version 1.396, 2020/02/04 09:58:04 |
version 1.397, 2020/02/06 22:30:54 |
|
|
if (skprovider == NULL) |
if (skprovider == NULL) |
fatal("Cannot download keys without provider"); |
fatal("Cannot download keys without provider"); |
|
|
pin = read_passphrase("Enter PIN for security key: ", RP_ALLOW_STDIN); |
pin = read_passphrase("Enter PIN for authenticator: ", RP_ALLOW_STDIN); |
if ((r = sshsk_load_resident(skprovider, device, pin, |
if ((r = sshsk_load_resident(skprovider, device, pin, |
&keys, &nkeys)) != 0) { |
&keys, &nkeys)) != 0) { |
freezero(pin, strlen(pin)); |
freezero(pin, strlen(pin)); |
|
|
} |
} |
} |
} |
if (!quiet) { |
if (!quiet) { |
printf("You may need to touch your security key " |
printf("You may need to touch your authenticator " |
"to authorize key generation.\n"); |
"to authorize key generation.\n"); |
} |
} |
passphrase = NULL; |
passphrase = NULL; |
|
|
fatal("Key enrollment failed: %s", ssh_err(r)); |
fatal("Key enrollment failed: %s", ssh_err(r)); |
if (passphrase != NULL) |
if (passphrase != NULL) |
freezero(passphrase, strlen(passphrase)); |
freezero(passphrase, strlen(passphrase)); |
passphrase = read_passphrase("Enter PIN for security " |
passphrase = read_passphrase("Enter PIN for " |
"key: ", RP_ALLOW_STDIN); |
"authenticator: ", RP_ALLOW_STDIN); |
} |
} |
if (passphrase != NULL) |
if (passphrase != NULL) |
freezero(passphrase, strlen(passphrase)); |
freezero(passphrase, strlen(passphrase)); |