[cryptography] Fwd: [FIDO-DEV] Update to StrongAuth's Android library for the U2F protocol

Arshad Noor arshad.noor at strongauth.com
Fri Jan 6 00:03:09 EST 2017


-------- Forwarded Message --------
Subject: [FIDO-DEV] Update to StrongAuth's Android library for the U2F 
Date: Thu, 5 Jan 2017 20:57:44 -0800
From: Arshad Noor <arshad.noor at strongauth.com>
Organization: StrongAuth, Inc.
To: FIDO Dev (fido-dev) <fido-dev at fidoalliance.org>

Hi everyone,

Happy new year to all.

Just to let you know that we've put out a new version of our Android
library implementing the FIDO U2F protocol with JS 1.1 API support:


You can find the README contents posted below.  Enjoy.

Arshad Noor
StrongAuth, Inc.

StrongAuth Android U2F Library - from StrongAuth, Inc.

This is Build 159 of the StrongAuth Android U2F Library (SAUL)
with a Sample Client App to test with the 2.0 release (Build 152)
of the CryptoEngine (StrongAuth's FIDO Certified U2F Server).

This release of the Android library has the following features:

- It is different from Build 125 in that the current version is
     refactored to function as a library, for inclusion in other apps,
     for mobile-app development using an Android device as a FIDO U2F
- It uses the AndroidKeystore, and has thus been written to work
     with Android 6.0 (API level 23 - Marshmallow) or greater;
- If the device has a Trusted Execution Environment (TEE) - such
     as the Nexus 5x or Next 6P, the library will use the hardware-
     backed TEE to generate and store the FIDO keys;
- It still uses a TEST software key for Attestation.  As such,the
     Library should not be used in Production environments (yet).
     However, it is perfectly suitable to start pilots or designing
     applications to use this Library.  StrongAuth is committed to
     continuing its development to make it production-ready.

The Library has a Sample Android App to demonstrate its use.  The
sample app:

- Can communicate with your "Relying Party" application server
     to simulate a business application which is FIDO-enabled;
- This project folder also has a sample Server-Side JEE application
     with a Servlet demonstrating interaction with the Android app
     and the CryptoEngine FIDO server (see the PDF presentation in
     this folder for an overview of the architecture). The server-
     side application was tested on Glassfish 4.x using JDK8U112;
- If you are testing with your own instance of CryptoEngine in your
     environment, you must import your CryptoEngine's TLS certificate
     into the cacerts.bks truststore in the Library's raw resources
     folder before building the app for use;
- It has been tested with a Nexus 5 Emulator in the Android Studio
     (on a Centos Linux 7.0) desktop with JDK 8 Update 72, as well as
      a Nexus 6P hardware device;
- It requires the following JAR files to build (place them in the
     SampleAndroidU2FApp/fidou2ftoken/libs folder before building):

-rw-rw-r--. 1 anoor emp 2716822 Feb 18 20:44 core-
-rw-rw-r--. 1 anoor emp 1320088 Feb 18 20:44 prov-

- We assume you are comfortable using Android Studio to build the
     source into executable JARs, and testing with an emulator; if
     not, please post questions on the wiki in this project's site.

The SHA256 digests of the zip-files are:


If you have questions, post them on the forum at this site and
we'll get back to you as soon as possible.  We're interested in
your feedback.

Thank you for your interest and support.

StrongAuth, Inc.


More information about the cryptography mailing list