@@ -780,7 +780,10 @@ static int
780
780
key_lookup (fido_dev_t * dev , const char * application , const uint8_t * user_id ,
781
781
size_t user_id_len , const char * pin )
782
782
{
783
- fido_assert_t * assert = NULL ;
783
+ #ifdef HAVE_FIDO_DEV_IS_WINHELLO
784
+ return FIDO_OK ;
785
+ #else
786
+ fido_assert_t * assert = NULL ;
784
787
uint8_t message [32 ];
785
788
int r = FIDO_ERR_INTERNAL ;
786
789
int sk_supports_uv , uv ;
@@ -809,33 +812,32 @@ key_lookup(fido_dev_t *dev, const char *application, const uint8_t *user_id,
809
812
}
810
813
uv = FIDO_OPT_OMIT ;
811
814
if (pin == NULL && check_sk_options (dev , "uv" , & sk_supports_uv ) == 0 &&
812
- sk_supports_uv != -1 )
815
+ sk_supports_uv != -1 )
813
816
uv = FIDO_OPT_TRUE ;
814
817
if ((r = fido_assert_set_uv (assert , uv )) != FIDO_OK ) {
815
818
skdebug (__func__ , "fido_assert_set_uv: %s" , fido_strerr (r ));
816
819
goto out ;
817
820
}
818
- #ifndef WINDOWS
819
821
if ((r = fido_dev_get_assert (dev , assert , pin )) != FIDO_OK ) {
820
822
skdebug (__func__ , "fido_dev_get_assert: %s" , fido_strerr (r ));
821
823
goto out ;
822
824
}
823
- #endif
824
825
r = FIDO_ERR_NO_CREDENTIALS ;
825
826
skdebug (__func__ , "%zu signatures returned" , fido_assert_count (assert ));
826
827
for (i = 0 ; i < fido_assert_count (assert ); i ++ ) {
827
828
if (fido_assert_user_id_len (assert , i ) == user_id_len &&
828
- memcmp (fido_assert_user_id_ptr (assert , i ), user_id ,
829
- user_id_len ) == 0 ) {
829
+ memcmp (fido_assert_user_id_ptr (assert , i ), user_id ,
830
+ user_id_len ) == 0 ) {
830
831
skdebug (__func__ , "credential exists" );
831
832
r = FIDO_OK ;
832
833
goto out ;
833
834
}
834
835
}
835
- out :
836
+ out :
836
837
fido_assert_free (& assert );
837
838
838
839
return r ;
840
+ #endif /* HAVE_FIDO_DEV_IS_WINHELLO */
839
841
}
840
842
841
843
int
0 commit comments