Skip to content

Instantly share code, notes, and snippets.

@iayanpahwa
Created September 28, 2023 15:20
Show Gist options
  • Save iayanpahwa/42ae817a1a5fad3bc13538395004433d to your computer and use it in GitHub Desktop.
Save iayanpahwa/42ae817a1a5fad3bc13538395004433d to your computer and use it in GitHub Desktop.
OpenSK-ios.log
Device : Apple iPhone
ios Version : 17.0.1
```
> JLinkRTTClient
###RTT Client: ************************************************************
###RTT Client: * SEGGER Microcontroller GmbH *
###RTT Client: * Solutions for real time microcontroller applications *
###RTT Client: ************************************************************
###RTT Client: * *
###RTT Client: * (c) 2012 - 2016 SEGGER Microcontroller GmbH *
###RTT Client: * *
###RTT Client: * www.segger.com Support: support@segger.com *
###RTT Client: * *
###RTT Client: ************************************************************
###RTT Client: * *
###RTT Client: * SEGGER J-Link RTT Client Compiled Sep 13 2023 15:47:12 *
###RTT Client: * *
###RTT Client: ************************************************************
###RTT Client: -----------------------------------------------
###RTT Client: Connecting to J-Link RTT Server via localhost:19021 ...
###RTT Client: Connected.
SEGGER J-Link V7.92e - Real time terminal output
SEGGER J-Link (unknown) V1.0, SN=683047970
Process: JLinkExe
..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................Initialization complete. Entering main loop
NRF52 HW INFO: Variant: AAD0, Part: N52840, Package: QI, Ram: K256, Flash: K1024
Hello world from OpenSK!
Entering main ctap loop
tock$ .Initialization complete. Entering main loop
NRF52 HW INFO: Variant: AAD0, Part: N52840, Package: QI, Ram: K256, Flash: K1024
Hello world from OpenSK!
Entering main ctap loop
tock$ .Initialization complete. Entering main loop
NRF52 HW INFO: Variant: AAD0, Part: N52840, Package: QI, Ram: K256, Flash: K1024
Hello world from OpenSK!
Entering main ctap loop
tock$ ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................Initialization complete. Entering main loop
NRF52 HW INFO: Variant: AAD0, Part: N52840, Package: QI, Ram: K256, Flash: K1024
Hello world from OpenSK!
Entering main ctap loop
tock$ ...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................Initialization complete. Entering main loop
NRF52 HW INFO: Variant: AAD0, Part: N52840, Package: QI, Ram: K256, Flash: K1024
Hello world from OpenSK!
Bus reset
tock$ Entering main ctap loop
.Bus reset
..Received packet at 0.781372 s
Received message: Message { cid: [ff, ff, ff, ff], cmd: Init, payload: [f4, 37, 20, 4a, f6, 62, 89, 2e] }
Sending message: Message { cid: [ff, ff, ff, ff], cmd: Init, payload: [f4, 37, 20, 4a, f6, 62, 89, 2e, 00, 00, 00, 01, 02, 01, 00, 00, 05] }
Sent packet at 1.003936 s
Received packet at 1.015991 s
Received message: Message { cid: [00, 00, 00, 01], cmd: Cbor, payload: [04] }
Received command: Ok(
AuthenticatorGetInfo,
)
Sending response: Ok(
AuthenticatorGetInfo(
AuthenticatorGetInfoResponse {
versions: [
"U2F_V2",
"FIDO_2_0",
"FIDO_2_1",
],
extensions: Some(
[
"hmac-secret",
"credProtect",
"minPinLength",
"credBlob",
"largeBlobKey",
],
),
aaguid: [
91,
89,
89,
164,
231,
150,
78,
99,
184,
157,
175,
194,
198,
222,
182,
41,
],
options: Some(
[
(
"rk",
true,
),
(
"up",
true,
),
(
"alwaysUv",
false,
),
(
"credMgmt",
true,
),
(
"authnrCfg",
true,
),
(
"clientPin",
false,
),
(
"largeBlobs",
true,
),
(
"pinUvAuthToken",
true,
),
(
"setMinPINLength",
true,
),
(
"makeCredUvNotRqd",
true,
),
],
),
max_msg_size: Some(
7609,
),
pin_protocols: Some(
[
2,
1,
],
),
max_credential_count_in_list: None,
max_credential_id_length: Some(
241,
),
transports: Some(
[
Usb,
],
),
algorithms: Some(
[
PublicKeyCredentialParameter {
cred_type: PublicKey,
alg: Es256,
},
],
),
max_serialized_large_blob_array: Some(
2048,
),
force_pin_change: Some(
false,
),
min_pin_length: 4,
firmware_version: None,
max_cred_blob_length: Some(
32,
),
max_rp_ids_for_set_min_pin_length: Some(
8,
),
certifications: None,
remaining_discoverable_credentials: Some(
150,
),
},
),
)
Sending message: Message { cid: [00, 00, 00, 01], cmd: Cbor, payload: [00, af, 01, 83, 66, 55, 32, 46, 5f, 56, 32, 68, 46, 49, 44, 4f, 5f, 32, 5f, 30, 68, 46, 49, 44, 4f, 5f, 32, 5f, 31, 02, 85, 6b, 68, 6d, 61, 63, 2d, 73, 65, 63, 72, 65, 74, 6b, 63, 72, 65, 64, 50, 72, 6f, 74, 65, 63, 74, 6c, 6d, 69, 6e, 50, 69, 6e, 4c, 65, 6e, 67, 74, 68, 68, 63, 72, 65, 64, 42, 6c, 6f, 62, 6c, 6c, 61, 72, 67, 65, 42, 6c, 6f, 62, 4b, 65, 79, 03, 50, 5b, 59, 59, a4, e7, 96, 4e, 63, b8, 9d, af, c2, c6, de, b6, 29, 04, aa, 62, 72, 6b, f5, 62, 75, 70, f5, 68, 61, 6c, 77, 61, 79, 73, 55, 76, f4, 68, 63, 72, 65, 64, 4d, 67, 6d, 74, f5, 69, 61, 75, 74, 68, 6e, 72, 43, 66, 67, f5, 69, 63, 6c, 69, 65, 6e, 74, 50, 69, 6e, f4, 6a, 6c, 61, 72, 67, 65, 42, 6c, 6f, 62, 73, f5, 6e, 70, 69, 6e, 55, 76, 41, 75, 74, 68, 54, 6f, 6b, 65, 6e, f5, 6f, 73, 65, 74, 4d, 69, 6e, 50, 49, 4e, 4c, 65, 6e, 67, 74, 68, f5, 70, 6d, 61, 6b, 65, 43, 72, 65, 64, 55, 76, 4e, 6f, 74, 52, 71, 64, f5, 05, 19, 1d, b9, 06, 82, 02, 01, 08, 18, f1, 09, 81, 63, 75, 73, 62, 0a, 81, a2, 63, 61, 6c, 67, 26, 64, 74, 79, 70, 65, 6a, 70, 75, 62, 6c, 69, 63, 2d, 6b, 65, 79, 0b, 19, 08, 00, 0c, f4, 0d, 04, 0f, 18, 20, 10, 08, 14, 18, 96] }
Sent packet at 2.920379 s
Sent packet at 2.929260 s
Sent packet at 2.941253 s
Sent packet at 2.953247 s
Sent packet at 2.965270 s
Received packet at 2.977447 s
Received message: Message { cid: [ff, ff, ff, ff], cmd: Init, payload: [73, ce, 7f, 4e, f1, 9d, 07, ca] }
Sending message: Message { cid: [ff, ff, ff, ff], cmd: Init, payload: [73, ce, 7f, 4e, f1, 9d, 07, ca, 00, 00, 00, 02, 02, 01, 00, 00, 05] }
Sent packet at 3.123046 s
Received packet at 3.133483 s
Received packet at 3.142364 s
Received packet at 3.151245 s
Received packet at 3.160156 s
Received packet at 3.169128 s
Received packet at 3.178009 s
Received message: Message { cid: [00, 00, 00, 02], cmd: Cbor, payload: [01, a6, 01, 58, 20, f3, 84, 3d, 51, 19, ba, cf, b7, 54, 54, 44, 05, 8e, 54, 71, d5, 4c, 84, 2f, 11, 65, 34, 82, 1b, c8, de, 2a, 79, 5a, a7, 2a, ea, 02, a2, 62, 69, 64, 69, 61, 70, 70, 6c, 65, 2e, 63, 6f, 6d, 64, 6e, 61, 6d, 65, 69, 61, 70, 70, 6c, 65, 2e, 63, 6f, 6d, 03, a3, 62, 69, 64, 58, 2c, 32, 6d, 54, 67, 45, 31, 56, 41, 56, 75, 47, 62, 69, 78, 4e, 39, 79, 34, 52, 47, 53, 6c, 6f, 65, 62, 4a, 49, 68, 33, 67, 53, 4f, 4b, 64, 56, 68, 6a, 72, 32, 67, 64, 53, 77, 3d, 64, 6e, 61, 6d, 65, 61, 20, 6b, 64, 69, 73, 70, 6c, 61, 79, 4e, 61, 6d, 65, 71, 46, 49, 44, 4f, 5f, 44, 49, 53, 50, 4c, 41, 59, 5f, 4e, 41, 4d, 45, 04, 81, a2, 63, 61, 6c, 67, 26, 64, 74, 79, 70, 65, 6a, 70, 75, 62, 6c, 69, 63, 2d, 6b, 65, 79, 05, 82, a2, 62, 69, 64, 50, 54, 43, 87, 05, 24, ea, 00, 72, 65, 7b, 63, c2, f5, 49, ac, c3, 64, 74, 79, 70, 65, 6a, 70, 75, 62, 6c, 69, 63, 2d, 6b, 65, 79, a2, 62, 69, 64, 58, 30, d7, 7c, 9d, ac, 28, dd, 2e, 8c, 63, 31, c4, 4f, a2, 59, 9d, 59, 8a, 62, dc, 11, 96, 7a, ed, 5e, 50, 9e, 0e, 6b, 26, 40, ab, 28, ec, f9, b8, dd, 80, d9, 0d, 33, a4, d4, ea, ef, 58, ce, 93, 50, 64, 74, 79, 70, 65, 6a, 70, 75, 62, 6c, 69, 63, 2d, 6b, 65, 79, 07, a1, 62, 72, 6b, f5] }
Received command: Ok(
AuthenticatorMakeCredential(
AuthenticatorMakeCredentialParameters {
client_data_hash: [
243,
132,
61,
81,
25,
186,
207,
183,
84,
84,
68,
5,
142,
84,
113,
213,
76,
132,
47,
17,
101,
52,
130,
27,
200,
222,
42,
121,
90,
167,
42,
234,
],
rp: PublicKeyCredentialRpEntity {
rp_id: "apple.com",
rp_name: Some(
"apple.com",
),
rp_icon: None,
},
user: PublicKeyCredentialUserEntity {
user_id: [
50,
109,
84,
103,
69,
49,
86,
65,
86,
117,
71,
98,
105,
120,
78,
57,
121,
52,
82,
71,
83,
108,
111,
101,
98,
74,
73,
104,
51,
103,
83,
79,
75,
100,
86,
104,
106,
114,
50,
103,
100,
83,
119,
61,
],
user_name: Some(
" ",
),
user_display_name: Some(
"FIDO_DISPLAY_NAME",
),
user_icon: None,
},
pub_key_cred_params: [
PublicKeyCredentialParameter {
cred_type: PublicKey,
alg: Es256,
},
],
exclude_list: Some(
[
PublicKeyCredentialDescriptor {
key_type: PublicKey,
key_id: [
84,
67,
135,
5,
36,
234,
0,
114,
101,
123,
99,
194,
245,
73,
172,
195,
],
transports: None,
},
PublicKeyCredentialDescriptor {
key_type: PublicKey,
key_id: [
215,
124,
157,
172,
40,
221,
46,
140,
99,
49,
196,
79,
162,
89,
157,
89,
138,
98,
220,
17,
150,
122,
237,
94,
80,
158,
14,
107,
38,
64,
171,
40,
236,
249,
184,
221,
128,
217,
13,
51,
164,
212,
234,
239,
88,
206,
147,
80,
],
transports: None,
},
],
),
extensions: MakeCredentialExtensions {
hmac_secret: false,
cred_protect: None,
min_pin_length: false,
cred_blob: None,
large_blob_key: None,
},
options: MakeCredentialOptions {
rk: true,
uv: false,
},
pin_uv_auth_param: None,
pin_uv_auth_protocol: None,
enterprise_attestation: None,
},
),
)
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sent KEEPALIVE packet
Sending response: Ok(
AuthenticatorMakeCredential(
AuthenticatorMakeCredentialResponse {
fmt: "packed",
auth_data: [
34,
101,
203,
204,
62,
242,
65,
6,
201,
224,
237,
219,
208,
79,
60,
202,
13,
3,
34,
93,
163,
252,
202,
142,
45,
134,
247,
163,
148,
175,
146,
131,
65,
0,
0,
0,
1,
91,
89,
89,
164,
231,
150,
78,
99,
184,
157,
175,
194,
198,
222,
182,
41,
0,
32,
248,
240,
97,
92,
235,
102,
178,
132,
42,
50,
231,
122,
126,
8,
4,
130,
67,
246,
149,
196,
153,
34,
194,
24,
107,
81,
82,
103,
97,
95,
85,
53,
165,
1,
2,
3,
38,
32,
1,
33,
88,
32,
107,
106,
123,
206,
117,
136,
122,
151,
77,
35,
24,
133,
57,
103,
193,
114,
35,
175,
14,
8,
22,
146,
177,
24,
64,
250,
218,
140,
91,
246,
35,
165,
34,
88,
32,
2,
85,
204,
227,
198,
23,
3,
208,
67,
152,
137,
253,
222,
236,
33,
204,
71,
108,
155,
105,
163,
246,
166,
182,
54,
40,
154,
22,
154,
150,
247,
216,
],
att_stmt: PackedAttestationStatement {
alg: -7,
sig: [
48,
67,
2,
32,
3,
46,
162,
46,
104,
96,
122,
180,
222,
165,
16,
16,
141,
2,
241,
163,
215,
53,
98,
90,
148,
123,
20,
25,
165,
239,
68,
250,
96,
53,
66,
56,
2,
31,
18,
161,
215,
121,
170,
56,
26,
179,
41,
223,
164,
75,
137,
190,
214,
97,
177,
95,
101,
77,
216,
100,
245,
2,
181,
250,
24,
146,
247,
153,
40,
],
x5c: None,
ecdaa_key_id: None,
},
ep_att: None,
large_blob_key: None,
},
),
)
Sending message: Message { cid: [00, 00, 00, 02], cmd: Cbor, payload: [00, a3, 01, 66, 70, 61, 63, 6b, 65, 64, 02, 58, a4, 22, 65, cb, cc, 3e, f2, 41, 06, c9, e0, ed, db, d0, 4f, 3c, ca, 0d, 03, 22, 5d, a3, fc, ca, 8e, 2d, 86, f7, a3, 94, af, 92, 83, 41, 00, 00, 00, 01, 5b, 59, 59, a4, e7, 96, 4e, 63, b8, 9d, af, c2, c6, de, b6, 29, 00, 20, f8, f0, 61, 5c, eb, 66, b2, 84, 2a, 32, e7, 7a, 7e, 08, 04, 82, 43, f6, 95, c4, 99, 22, c2, 18, 6b, 51, 52, 67, 61, 5f, 55, 35, a5, 01, 02, 03, 26, 20, 01, 21, 58, 20, 6b, 6a, 7b, ce, 75, 88, 7a, 97, 4d, 23, 18, 85, 39, 67, c1, 72, 23, af, 0e, 08, 16, 92, b1, 18, 40, fa, da, 8c, 5b, f6, 23, a5, 22, 58, 20, 02, 55, cc, e3, c6, 17, 03, d0, 43, 98, 89, fd, de, ec, 21, cc, 47, 6c, 9b, 69, a3, f6, a6, b6, 36, 28, 9a, 16, 9a, 96, f7, d8, 03, a2, 63, 61, 6c, 67, 26, 63, 73, 69, 67, 58, 45, 30, 43, 02, 20, 03, 2e, a2, 2e, 68, 60, 7a, b4, de, a5, 10, 10, 8d, 02, f1, a3, d7, 35, 62, 5a, 94, 7b, 14, 19, a5, ef, 44, fa, 60, 35, 42, 38, 02, 1f, 12, a1, d7, 79, aa, 38, 1a, b3, 29, df, a4, 4b, 89, be, d6, 61, b1, 5f, 65, 4d, d8, 64, f5, 02, b5, fa, 18, 92, f7, 99, 28] }
Sent packet at 12.881164 s
Sent packet at 12.893035 s
Sent packet at 12.905059 s
Sent packet at 12.917083 s
Sent packet at 12.929077 s
................................................................................Bus reset
.........................................................
```
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment