-/* $OpenBSD: ssh-sk-helper.c,v 1.1 2019/10/31 21:22:01 djm Exp $ */
+/* $OpenBSD: ssh-sk-helper.c,v 1.2 2019/11/12 19:30:50 markus Exp $ */
/*
* Copyright (c) 2019 Google LLC
*
"msg len %zu, compat 0x%lx", __progname, sshkey_type(key),
provider, msglen, (u_long)compat);
- if ((r = sshsk_ecdsa_sign(provider, key, &sig, &siglen,
+ if ((r = sshsk_sign(provider, key, &sig, &siglen,
message, msglen, compat)) != 0)
fatal("Signing failed: %s", ssh_err(r));
-/* $OpenBSD: ssh-sk.c,v 1.3 2019/11/12 19:30:21 markus Exp $ */
+/* $OpenBSD: ssh-sk.c,v 1.4 2019/11/12 19:30:50 markus Exp $ */
/*
* Copyright (c) 2019 Google LLC
*
}
int
-sshsk_ecdsa_sign(const char *provider_path, const struct sshkey *key,
+sshsk_sign(const char *provider_path, const struct sshkey *key,
u_char **sigp, size_t *lenp, const u_char *data, size_t datalen,
u_int compat)
{
-/* $OpenBSD: ssh-sk.h,v 1.2 2019/10/31 21:22:01 djm Exp $ */
+/* $OpenBSD: ssh-sk.h,v 1.3 2019/11/12 19:30:50 markus Exp $ */
/*
* Copyright (c) 2019 Google LLC
*
struct sshbuf *attest);
/*
- * Calculate an ECDSA_SK signature using the specified key and provider
- * middleware.
+ * Calculate an ECDSA_SK signature using the specified key
+ * and provider middleware.
*
* Returns 0 on success or a ssherr.h error code on failure.
*/
-int sshsk_ecdsa_sign(const char *provider_path, const struct sshkey *key,
+int sshsk_sign(const char *provider_path, const struct sshkey *key,
u_char **sigp, size_t *lenp, const u_char *data, size_t datalen,
u_int compat);
-/* $OpenBSD: sshkey.c,v 1.87 2019/11/12 19:29:24 markus Exp $ */
+/* $OpenBSD: sshkey.c,v 1.88 2019/11/12 19:30:50 markus Exp $ */
/*
* Copyright (c) 2000, 2001 Markus Friedl. All rights reserved.
* Copyright (c) 2008 Alexander von Gernler. All rights reserved.
# ifdef ENABLE_SK
case KEY_ECDSA_SK_CERT:
case KEY_ECDSA_SK:
- r = sshsk_ecdsa_sign(sk_provider, key, sigp, lenp,
- data, datalen, compat);
+ r = sshsk_sign(sk_provider, key, sigp, lenp, data, datalen,
+ compat);
break;
# endif /* ENABLE_SK */
# endif /* OPENSSL_HAS_ECC */