- From: Arian van Putten via GitHub <sysbot+gh@w3.org>
- Date: Wed, 01 Jul 2020 19:23:49 +0000
- To: public-webauthn@w3.org
This is also an issue for ECDSA I suppose. There is no _technical_ reason why you wouldn't match ES256 with P-384 or ES384 with P-521. In that sense being able to select the curve also makes sense in the ECDSA context On Wed, Jul 1, 2020, 19:16 John Bradley <notifications@github.com> wrote: > Yes this is a known issue. > > We would need to make a corresponding change to CTAP. Without that, it > can't be passed to the authenticator. > There are other possible EdDSA curves as well as Ed448 that some people > might want. > > Remember that the alg are passed to the authenticator as a list ordered by > the RP's preference, so we need to think about how the kty paramater would > be applied by the authenticator. Is this just for edDSA or should it be > more general? > > — > You are receiving this because you authored the thread. > Reply to this email directly, view it on GitHub > <https://github.com/w3c/webauthn/issues/1446#issuecomment-652545480>, or > unsubscribe > <https://github.com/notifications/unsubscribe-auth/AAEZNI3BZYVZJVDK4SSWPMTRZNVOHANCNFSM4OKHVRHA> > . > -- GitHub Notification of comment by arianvp Please view or discuss this issue at https://github.com/w3c/webauthn/issues/1446#issuecomment-652602915 using your GitHub account
Received on Wednesday, 1 July 2020 19:23:51 UTC