Displaying 2 results from an estimated 2 matches for "num_certificate_fil".
Did you mean:
num_certificate_files
2015 Jul 29
2
[PATCH] ssh: Add option to present certificates on command line
...hostkeyalias", oHostKeyAlias },
{ "proxycommand", oProxyCommand },
@@ -366,6 +368,37 @@ clear_forwardings(Options *options)
}
void
+add_certificate_file(Options *options, const char *dir, const char *filename,
+ int userprovided)
+{
+ char *path;
+ int i;
+
+ if (options->num_certificate_files >= SSH_MAX_CERTIFICATE_FILES)
+ fatal("Too many certificate files specified (max %d)",
+ SSH_MAX_CERTIFICATE_FILES);
+
+ if (dir == NULL) /* no dir, filename is absolute */
+ path = xstrdup(filename);
+ else
+ (void)xasprintf(&path, "%.100s%.100s", dir, filename...
2016 Nov 21
11
[Bug 2642] New: [sshconnect2] publickey authentication only properly works if used first: pubkey_prepare doesn't work after pubkey_cleanup
...ttps://github.com/openssh/openssh-portable/blob/master/sshconnect2.c#L1287):
```options.identity_keys[i] = NULL;```. As a result, any subsequent run
of this function, when getting the key via ```key =
options.identity_keys[i];``` will only be able to retrieve 'NULL'
* When reading options.num_certificate_files, it does not replace
options.certificates[i] by NULL but simply copy the pointer in the new
'identity' structure. When pubkey_cleanup run, it will free this value,
making any subsequent run of this function access freed memory? (not
tested)
A clean solution could be to copy the key over,...