version 1.456, 2022/07/20 03:29:14 |
version 1.457, 2022/07/20 03:33:22 |
|
|
return 0; |
return 0; |
if (yesno[0] != 'y' && yesno[0] != 'Y') |
if (yesno[0] != 'y' && yesno[0] != 'Y') |
return 0; |
return 0; |
printf("Touch your authenticator to authorize key generation.\n"); |
|
return 1; |
return 1; |
} |
} |
|
|
|
|
"FIDO authenticator enrollment", opts[i]); |
"FIDO authenticator enrollment", opts[i]); |
} |
} |
} |
} |
if (!quiet) { |
|
printf("You may need to touch your authenticator " |
|
"to authorize key generation.\n"); |
|
} |
|
if ((attest = sshbuf_new()) == NULL) |
if ((attest = sshbuf_new()) == NULL) |
fatal("sshbuf_new failed"); |
fatal("sshbuf_new failed"); |
if ((sk_flags & |
if ((sk_flags & |
|
|
} else { |
} else { |
passphrase = NULL; |
passphrase = NULL; |
} |
} |
for (i = 0 ; ; i++) { |
r = 0; |
|
for (i = 0 ;;) { |
|
if (!quiet) { |
|
printf("You may need to touch your " |
|
"authenticator%s to authorize key " |
|
"generation.\n", |
|
r == 0 ? "" : " again"); |
|
} |
fflush(stdout); |
fflush(stdout); |
r = sshsk_enroll(type, sk_provider, sk_device, |
r = sshsk_enroll(type, sk_provider, sk_device, |
sk_application == NULL ? "ssh:" : sk_application, |
sk_application == NULL ? "ssh:" : sk_application, |
|
|
freezero(passphrase, strlen(passphrase)); |
freezero(passphrase, strlen(passphrase)); |
passphrase = NULL; |
passphrase = NULL; |
} |
} |
if (i >= 3) |
if (++i >= 3) |
fatal("Too many incorrect PINs"); |
fatal("Too many incorrect PINs"); |
passphrase = read_passphrase("Enter PIN for " |
passphrase = read_passphrase("Enter PIN for " |
"authenticator: ", RP_ALLOW_STDIN); |
"authenticator: ", RP_ALLOW_STDIN); |
if (!quiet) { |
|
printf("You may need to touch your " |
|
"authenticator (again) to authorize " |
|
"key generation.\n"); |
|
} |
|
} |
} |
if (passphrase != NULL) { |
if (passphrase != NULL) { |
freezero(passphrase, strlen(passphrase)); |
freezero(passphrase, strlen(passphrase)); |