search for: identity_key

Displaying 9 results from an estimated 9 matches for "identity_key".

Did you mean: identity_keys
2012 Dec 21
0
File Attachments for previous bug report
...f_len); xfree(x1_proof); xfree(x2_proof); -------------- next part -------------- --- ssh.c.orig 2012-12-19 17:30:53.992528775 -0800 +++ ssh.c 2012-12-19 17:32:16.421511581 -0800 @@ -1509,8 +1509,8 @@ #endif /* PKCS11 */ n_ids = 0; - bzero(identity_files, sizeof(identity_files)); - bzero(identity_keys, sizeof(identity_keys)); + memset(identity_files, 0, sizeof(identity_files)); + memset(identity_keys, 0, sizeof(identity_keys)); #ifdef ENABLE_PKCS11 if (options.pkcs11_provider != NULL && @@ -1584,9 +1584,9 @@ memcpy(options.identity_files, identity_files, sizeof(identi...
2012 Dec 20
4
Deprecated calls to bzero() and index() found in OpenSSH 6.1p1
...memset() calls. The patch file is below in (diff -u) format: --- ssh.c.orig 2012-12-19 17:30:53.992528775 -0800 +++ ssh.c 2012-12-19 17:32:16.421511581 -0800 @@ -1509,8 +1509,8 @@ #endif /* PKCS11 */ n_ids = 0; - bzero(identity_files, sizeof(identity_files)); - bzero(identity_keys, sizeof(identity_keys)); + memset(identity_files, 0, sizeof(identity_files)); + memset(identity_keys, 0, sizeof(identity_keys)); #ifdef ENABLE_PKCS11 if (options.pkcs11_provider != NULL && @@ -1584,9 +1584,9 @@ memcpy(options.identity_files, identity_files,...
2016 Nov 21
11
[Bug 2642] New: [sshconnect2] publickey authentication only properly works if used first: pubkey_prepare doesn't work after pubkey_cleanup
...`` Unfortunately, this does _not_ reset the state! - pubkey_cleanup is simple, it just closes the agent connection and delete all keys in authctxt->keys - pubkey_prepare populate authctxt->keys and can create an agent connection. However it cannot be called twice, because it modifies options.identity_keys and leaks options.certificates: * When reading identity_keys, when storing the key in a new 'identity' structure, it runs (https://github.com/openssh/openssh-portable/blob/master/sshconnect2.c#L1287): ```options.identity_keys[i] = NULL;```. As a result, any subsequent run of this functio...
2005 Jul 26
1
Linux in-kernel keys support
...(keys = sc_get_keys(options.smartcard_device, NULL)) != NULL ) { - int count = 0; + count = 0; for (i = 0; keys[i] != NULL; i++) { count++; memmove(&options.identity_files[1], &options.identity_files[0], @@ -1246,6 +1253,95 @@ options.identity_files[i] = filename; options.identity_keys[i] = public; } + +#ifdef HAVE_LIBKEYUTIL + count = keyctl_read_alloc(KEY_SPEC_USER_SESSION_KEYRING, (void **)&keylist); + if (count < 0) { + fprintf(stderr, "Error in keyctl_read_alloc\n"); + count = 0; + } else { + key_serial_t key, *pk; + char *buf; + int dlen, ret; + +...
2010 Jan 12
2
[patch] Automatically add keys to agent
...ases. */ - if (try_agent_authentication()) + auth = ssh_get_authentication_connection(); + if (auth != NULL && try_agent_authentication(auth)) goto success; /* Try RSA authentication for each identity. */ for (i = 0; i < options.num_identity_files; i++) if (options.identity_keys[i] != NULL && options.identity_keys[i]->type == KEY_RSA1 && - try_rsa_authentication(i)) + try_rsa_authentication(i, auth)) goto success; } /* Try challenge response authentication if the server supports it. */ @@ -746,5 +753,6 @@ ssh_userauth1(const...
2013 Apr 01
1
"no such identity"
...file() in sshconnect2.c prints this message if its userprovided argument is non-zero. The value comes from a struct identity which is populated in pubkey_prepare() in the same file; userprovided is set to 1 if the keyfile name comes from the client option structure. However, in this case, options.identity_keys is the hardcoded default; I wouldn't say that really qualifies as "user provided". The attached patch adds a flag to the option structure which is set to 1 if and only if the IdentityFile option was encountered either in the configuration file or on the command line. DES -- Dag-Er...
2003 Nov 27
2
Question about adding another parameter for OpenSSH
...t;hostname will be set in the main program if appropriate */ --- readconf.h.orig Thu Nov 27 15:19:30 2003 +++ readconf.h Thu Nov 27 15:20:11 2003 @@ -87,6 +87,7 @@ int num_identity_files; /* Number of files for RSA/DSA identities. */ char *identity_files[SSH_MAX_IDENTITY_FILES]; Key *identity_keys[SSH_MAX_IDENTITY_FILES]; + int group_private_key; /* Local TCP/IP forward requests. */ int num_local_forwards; --- ssh.c.orig Thu Nov 27 16:31:08 2003 +++ ssh.c Thu Nov 27 16:30:46 2003 @@ -634,11 +634,13 @@ PRIV_START; sensitive_data.keys[0] = key_load_private_type(KEY_RSA1, -...
2002 Oct 16
3
ssh-3.5p1 core dumps on Solaris 2.6
...s_files.so.1...done. Reading symbols from /usr/lib/nss_dns.so.1...done. #0 0x24210 in ssh_userauth1 (local_user=0xf7b30 "root", server_user=0xf79e0 "root", host=0xfa790 "pf-i400", sensitive=0xf433c) at sshconnect1.c:1248 1248 if (options.identity_keys[i] != NULL && (gdb) where #0 0x24210 in ssh_userauth1 (local_user=0xf7b30 "root", server_user=0xf79e0 "root", host=0xfa790 "pf-i400", sensitive=0xf433c) at sshconnect1.c:1248 #1 0x217c0 in ssh_login (sensitive=0xf433c, orighost=0xeffffaad "pf-i400&q...
2015 Jul 29
2
[PATCH] ssh: Add option to present certificates on command line
...options->proxy_command = NULL; diff --git a/readconf.h b/readconf.h index bb2d552..f839016 100644 --- a/readconf.h +++ b/readconf.h @@ -94,6 +94,11 @@ typedef struct { char *identity_files[SSH_MAX_IDENTITY_FILES]; int identity_file_userprovided[SSH_MAX_IDENTITY_FILES]; struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; + + int num_certificate_files; /* Number of extra certificates for ssh. */ + char *certificate_files[SSH_MAX_CERTIFICATE_FILES]; + int certificate_file_userprovided[SSH_MAX_CERTIFICATE_FILES]; + struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; /* Local TCP/IP f...