You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Since the credential is made on the client-side,
"make" is a bad name as it implies that the credential
is made on the server, but it isn't, it's merely "stored"
on the server.
Copy file name to clipboardExpand all lines: README.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,13 +7,13 @@
7
7
1.[API](#api)
8
8
1.[Sign-up functions](#sign-up)
9
9
1.[webauthn.init_credential()]
10
-
1.[webauthn.make_credential()]
10
+
1.[webauthn.store_credential()]
11
11
1.[Sign-in functions](#sign-in)
12
12
1.[webauthn.get_credentials()]
13
13
1.[webauthn.verify_assertion()]
14
14
15
15
[webauthn.init_credential()]: #init-credential
16
-
[webauthn.make_credential()]: #make-credential
16
+
[webauthn.store_credential()]: #make-credential
17
17
[webauthn.get_credentials()]: #get-credentials
18
18
[webauthn.verify_assertion()]: #verify-assertion
19
19
@@ -85,7 +85,7 @@ The API consists of two sign-up functions and two sign-in functions.
85
85
86
86
<h3id="sign-up">5.1. Sign-up functions</h3>
87
87
88
-
To sign-up, the browser first calls [webauthn.init_credential()] to get a list of supported crypto algorithms together with a random challenge to be used in the subsequent [webauthn.make_credential()] call to save the public key credential generated by the browser.
88
+
To sign-up, the browser first calls [webauthn.init_credential()] to get a list of supported crypto algorithms together with a random challenge to be used in the subsequent [webauthn.store_credential()] call to save the public key credential generated by the browser.
Stores the public key for the credential generated by the browser to the [webauthn.credentials](https://github.com/truthly/pg-webauthn/blob/master/TABLES/credentials.sql#L1) table.
195
195
The [challenge] can only be used once to prevent replay attacks.
196
196
If successful, returns the corresponding [user_id] bytea value given as input to [webauthn.init_credential()], or `NULL` to indicate failure.
Stores the random challenge to the [webauthn.assertion_challenges](https://github.com/truthly/pg-webauthn/blob/master/TABLES/assertion_challenges.sql#L1) table. If [user_name] is set, the returned *publicKey.allowCredentials* field will contain a list of all public keys matching [relying_party_id] and [user_name]. Such public keys have previously been created by the [webauthn.make_credential()] function,
227
+
Stores the random challenge to the [webauthn.assertion_challenges](https://github.com/truthly/pg-webauthn/blob/master/TABLES/assertion_challenges.sql#L1) table. If [user_name] is set, the returned *publicKey.allowCredentials* field will contain a list of all public keys matching [relying_party_id] and [user_name]. Such public keys have previously been created by the [webauthn.store_credential()] function,
228
228
stored in the [webauthn.credentials](https://github.com/truthly/pg-webauthn/blob/master/TABLES/credentials.sql#L1) table.
229
229
230
230
The [timeout] value, if specified, must lie [within a reasonable range](https://www.w3.org/TR/webauthn-2/#sctn-discover-from-external-source) between 30 seconds to 10 minutes.
0 commit comments