|
|
|
@ -19,12 +19,10 @@ pub mod extensions;
|
|
|
|
|
|
|
|
|
|
/// Defines the raw CTAP operations
|
|
|
|
|
pub trait Ctap2_2Authenticator {
|
|
|
|
|
#[allow(clippy::missing_errors_doc)]
|
|
|
|
|
/// > This method is invoked by the host to request generation of a new
|
|
|
|
|
/// > credential in the authenticator.
|
|
|
|
|
fn make_credential(&mut self, request: make::Request) -> Result<make::Response, make::Error>;
|
|
|
|
|
|
|
|
|
|
#[allow(clippy::missing_errors_doc)]
|
|
|
|
|
/// > This method is used by a host to request cryptographic proof of user
|
|
|
|
|
/// > authentication as well as user consent to a given transaction, using a
|
|
|
|
|
/// > previously generated credential that is bound to the authenticator and
|
|
|
|
@ -37,7 +35,6 @@ pub trait Ctap2_2Authenticator {
|
|
|
|
|
/// > this information to tailor their command parameters choices.
|
|
|
|
|
fn get_info(&self) -> device::Info;
|
|
|
|
|
|
|
|
|
|
#[allow(clippy::missing_errors_doc)]
|
|
|
|
|
/// > This command exists so that plaintext PINs are not sent to the
|
|
|
|
|
/// > authenticator. Instead, a PIN/UV auth protocol (aka
|
|
|
|
|
/// > `pinUvAuthProtocol`) ensures that PINs are encrypted when sent to an
|
|
|
|
@ -64,14 +61,12 @@ pub trait Ctap2_2Authenticator {
|
|
|
|
|
request: management::Request,
|
|
|
|
|
) -> Result<management::Response, management::Error>;
|
|
|
|
|
|
|
|
|
|
#[allow(clippy::missing_errors_doc)]
|
|
|
|
|
/// > This command allows the platform to let a user select a certain
|
|
|
|
|
/// > authenticator by asking for user presence.
|
|
|
|
|
fn selection(&mut self) -> Result<(), authenticator::selection::Error>;
|
|
|
|
|
|
|
|
|
|
// fn large_blobs() -> Result<(), ()>;
|
|
|
|
|
|
|
|
|
|
#[allow(clippy::missing_errors_doc)]
|
|
|
|
|
// > This command is used to configure various authenticator features
|
|
|
|
|
// > through the use of its subcommands.
|
|
|
|
|
fn authenticator_config(&mut self, request: config::Request) -> Result<(), config::Error>;
|
|
|
|
|