version 1.25, 2020/01/25 23:13:09 |
version 1.26, 2020/01/28 08:01:34 |
|
|
|
|
/* Optionally fill in the attestation information */ |
/* Optionally fill in the attestation information */ |
if (attest != NULL) { |
if (attest != NULL) { |
if ((r = sshbuf_put_cstring(attest, "sk-attest-v00")) != 0 || |
if ((r = sshbuf_put_cstring(attest, |
(r = sshbuf_put_u32(attest, 1)) != 0 || /* XXX U2F ver */ |
"ssh-sk-attest-v00")) != 0 || |
(r = sshbuf_put_string(attest, |
(r = sshbuf_put_string(attest, |
resp->attestation_cert, resp->attestation_cert_len)) != 0 || |
resp->attestation_cert, resp->attestation_cert_len)) != 0 || |
(r = sshbuf_put_string(attest, |
(r = sshbuf_put_string(attest, |
resp->signature, resp->signature_len)) != 0 || |
resp->signature, resp->signature_len)) != 0 || |
(r = sshbuf_put_u32(attest, flags)) != 0 || /* XXX right? */ |
(r = sshbuf_put_u32(attest, 0)) != 0 || /* resvd flags */ |
(r = sshbuf_put_string(attest, NULL, 0)) != 0) { |
(r = sshbuf_put_string(attest, NULL, 0)) != 0 /* resvd */) { |
error("%s: buffer error: %s", __func__, ssh_err(r)); |
error("%s: buffer error: %s", __func__, ssh_err(r)); |
goto out; |
goto out; |
} |
} |