1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
use base64urlsafedata::Base64UrlSafeData;
use serde::{Deserialize, Serialize};
use crate::extensions::{AuthenticationExtensionsClientOutputs, RequestAuthenticationExtensions};
use crate::options::*;
#[derive(Debug, Serialize, Clone, Deserialize)]
#[serde(rename_all = "camelCase")]
pub struct PublicKeyCredentialRequestOptions {
pub challenge: Base64UrlSafeData,
#[serde(skip_serializing_if = "Option::is_none")]
pub timeout: Option<u32>,
pub rp_id: String,
pub allow_credentials: Vec<AllowCredentials>,
pub user_verification: UserVerificationPolicy,
#[serde(skip_serializing_if = "Option::is_none")]
pub extensions: Option<RequestAuthenticationExtensions>,
}
#[derive(Debug, Serialize, Clone, Deserialize)]
#[serde(rename_all = "camelCase")]
pub enum Mediation {
Conditional,
}
#[derive(Debug, Serialize, Clone, Deserialize)]
#[serde(rename_all = "camelCase")]
pub struct RequestChallengeResponse {
pub public_key: PublicKeyCredentialRequestOptions,
#[serde(default, skip_serializing_if = "Option::is_none")]
pub mediation: Option<Mediation>,
}
#[cfg(feature = "wasm")]
impl From<RequestChallengeResponse> for web_sys::CredentialRequestOptions {
fn from(rcr: RequestChallengeResponse) -> Self {
use js_sys::{Array, Object, Uint8Array};
use wasm_bindgen::JsValue;
let jsv = serde_wasm_bindgen::to_value(&rcr).unwrap();
let pkcco = js_sys::Reflect::get(&jsv, &"publicKey".into()).unwrap();
let chal = Uint8Array::from(rcr.public_key.challenge.0.as_slice());
js_sys::Reflect::set(&pkcco, &"challenge".into(), &chal).unwrap();
if let Some(extensions) = rcr.public_key.extensions {
let obj: Object = (&extensions).into();
js_sys::Reflect::set(&pkcco, &"extensions".into(), &obj).unwrap();
}
let allow_creds: Array = rcr
.public_key
.allow_credentials
.iter()
.map(|ac| {
let obj = Object::new();
js_sys::Reflect::set(&obj, &"type".into(), &JsValue::from_str(ac.type_.as_str()))
.unwrap();
js_sys::Reflect::set(&obj, &"id".into(), &Uint8Array::from(ac.id.0.as_slice()))
.unwrap();
if let Some(transports) = &ac.transports {
let tarray: Array = transports
.iter()
.map(|trs| serde_wasm_bindgen::to_value(trs).unwrap())
.collect();
js_sys::Reflect::set(&obj, &"transports".into(), &tarray).unwrap();
}
obj
})
.collect();
js_sys::Reflect::set(&pkcco, &"allowCredentials".into(), &allow_creds).unwrap();
web_sys::CredentialRequestOptions::from(jsv)
}
}
#[derive(Debug, Deserialize, Serialize, Clone)]
pub struct AuthenticatorAssertionResponseRaw {
#[serde(rename = "authenticatorData")]
pub authenticator_data: Base64UrlSafeData,
#[serde(rename = "clientDataJSON")]
pub client_data_json: Base64UrlSafeData,
pub signature: Base64UrlSafeData,
#[serde(rename = "userHandle")]
pub user_handle: Option<Base64UrlSafeData>,
}
#[derive(Debug, Deserialize, Serialize, Clone)]
pub struct PublicKeyCredential {
pub id: String,
#[serde(rename = "rawId")]
pub raw_id: Base64UrlSafeData,
pub response: AuthenticatorAssertionResponseRaw,
#[serde(default)]
pub extensions: AuthenticationExtensionsClientOutputs,
#[serde(rename = "type")]
pub type_: String,
}
impl PublicKeyCredential {
pub fn get_user_unique_id(&self) -> Option<&[u8]> {
self.response.user_handle.as_ref().map(|b| b.as_ref())
}
pub fn get_credential_id(&self) -> &[u8] {
self.raw_id.0.as_slice()
}
}
#[cfg(feature = "wasm")]
impl From<web_sys::PublicKeyCredential> for PublicKeyCredential {
fn from(data: web_sys::PublicKeyCredential) -> PublicKeyCredential {
use js_sys::Uint8Array;
let data_raw_id =
Uint8Array::new(&js_sys::Reflect::get(&data, &"rawId".into()).unwrap()).to_vec();
let data_response = js_sys::Reflect::get(&data, &"response".into()).unwrap();
let data_response_authenticator_data = Uint8Array::new(
&js_sys::Reflect::get(&data_response, &"authenticatorData".into()).unwrap(),
)
.to_vec();
let data_response_signature =
Uint8Array::new(&js_sys::Reflect::get(&data_response, &"signature".into()).unwrap())
.to_vec();
let data_response_user_handle =
&js_sys::Reflect::get(&data_response, &"userHandle".into()).unwrap();
let data_response_user_handle = if data_response_user_handle.is_undefined() {
None
} else {
Some(Uint8Array::new(data_response_user_handle).to_vec())
};
let data_response_client_data_json = Uint8Array::new(
&js_sys::Reflect::get(&data_response, &"clientDataJSON".into()).unwrap(),
)
.to_vec();
let data_extensions = data.get_client_extension_results();
web_sys::console::log_1(&data_extensions);
let data_raw_id_b64 = Base64UrlSafeData(data_raw_id);
let data_response_client_data_json_b64 = Base64UrlSafeData(data_response_client_data_json);
let data_response_authenticator_data_b64 =
Base64UrlSafeData(data_response_authenticator_data);
let data_response_signature_b64 = Base64UrlSafeData(data_response_signature);
let data_response_user_handle_b64 = data_response_user_handle.map(Base64UrlSafeData);
PublicKeyCredential {
id: format!("{}", data_raw_id_b64),
raw_id: data_raw_id_b64,
response: AuthenticatorAssertionResponseRaw {
authenticator_data: data_response_authenticator_data_b64,
client_data_json: data_response_client_data_json_b64,
signature: data_response_signature_b64,
user_handle: data_response_user_handle_b64,
},
extensions: data_extensions.into(),
type_: "public-key".to_string(),
}
}
}