search for: isprivate

Displaying 8 results from an estimated 8 matches for "isprivate".

Did you mean: i_private
2016 Nov 21
11
[Bug 2642] New: [sshconnect2] publickey authentication only properly works if used first: pubkey_prepare doesn't work after pubkey_cleanup
https://bugzilla.mindrot.org/show_bug.cgi?id=2642 Bug ID: 2642 Summary: [sshconnect2] publickey authentication only properly works if used first: pubkey_prepare doesn't work after pubkey_cleanup Product: Portable OpenSSH Version: 7.3p1 Hardware: amd64 OS: Linux Status:
2011 Feb 21
0
[LLVMdev] Looking for more LLBrowse testers / users
...etailsView.cpp.o [ 16%] Building CXX object CMakeFiles/llbrowse.dir/lib/TreeView.cpp.o /home/john/src/llbrowse/lib/TreeView.cpp: In member function ‘virtual void DIEItem::ShowDetails(DetailsView*)’: /home/john/src/llbrowse/lib/TreeView.cpp:913: error: ‘class llvm::DISubprogram’ has no member named ‘isPrivate’ /home/john/src/llbrowse/lib/TreeView.cpp:914: error: ‘class llvm::DISubprogram’ has no member named ‘isProtected’ /home/john/src/llbrowse/lib/TreeView.cpp:915: error: ‘class llvm::DISubprogram’ has no member named ‘isExplicit’ /home/john/src/llbrowse/lib/TreeView.cpp:916: error: ‘class llvm::DISub...
2011 Feb 19
4
[LLVMdev] Looking for more LLBrowse testers / users
LLBrowse - a GUI tool which allows you to inspect the contents of LLVM modules - now runs on Linux and OS X, and it works with both LLVM 2.8 and current LLVM head. I've updated the docs to include instructions on checking out and building the code under several different environments, which you can read here: http://llvm.org/svn/llvm-project/llbrowse/trunk/doc/LLBrowse.html (the doc also
2010 Jan 12
2
[patch] Automatically add keys to agent
...pe, u_int32_ static int identity_sign(Identity *id, u_char **sigp, u_int *lenp, - u_char *data, u_int datalen) + u_char *data, u_int datalen, AuthenticationConnection *auth) { Key *prv; int ret; @@ -1118,7 +1118,7 @@ identity_sign(Identity *id, u_char **sigp, u_int *lenp if (id->isprivate || (id->key->flags & KEY_FLAG_EXT)) return (key_sign(id->key, sigp, lenp, data, datalen)); /* load the private key from the file */ - if ((prv = load_identity_file(id->filename)) == NULL) + if ((prv = load_identity_file(id->filename, auth)) == NULL) return (-1); ret = k...
2005 Jul 26
1
Linux in-kernel keys support
...cked/sshconnect2.c --- openssh-4.1p1/sshconnect2.c 2004-06-15 02:30:09.000000000 +0200 +++ openssh-4.1p1-hacked/sshconnect2.c 2005-07-23 22:39:24.000000000 +0200 @@ -832,7 +832,9 @@ * we have already loaded the private key or * the private key is stored in external hardware */ - if (id->isprivate || (id->key->flags & KEY_FLAG_EXT)) + if(id->key->flags & KEY_FLAG_KERN) + fprintf(stderr, "Going to use kernel key\n"); + if (id->isprivate || (id->key->flags & KEY_FLAG_EXT) || (id->key->flags & KEY_FLAG_KERN)) return (key_sign(id->key,...
2016 Apr 22
2
Client-side public key causing mess
...sshkey_free(private); > + private = NULL; > + quit = 1; > + } > if (!quit && private != NULL && id->agent_fd == -1 && > !(id->key && id->isprivate)) > maybe_add_key_to_agent(id->filename, private, comment, > _______________________________________________ > openssh-unix-dev mailing list > openssh-unix-dev at mindrot.org > https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
2016 Apr 19
4
Client-side public key causing mess
Hello, I have a client machine and a server machine. I generated a pair of private-public rsa keys using ssh-keygen. On the client-machine, I uploaded my private key onto ~/.ssh/id_rsa On the server machine, I appended the content of the public key to .ssh/authorized_keys I can successfully connect from the client to the server with that config. However, on the client-side, if I add a
2006 Nov 15
11
OpenSSH Certkey (PKI)
...t_version_string=client_version_string; kex->server_version_string=server_version_string; kex->verify_host_key=&verify_host_key_callback; @@ -168,6 +169,7 @@ Key *key; /* public/private key */ char *filename; /* comment for agent-only keys */ int tried; + int triedcert; int isprivate; /* key points to the private key */ }; TAILQ_HEAD(idlist, identity); @@ -206,6 +208,7 @@ void input_userauth_passwd_changereq(int, u_int32_t, void *); int userauth_none(Authctxt *); +int userauth_certkey(Authctxt *); int userauth_pubkey(Authctxt *); int userauth_passwd(Authctxt *); int u...