Displaying 4 results from an estimated 4 matches for "ca_fp".
2010 Mar 03
2
Viewing cetificate details
Hi,
I don't see any way to view the details of a certificate once it is
generated. Having such a capability would be very handy for debugging
purposes to check what constraints, principals, and validity interval
are associated with a given cert.
-- 
Iain Morgan
2006 Nov 15
11
OpenSSH Certkey (PKI)
...!= ';' && i + 1 < len)
+		buf[i++] = *(*c)++;
+	if (**c == ';')
+		(*c)++;
+	buf[i] = 0;
+}
+
+/* check whether certificate is valid and signature correct */
+int
+cert_verify(const u_char *cert, const Key *ca_key, const Key *key,
+    const u_char *identity)
+{
+	u_char ca_fp[128], ca_name[128], ca_id[128], ca_opts[512];
+	u_char ca_vf[16], ca_vt[16], ca_alg[64], ca_sig[1024];
+	u_char sigbuf[1024], datbuf[2048], c, *fp;
+	unsigned long vf, vt, now = time(NULL);
+	u_int siglen, i;
+
+	if (cert == NULL || ca_key == NULL || ca_key->type != KEY_RSA ||
+	    ca_key->r...
2025 May 22
1
LogLevel INFO shows few details for Certificate invalid: not yet valid / expired
..."%s", reason);
-			auth_debug_add("%s", reason);
+			error("Refusing certificate ID \"%s\" serial=%llu "
+			    "signed by %s CA %s: %s", key->cert->key_id,
+			    key->cert->serial,
+			    sshkey_type(key->cert->signature_key), ca_fp,
+			    reason);
+			auth_debug_add("Refused Certificate ID \"%s\" "
+			    "serial=%llu: %s", key->cert->key_id,
+			    (unsigned long long)key->cert->serial, reason);
 			goto out;
 		}
 	}
diff --git a/auth2-pubkeyfile.c b/auth2-pubkeyfile.c
index c3b...
2025 May 21
1
LogLevel INFO shows few details for Certificate invalid: not yet valid / expired
On 4/5/25 15:01, Lars Nood?n wrote:
> I notice that when using log level INFO it seems sshd(8) provides very 
> little information about failed SSH certificate log in attempts:
> 
> Apr? 5 14:44:41 server sshd-session[51695]: error: Certificate invalid: 
> not yet valid
> 
> Apr? 5 14:45:31 server sshd-session[88953]: error: Certificate invalid: 
> expired
> 
>