search for: do_ca_sign

Displaying 4 results from an estimated 4 matches for "do_ca_sign".

2010 Mar 03
2
Viewing cetificate details
Hi, I don't see any way to view the details of a certificate once it is generated. Having such a capability would be very handy for debugging purposes to check what constraints, principals, and validity interval are associated with a given cert. -- Iain Morgan
2011 Sep 02
4
[Bug 1929] New: ssh-keygen fails to build because PKCS11 is not available
...y: P2 Component: ssh-keygen AssignedTo: unassigned-bugs at mindrot.org ReportedBy: alanh at fairlite.co.uk Trying to build 5.8p2 and because the system I'm using lacks dlopen, PKCS11 isn't available and therefore fails with this.... ssh-keygen.c: In function 'do_ca_sign': ssh-keygen.c:1410:2: warning: implicit declaration of function 'pkcs11_init' ssh-keygen.c:1493:2: warning: implicit declaration of function 'pkcs11_terminate' m68k-atari-mint-gcc -o ssh-keygen ssh-keygen.o -L. -Lopenbsd-compat/ -fstack-protector-all -lssh -lopenbsd-compat -ls...
2010 Aug 31
1
5.5p1/5.6p1 fails tests on SCO Openserver 5.0.7
...ssing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug3: key_read: missing whitespace debug2: key_type_from_name: unknown key type '-----END' debug3: key_read: missing keytype do_ca_sign: unable to open "/u/home/rac/src/openssh/openssh-5.6p1/regress/cert_host_key_rsa" couldn't sign cert_host_key_rsa I haven't pursued beyond this since the cert- scripts are show stoppers. I've perused the mailing list archives and don't see anything similar. I've also...
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
...? ???? &private, &comment)) != 0) { +?? ??? ???? &private, &comment, NULL)) != 0) { ??? ??? ??? ?freezero(passphrase, strlen(passphrase)); ??? ??? ??? ?fatal("Cannot load private key \"%s\": %s.", ??? ??? ??? ???? identity_file, ssh_err(r)); @@ -1785,7 +1801,7 @@ do_ca_sign(struct passwd *pw, const char *ca_key_path, int prefer_agent, ??? ??? ?ca->flags |= SSHKEY_FLAG_EXT; ??? ?} else { ??? ??? ?/* CA key is assumed to be a private key on the filesystem */ -?? ??? ?ca = load_identity(tmp, NULL); +?? ??? ?ca = load_identity(tmp, NULL, NULL); ??? ?} ??? ?free(tmp); ?...