// Copyright 2019 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "device/fido/fido_authenticator.h" #include #include "base/callback.h" #include "base/notreached.h" #include "device/fido/fido_constants.h" namespace device { void FidoAuthenticator::GetNextAssertion( FidoAuthenticator::GetAssertionCallback callback) { NOTREACHED(); } void FidoAuthenticator::GetTouch(base::OnceCallback callback) {} void FidoAuthenticator::GetPinRetries( FidoAuthenticator::GetRetriesCallback callback) { NOTREACHED(); } void FidoAuthenticator::GetPINToken( std::string pin, const std::vector& permissions, base::Optional rp_id, FidoAuthenticator::GetTokenCallback callback) { NOTREACHED(); } void FidoAuthenticator::GetUvRetries( FidoAuthenticator::GetRetriesCallback callback) { NOTREACHED(); } bool FidoAuthenticator::CanGetUvToken() { return false; } void FidoAuthenticator::GetUvToken( base::Optional rp_id, FidoAuthenticator::GetTokenCallback callback) { NOTREACHED(); } void FidoAuthenticator::SetPIN(const std::string& pin, FidoAuthenticator::SetPINCallback callback) { NOTREACHED(); } void FidoAuthenticator::ChangePIN(const std::string& old_pin, const std::string& new_pin, SetPINCallback callback) { NOTREACHED(); } FidoAuthenticator::MakeCredentialPINDisposition FidoAuthenticator::WillNeedPINToMakeCredential( const CtapMakeCredentialRequest& request, const FidoRequestHandlerBase::Observer* observer) { return MakeCredentialPINDisposition::kNoPIN; } FidoAuthenticator::GetAssertionPINDisposition FidoAuthenticator::WillNeedPINToGetAssertion( const CtapGetAssertionRequest& request, const FidoRequestHandlerBase::Observer* observer) { return GetAssertionPINDisposition::kNoPIN; } void FidoAuthenticator::GetCredentialsMetadata( base::span pin_token, GetCredentialsMetadataCallback callback) { NOTREACHED(); } void FidoAuthenticator::EnumerateCredentials( base::span pin_token, EnumerateCredentialsCallback callback) { NOTREACHED(); } void FidoAuthenticator::DeleteCredential( base::span pin_token, const PublicKeyCredentialDescriptor& credential_id, DeleteCredentialCallback callback) { NOTREACHED(); } void FidoAuthenticator::GetModality(BioEnrollmentCallback) { NOTREACHED(); } void FidoAuthenticator::GetSensorInfo(BioEnrollmentCallback) { NOTREACHED(); } void FidoAuthenticator::BioEnrollFingerprint( const pin::TokenResponse&, base::Optional> template_id, BioEnrollmentCallback) { NOTREACHED(); } void FidoAuthenticator::BioEnrollCancel(BioEnrollmentCallback) { NOTREACHED(); } void FidoAuthenticator::BioEnrollEnumerate(const pin::TokenResponse&, BioEnrollmentCallback) { NOTREACHED(); } void FidoAuthenticator::BioEnrollRename(const pin::TokenResponse&, std::vector, std::string, BioEnrollmentCallback) { NOTREACHED(); } void FidoAuthenticator::BioEnrollDelete(const pin::TokenResponse&, std::vector, BioEnrollmentCallback) { NOTREACHED(); } base::Optional> FidoAuthenticator::GetAlgorithms() { return base::nullopt; } void FidoAuthenticator::Reset(ResetCallback callback) { std::move(callback).Run(CtapDeviceResponseCode::kCtap1ErrInvalidCommand, base::nullopt); } ProtocolVersion FidoAuthenticator::SupportedProtocol() const { return ProtocolVersion::kUnknown; } bool FidoAuthenticator::SupportsCredProtectExtension() const { return Options() && Options()->supports_cred_protect; } bool FidoAuthenticator::SupportsHMACSecretExtension() const { return false; } } // namespace device