X-Git-Url: http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=blobdiff_plain;f=README.md;h=23aa837107ab31f62a3b3a89fe9f56457417455c;hp=dece6990df9ab390e8cbf744453ecac8e96e52db;hb=194a1c30bd4a0668debc82f40eefa49adfc11a8e;hpb=07ee00765e9ecea87f2c1c0ed9cfb36d1fb6d8c3 diff --git a/README.md b/README.md index dece699..23aa837 100644 --- a/README.md +++ b/README.md @@ -73,6 +73,9 @@ period. The downside is that if the token is used against multiple hosts, and one of them leaks the secret to an adversary, all hosts are compromised. This is not the case with the first approach. +The particular data structure is outlined in the picture: +![](auth-data-structure.svg) + ## Module Operation Authentication file, containing nonce, encrypted shared secret, @@ -139,7 +142,7 @@ PAM module has the following parameters: Check the [project homepage](http://www.average.org/chal-resp-auth/). Pick the source tarball -[here](http://www.average.org/chal-resp-auth/auth/pam_pcsc_cr-0.9.0.tar.xz), +[here](http://www.average.org/chal-resp-auth/pam_pcsc_cr-0.9.1.tar.xz), or you can [clone](git://git.average.org/git/pam_pcsc_cr.git) or [browse](http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=summary) the git repo.