Skip to content

Conversation

timweri
Copy link
Collaborator

@timweri timweri commented Apr 16, 2025

Status: Doesn't build

All of these are untested. Just committing for visbility.

It seems like x509-cert doesn't implement cert signature verification.

timweri and others added 7 commits April 16, 2025 00:18
* Add Yubico FIDO Root CA Serial 450203556

* Use Attestation Root instead of FIDO Root CA

* Refactor

* Make Tests Consistent

When I was originally writing the Mozilla handler for this library, I
didn't implement hashing of the challenge because there is no way to
take in a challenge from a remote host. This is why @timweri had to
remove the hashing from the test in his earlier commits.

We now generate random data first, then hash it such that we can get the
preimage to test it properly. This also will allow us to extend the API
into the future to allow remote challenges for key generation
verification.

* Bump version

* Add new PIV root CA and intermediates

---------

Co-authored-by: Mitchell Grenier <mitchell@confurious.io>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant