fido_assert_clientdata_hash_len(), fido_assert_id_len(), fido_assert_user_id_len(), fido_assert_sig_len(), fido_assert_hmac_secret_len(), fido_assert_blob_len(), and fido_assert_largeblob_key_len() functions return the length of a given attribute.
Please note that the first statement in assert has an idx (index) value of 0.
The authenticator data and signature parts of an assertion statement are typically passed to a FIDO2 server for verification.
RETURN VALUES The authenticator data returned by fido_assert_authdata_ptr() is a CBOR- encoded byte string, as obtained from the authenticator.
The fido_assert_rp_id(), fido_assert_user_display_name(), fido_assert_user_icon(), fido_assert_user_name(), fido_assert_authdata_ptr(), fido_assert_clientdata_hash_ptr(), fido_assert_id_ptr(), fido_assert_user_id_ptr(), fido_assert_sig_ptr(), fido_assert_hmac_secret_ptr(), fido_assert_blob_ptr(), and fido_assert_largeblob_key_ptr() functions may return NULL if the respective field in assert is not set. If not NULL, returned pointers are guaranteed to exist until any API function that takes assert without the const qualifier is invoked.
SEE ALSO fido_assert_allow_cred(3), fido_assert_set_authdata(3), fido_assert_verify(3), fido_dev_get_assert(3), fido_dev_largeblob_get(3)
FreeBSD 14.0-RELEASE-p11 April 27, 2022 FreeBSD 14.0-RELEASE-p11