Closed gcochard closed 2 years ago
Same here.
NDEF and OATH don't work via CTAP, you need CCID for that. Plan to add better errors for this, CTAP support is only currently useful for firmware update (in particular admin app), to unlock firmware improvements on platforms without CCID (mac and older linux distros).
Ok, rebuilding and installing ccid 1.4.36 helped. I had 1.4.33 originally.
I'm attempting to use the
solo2 app ndef data
andsolo2 app oath list
commands, and I get an explicit panic. When I added some debug statements, it appears that the cli is attempting to send vendor code0xA4
forndef data
and0xA1
foroath list
, both of which are outside the expected range for vendor codes.I checked the CTAP spec and it says that the range is actually 0x40 to 0xBF, so I expanded the expected range on the solo cli source to match that. When I attempt to run those commands it now hangs after sending the packet over CTAP.
I found those hex values in the apps' sources, so I would expect this to work unless there is another check earlier on in the firmware that is dropping instructions beyond the vendor code range.
Are these commands expected to work on the latest released firmware and CLI?
I can provide detailed trace level logs and backtraces if requested.