diff --git a/src/fido/cmd_authenticate.c b/src/fido/cmd_authenticate.c index 823dce7..41aa729 100644 --- a/src/fido/cmd_authenticate.c +++ b/src/fido/cmd_authenticate.c @@ -26,7 +26,7 @@ int cmd_authenticate() { CTAP_AUTHENTICATE_REQ *req = (CTAP_AUTHENTICATE_REQ *) apdu.data; CTAP_AUTHENTICATE_RESP *resp = (CTAP_AUTHENTICATE_RESP *) res_APDU; - //if (scan_files(true) != PICOKEY_OK) + //if (scan_files_fido(true) != PICOKEY_OK) // return SW_EXEC_ERROR(); if (apdu.nc < CTAP_CHAL_SIZE + CTAP_APPID_SIZE + 1 + 1) { return SW_WRONG_DATA(); diff --git a/src/fido/cmd_register.c b/src/fido/cmd_register.c index f62bf72..b7f1ff3 100644 --- a/src/fido/cmd_register.c +++ b/src/fido/cmd_register.c @@ -59,7 +59,7 @@ int cmd_register() { CTAP_REGISTER_RESP *resp = (CTAP_REGISTER_RESP *) res_APDU; resp->registerId = CTAP_REGISTER_ID; resp->keyHandleLen = KEY_HANDLE_LEN; - //if (scan_files(true) != PICOKEY_OK) + //if (scan_files_fido(true) != PICOKEY_OK) // return SW_EXEC_ERROR(); if (apdu.nc != CTAP_APPID_SIZE + CTAP_CHAL_SIZE) { return SW_WRONG_LENGTH(); diff --git a/src/fido/fido.c b/src/fido/fido.c index 462112c..4bf833e 100644 --- a/src/fido/fido.c +++ b/src/fido/fido.c @@ -307,7 +307,7 @@ int derive_key(const uint8_t *app_id, bool new_key, uint8_t *key_handle, int cur return r; } -int scan_files() { +int scan_files_fido() { ef_keydev = search_by_fid(EF_KEY_DEV, NULL, SPECIFY_EF); ef_keydev_enc = search_by_fid(EF_KEY_DEV_ENC, NULL, SPECIFY_EF); ef_mkek = search_by_fid(EF_MKEK, NULL, SPECIFY_EF); @@ -432,7 +432,7 @@ int scan_files() { void scan_all() { scan_flash(); - scan_files(); + scan_files_fido(); } extern void init_otp(); diff --git a/src/fido/fido.h b/src/fido/fido.h index 43df0f3..d2e2979 100644 --- a/src/fido/fido.h +++ b/src/fido/fido.h @@ -43,7 +43,7 @@ #define SHA256_DIGEST_LENGTH (32) #define KEY_HANDLE_LEN (KEY_PATH_LEN + SHA256_DIGEST_LENGTH) -extern int scan_files(); +extern int scan_files_fido(); extern int derive_key(const uint8_t *app_id, bool new_key, uint8_t *key_handle,