@@ -7,7 +7,7 @@ use crate::errors;
77use crate :: platform:: device:: Device ;
88use crate :: platform:: transaction:: Transaction ;
99use crate :: statecallback:: StateCallback ;
10- use crate :: apdu:: { u2f_is_keyhandle_valid , u2f_register , u2f_sign , APDUDevice } ;
10+ use crate :: apdu:: { apdu_is_keyhandle_valid , apdu_register , apdu_sign , APDUDevice } ;
1111use crate :: u2ftypes:: U2FInfoQueryable ;
1212
1313use std:: sync:: mpsc:: Sender ;
@@ -117,20 +117,20 @@ impl StateMachine {
117117 // consent, to be consistent with CTAP2 device behavior.
118118 let excluded = key_handles. iter ( ) . any ( |key_handle| {
119119 is_valid_transport ( key_handle. transports )
120- && u2f_is_keyhandle_valid ( dev, & challenge, & application, & key_handle. credential )
120+ && apdu_is_keyhandle_valid ( dev, & challenge, & application, & key_handle. credential )
121121 . unwrap_or ( false ) /* no match on failure */
122122 } ) ;
123123
124124 while alive ( ) {
125125 if excluded {
126126 let blank = vec ! [ 0u8 ; PARAMETER_SIZE ] ;
127- if u2f_register ( dev, & blank, & blank) . is_ok ( ) {
127+ if apdu_register ( dev, & blank, & blank) . is_ok ( ) {
128128 callback. call ( Err ( errors:: AuthenticatorError :: U2FToken (
129129 errors:: U2FTokenError :: InvalidState ,
130130 ) ) ) ;
131131 break ;
132132 }
133- } else if let Ok ( bytes) = u2f_register ( dev, & challenge, & application) {
133+ } else if let Ok ( bytes) = apdu_register ( dev, & challenge, & application) {
134134 let dev_info = dev. get_device_info ( ) ;
135135 send_status (
136136 & status_mutex,
@@ -201,7 +201,7 @@ impl StateMachine {
201201 // valid key handle for an appId, we'll use that appId below.
202202 let ( app_id, valid_handles) =
203203 find_valid_key_handles ( & app_ids, & key_handles, |app_id, key_handle| {
204- u2f_is_keyhandle_valid ( dev, & challenge, app_id, & key_handle. credential )
204+ apdu_is_keyhandle_valid ( dev, & challenge, app_id, & key_handle. credential )
205205 . unwrap_or ( false ) /* no match on failure */
206206 } ) ;
207207
@@ -230,7 +230,7 @@ impl StateMachine {
230230 // then just make it blink with bogus data.
231231 if valid_handles. is_empty ( ) {
232232 let blank = vec ! [ 0u8 ; PARAMETER_SIZE ] ;
233- if u2f_register ( dev, & blank, & blank) . is_ok ( ) {
233+ if apdu_register ( dev, & blank, & blank) . is_ok ( ) {
234234 callback. call ( Err ( errors:: AuthenticatorError :: U2FToken (
235235 errors:: U2FTokenError :: InvalidState ,
236236 ) ) ) ;
@@ -239,7 +239,7 @@ impl StateMachine {
239239 } else {
240240 // Otherwise, try to sign.
241241 for key_handle in & valid_handles {
242- if let Ok ( bytes) = u2f_sign ( dev, & challenge, app_id, & key_handle. credential )
242+ if let Ok ( bytes) = apdu_sign ( dev, & challenge, app_id, & key_handle. credential )
243243 {
244244 let dev_info = dev. get_device_info ( ) ;
245245 send_status (
0 commit comments