diff options
author | MkfsSion <mkfssion@mkfssion.com> | 2022-04-17 09:42:49 +0200 |
---|---|---|
committer | Lennart Poettering <lennart@poettering.net> | 2022-04-22 20:22:40 +0200 |
commit | 70e723c000e46e2304e54f8063572d7fa0cdad46 (patch) | |
tree | 462cd67a414dc0bce495d01f405ddbe60c0731fa /src/cryptenroll | |
parent | hwdb: Fix rotation for HP Pro Tablet 408 G1 (diff) | |
download | systemd-70e723c000e46e2304e54f8063572d7fa0cdad46.tar.xz systemd-70e723c000e46e2304e54f8063572d7fa0cdad46.zip |
cryptenroll,homectl: Introduce --fido2-credential-algorithm option
* Some authenticators(like Yubikey) support credential algorithm other than ES256
* Introduce a new option so users can make use of it
Diffstat (limited to 'src/cryptenroll')
-rw-r--r-- | src/cryptenroll/cryptenroll-fido2.c | 4 | ||||
-rw-r--r-- | src/cryptenroll/cryptenroll-fido2.h | 4 | ||||
-rw-r--r-- | src/cryptenroll/cryptenroll.c | 17 |
3 files changed, 21 insertions, 4 deletions
diff --git a/src/cryptenroll/cryptenroll-fido2.c b/src/cryptenroll/cryptenroll-fido2.c index b519b8651b..80adaefa17 100644 --- a/src/cryptenroll/cryptenroll-fido2.c +++ b/src/cryptenroll/cryptenroll-fido2.c @@ -12,7 +12,8 @@ int enroll_fido2( const void *volume_key, size_t volume_key_size, const char *device, - Fido2EnrollFlags lock_with) { + Fido2EnrollFlags lock_with, + int cred_alg) { _cleanup_(erase_and_freep) void *salt = NULL, *secret = NULL; _cleanup_(erase_and_freep) char *base64_encoded = NULL; @@ -42,6 +43,7 @@ int enroll_fido2( /* user_icon_name= */ NULL, /* askpw_icon_name= */ "drive-harddisk", lock_with, + cred_alg, &cid, &cid_size, &salt, &salt_size, &secret, &secret_size, diff --git a/src/cryptenroll/cryptenroll-fido2.h b/src/cryptenroll/cryptenroll-fido2.h index b82a9ca842..11667afe9c 100644 --- a/src/cryptenroll/cryptenroll-fido2.h +++ b/src/cryptenroll/cryptenroll-fido2.h @@ -8,9 +8,9 @@ #include "log.h" #if HAVE_LIBFIDO2 -int enroll_fido2(struct crypt_device *cd, const void *volume_key, size_t volume_key_size, const char *device, Fido2EnrollFlags lock_with); +int enroll_fido2(struct crypt_device *cd, const void *volume_key, size_t volume_key_size, const char *device, Fido2EnrollFlags lock_with, int cred_alg); #else -static inline int enroll_fido2(struct crypt_device *cd, const void *volume_key, size_t volume_key_size, const char *device, Fido2EnrollFlags lock_with) { +static inline int enroll_fido2(struct crypt_device *cd, const void *volume_key, size_t volume_key_size, const char *device, Fido2EnrollFlags lock_with, int cred_alg) { return log_debug_errno(SYNTHETIC_ERRNO(EOPNOTSUPP), "FIDO2 key enrollment not supported."); } diff --git a/src/cryptenroll/cryptenroll.c b/src/cryptenroll/cryptenroll.c index 2e11ffe291..045adf871a 100644 --- a/src/cryptenroll/cryptenroll.c +++ b/src/cryptenroll/cryptenroll.c @@ -39,6 +39,11 @@ static size_t arg_n_wipe_slots = 0; static WipeScope arg_wipe_slots_scope = WIPE_EXPLICIT; static unsigned arg_wipe_slots_mask = 0; /* Bitmask of (1U << EnrollType), for wiping all slots of specific types */ static Fido2EnrollFlags arg_fido2_lock_with = FIDO2ENROLL_PIN | FIDO2ENROLL_UP; +#if HAVE_LIBFIDO2 +static int arg_fido2_cred_alg = COSE_ES256; +#else +static int arg_fido2_cred_alg = 0; +#endif assert_cc(sizeof(arg_wipe_slots_mask) * 8 >= _ENROLL_TYPE_MAX); @@ -89,6 +94,8 @@ static int help(void) { " --recovery-key Enroll a recovery key\n" " --pkcs11-token-uri=URI\n" " Specify PKCS#11 security token URI\n" + " --fido2-credential-algorithm=STRING\n" + " Specify COSE algorithm for FIDO2 credential\n" " --fido2-device=PATH\n" " Enroll a FIDO2-HMAC security token\n" " --fido2-with-client-pin=BOOL\n" @@ -129,6 +136,7 @@ static int parse_argv(int argc, char *argv[]) { ARG_FIDO2_WITH_PIN, ARG_FIDO2_WITH_UP, ARG_FIDO2_WITH_UV, + ARG_FIDO2_CRED_ALG, }; static const struct option options[] = { @@ -137,6 +145,7 @@ static int parse_argv(int argc, char *argv[]) { { "password", no_argument, NULL, ARG_PASSWORD }, { "recovery-key", no_argument, NULL, ARG_RECOVERY_KEY }, { "pkcs11-token-uri", required_argument, NULL, ARG_PKCS11_TOKEN_URI }, + { "fido2-credential-algorithm", required_argument, NULL, ARG_FIDO2_CRED_ALG }, { "fido2-device", required_argument, NULL, ARG_FIDO2_DEVICE }, { "fido2-with-client-pin", required_argument, NULL, ARG_FIDO2_WITH_PIN }, { "fido2-with-user-presence", required_argument, NULL, ARG_FIDO2_WITH_UP }, @@ -240,6 +249,12 @@ static int parse_argv(int argc, char *argv[]) { break; } + case ARG_FIDO2_CRED_ALG: + r = parse_fido2_algorithm(optarg, &arg_fido2_cred_alg); + if (r < 0) + return log_error_errno(r, "Failed to parse COSE algorithm: %s", optarg); + break; + case ARG_FIDO2_DEVICE: { _cleanup_free_ char *device = NULL; @@ -566,7 +581,7 @@ static int run(int argc, char *argv[]) { break; case ENROLL_FIDO2: - slot = enroll_fido2(cd, vk, vks, arg_fido2_device, arg_fido2_lock_with); + slot = enroll_fido2(cd, vk, vks, arg_fido2_device, arg_fido2_lock_with, arg_fido2_cred_alg); break; case ENROLL_TPM2: |