diff options
author | Damien Miller <djm@mindrot.org> | 2008-11-05 16:20:46 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2008-11-05 16:20:46 +1100 |
commit | 01ed2272a1545336173bf3aef66fbccc3494c8d8 (patch) | |
tree | a77f115d3b8964f0b6fcc604f9dea87d15143d7e /monitor_wrap.h | |
parent | 6f66d34308af787613d5525729953665f26367ee (diff) |
- djm@cvs.openbsd.org 2008/11/04 08:22:13
[auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h]
[readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5]
[sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c]
[Makefile.in]
Add support for an experimental zero-knowledge password authentication
method using the J-PAKE protocol described in F. Hao, P. Ryan,
"Password Authenticated Key Exchange by Juggling", 16th Workshop on
Security Protocols, Cambridge, April 2008.
This method allows password-based authentication without exposing
the password to the server. Instead, the client and server exchange
cryptographic proofs to demonstrate of knowledge of the password while
revealing nothing useful to an attacker or compromised endpoint.
This is experimental, work-in-progress code and is presently
compiled-time disabled (turn on -DJPAKE in Makefile.inc).
"just commit it. It isn't too intrusive." deraadt@
Diffstat (limited to 'monitor_wrap.h')
-rw-r--r-- | monitor_wrap.h | 22 |
1 files changed, 21 insertions, 1 deletions
diff --git a/monitor_wrap.h b/monitor_wrap.h index 329189c2a..55c4b99f3 100644 --- a/monitor_wrap.h +++ b/monitor_wrap.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: monitor_wrap.h,v 1.20 2006/08/03 03:34:42 deraadt Exp $ */ | 1 | /* $OpenBSD: monitor_wrap.h,v 1.21 2008/11/04 08:22:13 djm Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> | 4 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> |
@@ -101,6 +101,26 @@ int mm_bsdauth_respond(void *, u_int, char **); | |||
101 | int mm_skey_query(void *, char **, char **, u_int *, char ***, u_int **); | 101 | int mm_skey_query(void *, char **, char **, u_int *, char ***, u_int **); |
102 | int mm_skey_respond(void *, u_int, char **); | 102 | int mm_skey_respond(void *, u_int, char **); |
103 | 103 | ||
104 | /* jpake */ | ||
105 | struct jpake_group; | ||
106 | void mm_auth2_jpake_get_pwdata(struct Authctxt *, BIGNUM **, char **, char **); | ||
107 | void mm_jpake_step1(struct jpake_group *, u_char **, u_int *, | ||
108 | BIGNUM **, BIGNUM **, BIGNUM **, BIGNUM **, | ||
109 | u_char **, u_int *, u_char **, u_int *); | ||
110 | void mm_jpake_step2(struct jpake_group *, BIGNUM *, | ||
111 | BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *, | ||
112 | const u_char *, u_int, const u_char *, u_int, | ||
113 | const u_char *, u_int, const u_char *, u_int, | ||
114 | BIGNUM **, u_char **, u_int *); | ||
115 | void mm_jpake_key_confirm(struct jpake_group *, BIGNUM *, BIGNUM *, | ||
116 | BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *, BIGNUM *, | ||
117 | const u_char *, u_int, const u_char *, u_int, | ||
118 | const u_char *, u_int, const u_char *, u_int, | ||
119 | BIGNUM **, u_char **, u_int *); | ||
120 | int mm_jpake_check_confirm(const BIGNUM *, | ||
121 | const u_char *, u_int, const u_char *, u_int, const u_char *, u_int); | ||
122 | |||
123 | |||
104 | /* zlib allocation hooks */ | 124 | /* zlib allocation hooks */ |
105 | 125 | ||
106 | void *mm_zalloc(struct mm_master *, u_int, u_int); | 126 | void *mm_zalloc(struct mm_master *, u_int, u_int); |