X-Git-Url: http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=blobdiff_plain;f=README.md;h=23aa837107ab31f62a3b3a89fe9f56457417455c;hp=e03dbff4bb54f25160036089ed68917906040e98;hb=194a1c30bd4a0668debc82f40eefa49adfc11a8e;hpb=dc50dc3cbff0a815c899828c991e17f85458631c diff --git a/README.md b/README.md index e03dbff..23aa837 100644 --- a/README.md +++ b/README.md @@ -73,6 +73,9 @@ period. The downside is that if the token is used against multiple hosts, and one of them leaks the secret to an adversary, all hosts are compromised. This is not the case with the first approach. +The particular data structure is outlined in the picture: +![](auth-data-structure.svg) + ## Module Operation Authentication file, containing nonce, encrypted shared secret, @@ -136,8 +139,10 @@ PAM module has the following parameters: ## Getting the Source -Pich the tarball -[here](http://www.average.org/chal-resp/auth/pam_pcsc_cr-0.9.0.tar.xz), +Check the [project homepage](http://www.average.org/chal-resp-auth/). + +Pick the source tarball +[here](http://www.average.org/chal-resp-auth/pam_pcsc_cr-0.9.1.tar.xz), or you can [clone](git://git.average.org/git/pam_pcsc_cr.git) or [browse](http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=summary) the git repo.