tree: 620bcb9acb4fb2dba50ef1858f5fbd18c4d30fe3 [path history] [tgz]
  1. ble/
  2. cable/
  3. hid/
  4. mac/
  5. response_data_fuzzer_corpus/
  6. strings/
  7. win/
  8. attestation_object.cc
  9. attestation_object.h
  10. attestation_statement.cc
  11. attestation_statement.h
  12. attestation_statement_formats.cc
  13. attestation_statement_formats.h
  14. attestation_statement_formats_unittest.cc
  15. attested_credential_data.cc
  16. attested_credential_data.h
  17. authenticator_data.cc
  18. authenticator_data.h
  19. authenticator_get_assertion_response.cc
  20. authenticator_get_assertion_response.h
  21. authenticator_get_info_response.cc
  22. authenticator_get_info_response.h
  23. authenticator_make_credential_response.cc
  24. authenticator_make_credential_response.h
  25. authenticator_selection_criteria.cc
  26. authenticator_selection_criteria.h
  27. authenticator_supported_options.cc
  28. authenticator_supported_options.h
  29. ble_adapter_manager.cc
  30. ble_adapter_manager.h
  31. ble_adapter_manager_unittest.cc
  32. BUILD.gn
  33. ctap2_device_operation.h
  34. ctap_empty_authenticator_request.cc
  35. ctap_empty_authenticator_request.h
  36. ctap_get_assertion_request.cc
  37. ctap_get_assertion_request.h
  38. ctap_make_credential_request.cc
  39. ctap_make_credential_request.h
  40. ctap_request_unittest.cc
  41. ctap_response_fuzzer.cc
  42. ctap_response_unittest.cc
  43. DEPS
  44. device_operation.h
  45. device_response_converter.cc
  46. device_response_converter.h
  47. ec_public_key.cc
  48. ec_public_key.h
  49. fake_fido_discovery.cc
  50. fake_fido_discovery.h
  51. fake_fido_discovery_unittest.cc
  52. features.cc
  53. features.h
  54. fido_authenticator.cc
  55. fido_authenticator.h
  56. fido_constants.cc
  57. fido_constants.h
  58. fido_device.cc
  59. fido_device.h
  60. fido_device_authenticator.cc
  61. fido_device_authenticator.h
  62. fido_device_discovery.cc
  63. fido_device_discovery.h
  64. fido_device_discovery_unittest.cc
  65. fido_discovery_base.cc
  66. fido_discovery_base.h
  67. fido_discovery_factory.cc
  68. fido_discovery_factory.h
  69. fido_parsing_utils.cc
  70. fido_parsing_utils.h
  71. fido_parsing_utils_unittest.cc
  72. fido_request_handler.h
  73. fido_request_handler_base.cc
  74. fido_request_handler_base.h
  75. fido_request_handler_unittest.cc
  76. fido_strings.grd
  77. fido_task.cc
  78. fido_task.h
  79. fido_test_data.h
  80. fido_transport_protocol.cc
  81. fido_transport_protocol.h
  82. get_assertion_handler_unittest.cc
  83. get_assertion_request_handler.cc
  84. get_assertion_request_handler.h
  85. get_assertion_task.cc
  86. get_assertion_task.h
  87. get_assertion_task_unittest.cc
  88. make_credential_handler_unittest.cc
  89. make_credential_request_handler.cc
  90. make_credential_request_handler.h
  91. make_credential_task.cc
  92. make_credential_task.h
  93. make_credential_task_unittest.cc
  94. mock_fido_device.cc
  95. mock_fido_device.h
  96. mock_fido_discovery_observer.cc
  97. mock_fido_discovery_observer.h
  98. opaque_attestation_statement.cc
  99. opaque_attestation_statement.h
  100. opaque_public_key.cc
  101. opaque_public_key.h
  102. OWNERS
  103. pin.cc
  104. pin.h
  105. pin_internal.h
  106. platform_credential_store.h
  107. public_key.cc
  108. public_key.h
  109. public_key_credential_descriptor.cc
  110. public_key_credential_descriptor.h
  111. public_key_credential_params.cc
  112. public_key_credential_params.h
  113. public_key_credential_rp_entity.cc
  114. public_key_credential_rp_entity.h
  115. public_key_credential_user_entity.cc
  116. public_key_credential_user_entity.h
  117. README.md
  118. reset_request_handler.cc
  119. reset_request_handler.h
  120. response_data.cc
  121. response_data.h
  122. scoped_virtual_fido_device.cc
  123. scoped_virtual_fido_device.h
  124. set_pin_request_handler.cc
  125. set_pin_request_handler.h
  126. test_callback_receiver.h
  127. test_callback_receiver_unittest.cc
  128. u2f_command_constructor.cc
  129. u2f_command_constructor.h
  130. u2f_command_constructor_unittest.cc
  131. u2f_register_operation.cc
  132. u2f_register_operation.h
  133. u2f_register_operation_unittest.cc
  134. u2f_sign_operation.cc
  135. u2f_sign_operation.h
  136. u2f_sign_operation_unittest.cc
  137. virtual_ctap2_device.cc
  138. virtual_ctap2_device.h
  139. virtual_fido_device.cc
  140. virtual_fido_device.h
  141. virtual_u2f_device.cc
  142. virtual_u2f_device.h
device/fido/README.md

FIDO

//device/fido contains abstractions for FIDO security keys across multiple platforms.

U2F Security Keys

Support for U2F (FIDO 1.2) security keys is present for both USB Human Interface Devices (USB HID) and Bluetooth Low Energy (BLE) devices. Clients can perform U2F operations using the U2fRegister and U2fSign classes. These abstractions automatically perform device discovery and handle communication with the underlying devices. Talking to HID devices is done using the HID Mojo service, while communication with BLE devices is done using abstractions found in //device/bluetooth. HID is supported on all desktop platforms, while BLE lacks some support on Windows (see //device/bluetooth/README.md for details).

CTAP Security Keys

Support for CTAP2 (FIDO 2.0) security keys is in active development and aims to unify the implementations for both U2F and CTAP keys.

Testing

Unit Tests

Standard use of *_unittest.cc files for must code coverage. Files prefixed with mock_ provide GoogleMock based fake objects for easy mocking of dependencies during testing.

Fuzzers

libFuzzer tests are in *_fuzzer.cc files. They test for bad input from devices, e.g. when parsing responses to register or sign operations.