diff --git a/src/data/totp_key.rs b/src/data/totp_key.rs index b6430d1..42def47 100644 --- a/src/data/totp_key.rs +++ b/src/data/totp_key.rs @@ -1,5 +1,3 @@ -use std::io::ErrorKind; - use base32::Alphabet; use rand::Rng; use totp_rfc6238::{HashAlgorithm, TotpGenerator}; @@ -90,8 +88,7 @@ impl TotpKey { let key = match base32::decode(BASE32_ALPHABET, &self.encoded) { None => { - return Err(Box::new(std::io::Error::new( - ErrorKind::Other, + return Err(Box::new(std::io::Error::other( "Failed to decode base32 secret!", ))); } diff --git a/src/data/webauthn_manager.rs b/src/data/webauthn_manager.rs index cb3e3be..35f1db2 100644 --- a/src/data/webauthn_manager.rs +++ b/src/data/webauthn_manager.rs @@ -1,4 +1,3 @@ -use std::io::ErrorKind; use std::sync::Arc; use actix_web::web; @@ -109,15 +108,13 @@ impl WebAuthManager { ) -> Res { let state: RegisterKeyOpaqueData = self.crypto_wrapper.decrypt(opaque_state)?; if state.user_id != user.uid { - return Err(Box::new(std::io::Error::new( - ErrorKind::Other, + return Err(Box::new(std::io::Error::other( "Invalid user for pubkey!", ))); } if state.expire < time() { - return Err(Box::new(std::io::Error::new( - ErrorKind::Other, + return Err(Box::new(std::io::Error::other( "Challenge has expired!", ))); } @@ -157,15 +154,13 @@ impl WebAuthManager { ) -> Res { let state: AuthStateOpaqueData = self.crypto_wrapper.decrypt(opaque_state)?; if &state.user_id != user_id { - return Err(Box::new(std::io::Error::new( - ErrorKind::Other, + return Err(Box::new(std::io::Error::other( "Invalid user for pubkey!", ))); } if state.expire < time() { - return Err(Box::new(std::io::Error::new( - ErrorKind::Other, + return Err(Box::new(std::io::Error::other( "Challenge has expired!", ))); }