summaryrefslogtreecommitdiffhomepage
path: root/packages/server/src/authentication/verifyAuthenticationResponse.ts
diff options
context:
space:
mode:
authorMatthew Miller <matthew@millerti.me>2022-12-27 21:35:55 -0800
committerMatthew Miller <matthew@millerti.me>2022-12-27 21:35:55 -0800
commit6b1c86f307ea660fa36cf1a949286ba79b64e305 (patch)
tree89b749e039fc1123de15f63636195e5e3fcda42a /packages/server/src/authentication/verifyAuthenticationResponse.ts
parentcbfa15930382f98e215c2e68103e5ac8770b22fe (diff)
Rename `credential` opt to `response`
Diffstat (limited to 'packages/server/src/authentication/verifyAuthenticationResponse.ts')
-rw-r--r--packages/server/src/authentication/verifyAuthenticationResponse.ts24
1 files changed, 12 insertions, 12 deletions
diff --git a/packages/server/src/authentication/verifyAuthenticationResponse.ts b/packages/server/src/authentication/verifyAuthenticationResponse.ts
index 81b2878..d95bca5 100644
--- a/packages/server/src/authentication/verifyAuthenticationResponse.ts
+++ b/packages/server/src/authentication/verifyAuthenticationResponse.ts
@@ -15,7 +15,7 @@ import { matchExpectedRPID } from '../helpers/matchExpectedRPID';
import { isoUint8Array, isoBase64URL } from '../helpers/iso';
export type VerifyAuthenticationResponseOpts = {
- credential: AuthenticationResponseJSON;
+ response: AuthenticationResponseJSON;
expectedChallenge: string | ((challenge: string) => boolean);
expectedOrigin: string | string[];
expectedRPID: string | string[];
@@ -31,7 +31,7 @@ export type VerifyAuthenticationResponseOpts = {
*
* **Options:**
*
- * @param credential Authenticator credential returned by browser's `startAssertion()`
+ * @param response Response returned by **@simplewebauthn/browser**'s `startAssertion()`
* @param expectedChallenge The base64url-encoded `options.challenge` returned by
* `generateAuthenticationOptions()`
* @param expectedOrigin Website URL (or array of URLs) that the registration should have occurred on
@@ -49,7 +49,7 @@ export async function verifyAuthenticationResponse(
options: VerifyAuthenticationResponseOpts,
): Promise<VerifiedAuthenticationResponse> {
const {
- credential,
+ response,
expectedChallenge,
expectedOrigin,
expectedRPID,
@@ -57,7 +57,7 @@ export async function verifyAuthenticationResponse(
requireUserVerification = true,
advancedFIDOConfig,
} = options;
- const { id, rawId, type: credentialType, response } = credential;
+ const { id, rawId, type: credentialType, response: assertionResponse } = response;
// Ensure credential specified an ID
if (!id) {
@@ -78,11 +78,11 @@ export async function verifyAuthenticationResponse(
throw new Error('Credential missing response');
}
- if (typeof response?.clientDataJSON !== 'string') {
+ if (typeof assertionResponse?.clientDataJSON !== 'string') {
throw new Error('Credential response clientDataJSON was not a string');
}
- const clientDataJSON = decodeClientDataJSON(response.clientDataJSON);
+ const clientDataJSON = decodeClientDataJSON(assertionResponse.clientDataJSON);
const { type, origin, challenge, tokenBinding } = clientDataJSON;
@@ -120,15 +120,15 @@ export async function verifyAuthenticationResponse(
}
}
- if (!isoBase64URL.isBase64url(response.authenticatorData)) {
+ if (!isoBase64URL.isBase64url(assertionResponse.authenticatorData)) {
throw new Error('Credential response authenticatorData was not a base64url string');
}
- if (!isoBase64URL.isBase64url(response.signature)) {
+ if (!isoBase64URL.isBase64url(assertionResponse.signature)) {
throw new Error('Credential response signature was not a base64url string');
}
- if (response.userHandle && typeof response.userHandle !== 'string') {
+ if (assertionResponse.userHandle && typeof assertionResponse.userHandle !== 'string') {
throw new Error('Credential response userHandle was not a string');
}
@@ -142,7 +142,7 @@ export async function verifyAuthenticationResponse(
}
}
- const authDataBuffer = isoBase64URL.toBuffer(response.authenticatorData);
+ const authDataBuffer = isoBase64URL.toBuffer(assertionResponse.authenticatorData);
const parsedAuthData = parseAuthenticatorData(authDataBuffer);
const { rpIdHash, flags, counter, extensionsData } = parsedAuthData;
@@ -185,10 +185,10 @@ export async function verifyAuthenticationResponse(
}
}
- const clientDataHash = await toHash(isoBase64URL.toBuffer(response.clientDataJSON));
+ const clientDataHash = await toHash(isoBase64URL.toBuffer(assertionResponse.clientDataJSON));
const signatureBase = isoUint8Array.concat([authDataBuffer, clientDataHash]);
- const signature = isoBase64URL.toBuffer(response.signature);
+ const signature = isoBase64URL.toBuffer(assertionResponse.signature);
if ((counter > 0 || authenticator.counter > 0) && counter <= authenticator.counter) {
// Error out when the counter in the DB is greater than or equal to the counter in the