@@ -95,8 +95,8 @@ func ExampleDevice_MakeCredential() {
95
95
log .Printf ("Attestation:\n " )
96
96
log .Printf ("AuthData: %s\n " , hex .EncodeToString (attest .AuthData ))
97
97
log .Printf ("ClientDataHash: %s\n " , hex .EncodeToString (attest .ClientDataHash ))
98
- log .Printf ("ID: %s\n " , hex .EncodeToString (attest .CredID ))
99
- log .Printf ("Type: %d\n " , attest .CredType )
98
+ log .Printf ("ID: %s\n " , hex .EncodeToString (attest .CredentialID ))
99
+ log .Printf ("Type: %d\n " , attest .CredentialType )
100
100
log .Printf ("Sig: %s\n " , hex .EncodeToString (attest .Sig ))
101
101
102
102
// Output:
@@ -151,14 +151,14 @@ func ExampleDevice_Assertion() {
151
151
log .Printf ("Attestation:\n " )
152
152
log .Printf ("AuthData: %s\n " , hex .EncodeToString (attest .AuthData ))
153
153
log .Printf ("ClientDataHash: %s\n " , hex .EncodeToString (attest .ClientDataHash ))
154
- log .Printf ("ID: %s\n " , hex .EncodeToString (attest .CredID ))
155
- log .Printf ("Type: %s\n " , attest .CredType )
154
+ log .Printf ("ID: %s\n " , hex .EncodeToString (attest .CredentialID ))
155
+ log .Printf ("Type: %s\n " , attest .CredentialType )
156
156
log .Printf ("Sig: %s\n " , hex .EncodeToString (attest .Sig ))
157
157
158
158
assertion , err := device .Assertion (
159
159
"keys.pub" ,
160
160
cdh ,
161
- attest .CredID ,
161
+ attest .CredentialID ,
162
162
"12345" , // Pin
163
163
& libfido2.AssertionOpts {
164
164
Extensions : []libfido2.Extension {libfido2 .HMACSecretExtension },
@@ -346,12 +346,12 @@ func ExampleDevice_MakeCredential_hmacSecret() {
346
346
log .Fatal (err )
347
347
}
348
348
349
- log .Printf ("Credential ID: %s\n " , hex .EncodeToString (attest .CredID ))
349
+ log .Printf ("Credential ID: %s\n " , hex .EncodeToString (attest .CredentialID ))
350
350
}
351
351
352
352
type testVector struct {
353
- CredID string
354
- Secret string
353
+ CredentialID string
354
+ Secret string
355
355
}
356
356
357
357
func ExampleDevice_Assertion_hmacSecret () {
@@ -379,12 +379,12 @@ func ExampleDevice_Assertion_hmacSecret() {
379
379
380
380
testVectors := map [string ]testVector {
381
381
"SoloKey 4.0/SoloKeys" : testVector {
382
- CredID : "91874f4c3d580370bf5b5301130ecc034f5927d955f5399ebad267f5666c78598942d489f10d4f4780fad392eb2962d065bdd3574375e80c42218dadd199ed3ffe7deb010000" ,
383
- Secret : "dd67d3aa73b13b7bb71ad0fe13cf8a247632a3508d7c9906ef6dc823906c3103" ,
382
+ CredentialID : "91874f4c3d580370bf5b5301130ecc034f5927d955f5399ebad267f5666c78598942d489f10d4f4780fad392eb2962d065bdd3574375e80c42218dadd199ed3ffe7deb010000" ,
383
+ Secret : "dd67d3aa73b13b7bb71ad0fe13cf8a247632a3508d7c9906ef6dc823906c3103" ,
384
384
},
385
385
"Security Key by Yubico/Yubico" : testVector {
386
- CredID : "c4fe75012ed137a0afcaa59ab36f0722b9b05849b2203fc4ba4f304033015eaafdbee823ee42dce88b4ae4d943926de3cc93e797004d108ed2465c675ae568e6" ,
387
- Secret : "f3d37d52ca7a12cf05c34bd3c13ddc3288b723018697347e6ac5ea79b7d3cc83" ,
386
+ CredentialID : "c4fe75012ed137a0afcaa59ab36f0722b9b05849b2203fc4ba4f304033015eaafdbee823ee42dce88b4ae4d943926de3cc93e797004d108ed2465c675ae568e6" ,
387
+ Secret : "f3d37d52ca7a12cf05c34bd3c13ddc3288b723018697347e6ac5ea79b7d3cc83" ,
388
388
},
389
389
}
390
390
@@ -393,7 +393,7 @@ func ExampleDevice_Assertion_hmacSecret() {
393
393
log .Fatalf ("No test vector found for %s" , name )
394
394
}
395
395
396
- credID , err := hex .DecodeString (testVector .CredID )
396
+ credentialID , err := hex .DecodeString (testVector .CredentialID )
397
397
if err != nil {
398
398
log .Fatal (err )
399
399
}
@@ -402,7 +402,7 @@ func ExampleDevice_Assertion_hmacSecret() {
402
402
assertion , err := device .Assertion (
403
403
rpID ,
404
404
cdh ,
405
- credID ,
405
+ credentialID ,
406
406
pin ,
407
407
& libfido2.AssertionOpts {
408
408
Extensions : []libfido2.Extension {libfido2 .HMACSecretExtension },
0 commit comments