summaryrefslogtreecommitdiff
path: root/monitor_wrap.h
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2020-08-27 01:06:18 +0000
committerDamien Miller <djm@mindrot.org>2020-08-27 11:28:36 +1000
commit9b8ad93824c682ce841f53f3b5762cef4e7cc4dc (patch)
treed4523956d4623b19bf5904d1b92afeb2307f69d3 /monitor_wrap.h
parent1196d7f49d4fbc90f37e550de3056561613b0960 (diff)
upstream: support for user-verified FIDO keys
FIDO2 supports a notion of "user verification" where the user is required to demonstrate their identity to the token before particular operations (e.g. signing). Typically this is done by authenticating themselves using a PIN that has been set on the token. This adds support for generating and using user verified keys where the verification happens via PIN (other options might be added in the future, but none are in common use now). Practically, this adds another key generation option "verify-required" that yields a key that requires a PIN before each authentication. feedback markus@ and Pedro Martelletto; ok markus@ OpenBSD-Commit-ID: 57fd461e4366f87c47502c5614ec08573e6d6a15
Diffstat (limited to 'monitor_wrap.h')
-rw-r--r--monitor_wrap.h5
1 files changed, 3 insertions, 2 deletions
diff --git a/monitor_wrap.h b/monitor_wrap.h
index 23ab096aa..0db38c206 100644
--- a/monitor_wrap.h
+++ b/monitor_wrap.h
@@ -1,4 +1,4 @@
1/* $OpenBSD: monitor_wrap.h,v 1.44 2019/11/25 00:51:37 djm Exp $ */ 1/* $OpenBSD: monitor_wrap.h,v 1.45 2020/08/27 01:06:18 djm Exp $ */
2 2
3/* 3/*
4 * Copyright 2002 Niels Provos <provos@citi.umich.edu> 4 * Copyright 2002 Niels Provos <provos@citi.umich.edu>
@@ -46,7 +46,8 @@ int mm_is_monitor(void);
46DH *mm_choose_dh(int, int, int); 46DH *mm_choose_dh(int, int, int);
47#endif 47#endif
48int mm_sshkey_sign(struct ssh *, struct sshkey *, u_char **, size_t *, 48int mm_sshkey_sign(struct ssh *, struct sshkey *, u_char **, size_t *,
49 const u_char *, size_t, const char *, const char *, u_int compat); 49 const u_char *, size_t, const char *, const char *,
50 const char *, u_int compat);
50void mm_inform_authserv(char *, char *); 51void mm_inform_authserv(char *, char *);
51struct passwd *mm_getpwnamallow(struct ssh *, const char *); 52struct passwd *mm_getpwnamallow(struct ssh *, const char *);
52char *mm_auth2_read_banner(void); 53char *mm_auth2_read_banner(void);