]> git.ipfire.org Git - thirdparty/openssh-portable.git/commit
upstream: Hash challenge supplied by client during FIDO key enrollment
authordjm@openbsd.org <djm@openbsd.org>
Mon, 31 May 2021 06:48:42 +0000 (06:48 +0000)
committerDamien Miller <djm@mindrot.org>
Mon, 31 May 2021 06:50:00 +0000 (16:50 +1000)
commit59a194825f12fff8a7f75d91bf751ea17645711b
treecadbf3bb984bdf4eeed536150a550f1aa59b23dc
parenteb68e669bc8ab968d4cca5bf1357baca7136a826
upstream: Hash challenge supplied by client during FIDO key enrollment

prior to passing it to libfido2, which does expect a hash.

There is no effect for users who are simply generating FIDO keys using
ssh-keygen - by default we generate a random 256 bit challenge, but
people building attestation workflows around our tools should now have
a more consistent experience (esp. fewer failures when they fail to
guess the magic 32-byte challenge length requirement).

ok markus@

OpenBSD-Commit-ID: b8d5363a6a7ca3b23dc28f3ca69470472959f2b5
sk-usbhid.c