Displaying 20 results from an estimated 37 matches for "key_fil".
Did you mean:
key_file
2016 Feb 17
2
Call for testing: OpenSSH 7.2
...> regress/unittests/test_helper/test_helper.c:290
> #3 0x0000000000406b0a in assert_int (file=file at entry=0x42a188
> "regress/unittests/hostkeys/test_iterate.c", line=line at entry=163,
> a1=a1 at entry=0x42a1e0 "sshkey_load_public(
> test_data_file(expected[i].key_file), &expected[i].l.key, NULL)",
> a2=a2 at entry=0x42d2cf "0", aa1=-24, aa2=aa2 at entry=0,
This one is failing a test assetion - there should be some more useful
output available from the test itself.
-d
2008 Mar 04
1
Sampling letters
I have a binary matrix of size N x 300. I then create the following:
> set.seed(1234)
> (key_file <- sample(letters[1:4], 300, replace=TRUE))
[1] "a" "c" "c" "c" "d" "c" "a" "a" "c" "c" "c" "c" "b" "d" "b" "d"
"b" "b...
2016 Feb 17
2
Call for testing: OpenSSH 7.2
...more useful
> > output available from the test itself.
>
> I think it's this:
>
> test_hostkeys:
> regress/unittests/hostkeys/test_iterate.c:163 test #1 "hostkeys_iterate all
> with key parse"
> ASSERT_INT_EQ(sshkey_load_public( test_data_file(expected[i].key_file),
> &expected[i].l.key, NULL), 0) failed:
> sshkey_load_public( test_data_file(expected[i].key_file), &expected[i].l.key,
> NULL) = -24
I need to make these error messages more user-friendly :(
-24 is SSH_ERR_SYSTEM_ERROR, so it's likely failing to find/load the
key for some...
2016 Aug 05
4
Fwd: Re: Encrypt /decrypta file with ssh keys.
...xt='1'
else
user_file=`readlink -f ${BASH_ARGV[$i]} 2>/dev/null`
fi
else
ignore_next='0'
fi
done
if [ $subcommand == 'help' ] || [ "X$user_file" == 'X' ]; then
echo 'Usage: sfile [-d|-e|-h] [-k <path_to_key_file>] <path_to_file>'
echo ''
echo 'Encrypt a file using an ssh public key and decrypt using the corresponding private'
echo 'key. The default is to decrypt the specified file using your private key.'
echo ''
echo 'Options:'...
2023 Sep 10
2
Question about encryption and tls
...d few days ago on qemu group but no reactions)
Do I understand correctly that ssl shoudl be configured independently
for libvirt and each hypervisor?
I asked because I configured libvirt connection as
qemu+tls://bambus.kjonca/system?pkipath=...
(and on bambus in /etc/libvirt/libvirtd.conf) I set
key_file = ...
cert_file = ...
ca_file = ...
But after connect and lauching (on bambus) vm I tried to snif traffic to
bambus:5900 on client) and wireshark was able to detect "VNC"
protocol (BTW not spice?), so I am confused.
should I configure in /etc/libvirt/qemu.conf
spice_tls option and...
2019 Nov 12
0
[PATCH 2/2] options: Allow multiple --key parameters and default keys.
...ontinue;
switch (key->type) {
@@ -139,63 +157,64 @@ get_key (struct key_store *ks, const char *device)
s = strdup (key->string.s);
if (!s)
error (EXIT_FAILURE, errno, "strdup");
- return s;
+ r[j++] = s;
+ break;
case key_file:
- return read_first_line_from_file (key->file.name);
+ s = read_first_line_from_file (key->file.name);
+ r[j++] = s;
+ break;
}
-
- /* Key not found in the key store, ask the user for it. */
- break;
}
}
- return read_key (device);
+...
2018 Feb 08
3
pjsip trunking configuration issue
...ity check of my pjsip.conf file, and what could be causing this.
A test call form Twilio?s system hits the PBX (over TLS), but always says ?No matching endpoint found? in the asterisk log.
pjsip.conf
[transport-tls]
type = transport
protocol = tls
bind = 0.0.0.0:5061
cert_file=cert_file
priv_key_file=key_file
method=tlsv1
external_media_address=X.Y.Z.D
external_signaling_address=X.Y.Z.D
verify_client=no
verify_server=no
allow_reload=yes
[twilio](!)
type=endpoint
transport=transport-tls
context=from-twilio
disallow=all
allow=ulaw
dtmf_mode=inband
media_encryption=sdes
rtp_symmetric=yes
rewrite...
2019 Nov 26
0
[PATCH common v2 1/3] options: Simplify selector parsing for --key options.
...ULL, ":", &saveptr);
- if (!elem)
- goto invalid_selector;
- else if (STREQ (elem, "key"))
+ if (STREQ (fields[1], "key"))
key.type = key_string;
- else if (STREQ (elem, "file"))
+ else if (STREQ (fields[1], "file"))
key.type = key_file;
else
goto invalid_selector;
/* 3: actual key */
- elem = strtok_r (NULL, ":", &saveptr);
- if (!elem)
- goto invalid_selector;
switch (key.type) {
case key_string:
- key.string.s = strdup (elem);
+ key.string.s = strdup (fields[2]);
if (!key.string...
2010 Feb 17
0
ssh-keygen: inconsistency with need for passphrase
Hello,
I think something is inconsistent between the code that parses -e and
-y options in ssh-keygen.
This command:
ssh-keygen -ef key_file
...will never prompt for a passphrase; however, this one:
ssh-keygen -yf key_file
...will prompt for it, despite that it returns basically the same
information as -e (in a slightly different format).
Or am I missing something? I didn?t see anything on the man page to
indicate a rationale for...
2020 Nov 19
1
unable to migrate when TLS is used
With libvirt 6.9.0, qemu 5.1.0, and following configurations:
libvirt:
key_file = "/etc/ssl/libvirt/server.lan.key"
cert_file = "/etc/ssl/libvirt/server.lan.crt"
ca_file = "/etc/ssl/libvirt/ca.crt"
log_filters="3:remote 4:event 3:util.json 3:rpc 1:*"
log_outputs="1:file:/var/log/libvirt/libvirtd.log"
qemu:
default_tls_x509_ce...
2015 Dec 23
1
Calibre installation fails on C7
...;<string>", line 619, in get_tarball_info
File "<string>", line 578, in get_https_resource_securely
File "<string>", line 487, in __init__
File "/usr/lib64/python2.7/httplib.py", line 1182, in __init__
context.load_cert_chain(cert_file, key_file)
ssl.SSLError: [SSL] PEM lib (_ssl.c:2757)
googling for that doesn't turn up much help for Calibre, though similar
(but different) sets of errors turn up in a lot of places. So far I've
not found any of them helpful.
One of them said something about the installed Python packages being
br...
2010 Oct 21
3
Virt-v2v
...sed error message:
virt-v2v: Failed to connect to esx://esxhost/: libvirt error code: 38, message: unable to connect to 'esxhost': Connection refused
I have also tried suggestion on webpage above regarding these libvirtd.conf settings and restarted libvirtd:
tls_no_verify_certificate = 1
key_file = ""
cert_file = ""
ca_file = ""
crl_file = ""
... But no change.
The problem may well be the TLS certificates, PKI isn't one of my strong points. I believe the hostnames in the certificates are correct. Which certificates (if any) should be copied to...
2015 Dec 23
2
Calibre installation fails on C7
...on CentOS6 is v1.48. The latest version is
v2.47.0.
On Tue, December 22, 2015 22:06, Fred Smith wrote:
> Attempting to install latest Calibre on Centos-7, getting:
. . .
> File "/usr/lib64/python2.7/httplib.py", line 1182, in __init__
> context.load_cert_chain(cert_file, key_file)
> ssl.SSLError: [SSL] PEM lib (_ssl.c:2757)
>
>
> Can anybody advise me what this tells me? (other than SOMETHING wrong
> with some certificate...)
The error you are reporting may be due to some misconfiguration of the
certificate chain in the Python libraries. Likely the case i...
2016 Feb 17
3
Call for testing: OpenSSH 7.2
On Tue, 16 Feb 2016, Hisashi T Fujinaka wrote:
> On Wed, 17 Feb 2016, Damien Miller wrote:
>
> > > Core was generated by `test_sshkey'.
> > > Program terminated with signal SIGSEGV, Segmentation fault.
> > > #0 0x000000000041273e in cert_parse (key=0x7f7ff7b120c0,
> > > certbuf=0x7f7ff7b16200, b=0x7f7ff7b161b0) at sshkey.c:1896
> > > 1896
2019 Nov 12
4
[PATCH 1/2] options: Fixes and enhancements to --key parsing.
The first patch fixes a rather serious bug, the second patch allows
multiple --key parameters and default parameters.
There is a third patch to libguestfs which adds a test, coming up.
I did not yet review and fix the documentation. I think we need to
centralize it in one place because at the moment the same
documentation for --key is copy/pasted all over the tools.
Rich.
2015 Oct 21
7
[Bug 2481] New: Tilde expansion in -i option inconsistent
...Reporter: nick at nicklott.com
Just noticed some odd behaviour in the identity file option with ~. If
you don't leave a space between -i and the filename the ~ is not
expanded and thus the file is not found. If you leave a space it works
as expected.
ie This doesn't work:
ssh -i~/key_file
This does:
ssh -i ~/key_file
Excerpts from respective strace:
---snip--
stat("~/.ssh/keyfile", 0x7fff73320010) = -1 ENOENT (No such file or
directory)
write(2, "Warning: Identity file ~/.ssh/ke"..., 82Warning: Identity
file ~/.ssh/keyfile not accessible: No such file or...
2015 Dec 23
4
Calibre installation fails on C7
...;<string>", line 619, in get_tarball_info
File "<string>", line 578, in get_https_resource_securely
File "<string>", line 487, in __init__
File "/usr/lib64/python2.7/httplib.py", line 1182, in __init__
context.load_cert_chain(cert_file, key_file)
ssl.SSLError: [SSL] PEM lib (_ssl.c:2757)
Can anybody advise me what this tells me? (other than SOMETHING wrong
with some certificate...)
Thanks!
--
---- Fred Smith -- fredex at fcshome.stoneham.ma.us -----------------------------
"For him who is able to keep you from falling and to p...
virsh connect to xen:///system fails: "error: internal error: Unexpected driver type 'Xen' opened" ?
2020 May 04
2
virsh connect to xen:///system fails: "error: internal error: Unexpected driver type 'Xen' opened" ?
...virtxend-admin-sock
??? virtxend-sock
??? virtxend-sock-ro
On the server, TLS certs are in place
openssl version
OpenSSL 1.1.1g 21 Apr 2020
cat /etc/libvirt/libvirt.conf
ca_file = "/sec/ssl/CA/CA.CHAIN.crt.pem"
cert_file = "/sec/ssl/libvirt/client.EC.crt.pem"
key_file = "/sec/ssl/libvirt/client.EC.key.pem"
cat /etc/libvirt/virtproxyd.conf
ca_file = "/sec/ssl/CA/CA.CHAIN.crt.pem"
cert_file = "/sec/ssl/libvirt/server.EC.crt.pem"
key_file = "/sec/ssl/libvirt/server.EC.key.pem"
On attempt to first _locally_ connec...
2019 Nov 26
6
[PATCH options v2 0/3] options: Allow multiple and default --key parameters.
v1:
https://www.redhat.com/archives/libguestfs/2019-November/msg00036.html
2007 Dec 06
5
scp -t - revisited.....
Okay - We went around and around on the idea that adding an option to restrict scp to only allow files to be copied to a certain directory (or below) based on a different startup param.
I was told to use all sorts of different options, parameters, methods, etc... All because no one wanted to modify the scp code, for whatever reasoning.
I'm sitting here laughing right now, seriously