From e965dd2eb4e8bf7a5ecc675f2759bedcdf778e81 Mon Sep 17 00:00:00 2001 From: Damien Miller Date: Thu, 14 Nov 2019 21:27:32 +0000 Subject: directly support U2F/FIDO2 security keys in OpenSSH by linking against the (previously external) USB HID middleware. The dlopen() capability still exists for alternate middlewares, e.g. for Bluetooth, NFC and test/debugging. --- usr.bin/ssh/ssh-agent.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) (limited to 'usr.bin/ssh/ssh-agent.c') diff --git a/usr.bin/ssh/ssh-agent.c b/usr.bin/ssh/ssh-agent.c index ed4bbbe1c21..474f07fd259 100644 --- a/usr.bin/ssh/ssh-agent.c +++ b/usr.bin/ssh/ssh-agent.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ssh-agent.c,v 1.242 2019/11/13 07:53:10 markus Exp $ */ +/* $OpenBSD: ssh-agent.c,v 1.243 2019/11/14 21:27:30 djm Exp $ */ /* * Author: Tatu Ylonen * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland @@ -284,6 +284,11 @@ provider_sign(const char *provider, struct sshkey *key, *sigp = NULL; *lenp = 0; + if (strcasecmp(provider, "internal") == 0) { + return sshsk_sign(provider, key, sigp, lenp, + data, datalen, compat); + } + helper = getenv("SSH_SK_HELPER"); if (helper == NULL || strlen(helper) == 0) helper = _PATH_SSH_SK_HELPER; -- cgit v1.2.3