Displaying 8 results from an estimated 8 matches for "ispriv".
Did you mean:
iopriv
2016 Nov 21
11
[Bug 2642] New: [sshconnect2] publickey authentication only properly works if used first: pubkey_prepare doesn't work after pubkey_cleanup
https://bugzilla.mindrot.org/show_bug.cgi?id=2642
Bug ID: 2642
Summary: [sshconnect2] publickey authentication only properly
works if used first: pubkey_prepare doesn't work after
pubkey_cleanup
Product: Portable OpenSSH
Version: 7.3p1
Hardware: amd64
OS: Linux
Status:
2011 Feb 21
0
[LLVMdev] Looking for more LLBrowse testers / users
...etailsView.cpp.o
[ 16%] Building CXX object CMakeFiles/llbrowse.dir/lib/TreeView.cpp.o
/home/john/src/llbrowse/lib/TreeView.cpp: In member function ‘virtual void
DIEItem::ShowDetails(DetailsView*)’:
/home/john/src/llbrowse/lib/TreeView.cpp:913: error: ‘class
llvm::DISubprogram’ has no member named ‘isPrivate’
/home/john/src/llbrowse/lib/TreeView.cpp:914: error: ‘class
llvm::DISubprogram’ has no member named ‘isProtected’
/home/john/src/llbrowse/lib/TreeView.cpp:915: error: ‘class
llvm::DISubprogram’ has no member named ‘isExplicit’
/home/john/src/llbrowse/lib/TreeView.cpp:916: error: ‘class
llvm::DI...
2011 Feb 19
4
[LLVMdev] Looking for more LLBrowse testers / users
LLBrowse - a GUI tool which allows you to inspect the contents of LLVM
modules - now runs on Linux and OS X, and it works with both LLVM 2.8 and
current LLVM head. I've updated the docs to include instructions on checking
out and building the code under several different environments, which you
can read here:
http://llvm.org/svn/llvm-project/llbrowse/trunk/doc/LLBrowse.html (the doc
also
2010 Jan 12
2
[patch] Automatically add keys to agent
...pe, u_int32_
static int
identity_sign(Identity *id, u_char **sigp, u_int *lenp,
- u_char *data, u_int datalen)
+ u_char *data, u_int datalen, AuthenticationConnection *auth)
{
Key *prv;
int ret;
@@ -1118,7 +1118,7 @@ identity_sign(Identity *id, u_char **sigp, u_int *lenp
if (id->isprivate || (id->key->flags & KEY_FLAG_EXT))
return (key_sign(id->key, sigp, lenp, data, datalen));
/* load the private key from the file */
- if ((prv = load_identity_file(id->filename)) == NULL)
+ if ((prv = load_identity_file(id->filename, auth)) == NULL)
return (-1);
ret...
2005 Jul 26
1
Linux in-kernel keys support
...cked/sshconnect2.c
--- openssh-4.1p1/sshconnect2.c 2004-06-15 02:30:09.000000000 +0200
+++ openssh-4.1p1-hacked/sshconnect2.c 2005-07-23 22:39:24.000000000 +0200
@@ -832,7 +832,9 @@
* we have already loaded the private key or
* the private key is stored in external hardware
*/
- if (id->isprivate || (id->key->flags & KEY_FLAG_EXT))
+ if(id->key->flags & KEY_FLAG_KERN)
+ fprintf(stderr, "Going to use kernel key\n");
+ if (id->isprivate || (id->key->flags & KEY_FLAG_EXT) || (id->key->flags & KEY_FLAG_KERN))
return (key_sign(id->ke...
2016 Apr 22
2
Client-side public key causing mess
...sshkey_free(private);
> + private = NULL;
> + quit = 1;
> + }
> if (!quit && private != NULL && id->agent_fd == -1 &&
> !(id->key && id->isprivate))
> maybe_add_key_to_agent(id->filename, private, comment,
> _______________________________________________
> openssh-unix-dev mailing list
> openssh-unix-dev at mindrot.org
> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
2016 Apr 19
4
Client-side public key causing mess
Hello,
I have a client machine and a server machine. I generated a pair of
private-public rsa keys using ssh-keygen.
On the client-machine, I uploaded my private key onto ~/.ssh/id_rsa
On the server machine, I appended the content of the public key to
.ssh/authorized_keys
I can successfully connect from the client to the server with that config.
However, on the client-side, if I add a
2006 Nov 15
11
OpenSSH Certkey (PKI)
...t_version_string=client_version_string;
kex->server_version_string=server_version_string;
kex->verify_host_key=&verify_host_key_callback;
@@ -168,6 +169,7 @@
Key *key; /* public/private key */
char *filename; /* comment for agent-only keys */
int tried;
+ int triedcert;
int isprivate; /* key points to the private key */
};
TAILQ_HEAD(idlist, identity);
@@ -206,6 +208,7 @@
void input_userauth_passwd_changereq(int, u_int32_t, void *);
int userauth_none(Authctxt *);
+int userauth_certkey(Authctxt *);
int userauth_pubkey(Authctxt *);
int userauth_passwd(Authctxt *);
in...