Skip to content

Commit

Permalink
Set pinProtocol for UV tokens when supported
Browse files Browse the repository at this point in the history
This avoids situations where the authenticator is being used with
extensions that require a pinProtocol, and the pinProtocol defaults to
1.
  • Loading branch information
BryanJacobs committed Jul 30, 2023
1 parent 963eae0 commit ff069fb
Showing 1 changed file with 3 additions and 2 deletions.
5 changes: 3 additions & 2 deletions fido2/client.py
Original file line number Diff line number Diff line change
Expand Up @@ -533,8 +533,10 @@ def _get_auth_params(
pin_token = None
pin_auth = None
internal_uv = False
client_pin = ClientPin(self.ctap2)
if client_pin.is_token_supported(self.info):
pin_protocol = client_pin.protocol
if self._should_use_uv(user_verification, mc) or permissions:
client_pin = ClientPin(self.ctap2)
allow_internal_uv = not permissions
permissions |= (
ClientPin.PERMISSION.MAKE_CREDENTIAL
Expand All @@ -545,7 +547,6 @@ def _get_auth_params(
client_pin, permissions, rp_id, event, on_keepalive, allow_internal_uv
)
if pin_token:
pin_protocol = client_pin.protocol
pin_auth = client_pin.protocol.authenticate(pin_token, client_data.hash)
else:
internal_uv = True
Expand Down

0 comments on commit ff069fb

Please sign in to comment.