Displaying 6 results from an estimated 6 matches for "perm_ok".
2010 Jan 12
2
[patch] Automatically add keys to agent
...-1) {
xfree(blob);
buffer_free(&b);
@@ -1240,30 +1240,36 @@ send_pubkey_test(Authctxt *authctxt, Identity *id)
}
static Key *
-load_identity_file(char *filename)
+load_identity_file(char *filename, AuthenticationConnection *ac)
{
Key *private;
- char prompt[300], *passphrase;
- int perm_ok = 0, quit, i;
+ char prompt[300], *passphrase, *comment = NULL;
+ int perm_ok = 0, quit, i, allowed = 0;
struct stat st;
if (stat(filename, &st) < 0) {
debug3("no such identity: %s", filename);
return NULL;
}
- private = key_load_private_type(KEY_UNSPEC, filename, &qu...
2010 Jan 12
1
[patch] Make keys work again
...CS file: /usr/obsd-repos/src/usr.bin/ssh/authfile.c,v
retrieving revision 1.78
diff -u -N -p authfile.c
--- authfile.c 11 Jan 2010 04:46:45 -0000 1.78
+++ authfile.c 11 Jan 2010 22:35:04 -0000
@@ -552,8 +552,8 @@ key_load_private_type(int type, const char
*filename,
strerror(errno));
if (perm_ok != NULL)
*perm_ok = 0;
- }
return NULL;
+ }
if (!key_perm_ok(fd, filename)) {
if (perm_ok != NULL)
*perm_ok = 0;
2007 Aug 22
0
Patch to allow checking of v1 keys on remote host.
...erwise, the server should respond with a challenge. */
if (type != SSH_SMSG_AUTH_RSA_CHALLENGE)
packet_disconnect("Protocol error during RSA authentication: %d", type);
@@ -256,7 +270,15 @@
else
private = key_load_private_type(KEY_RSA1, authfile, "", NULL,
&perm_ok);
- if (private == NULL && !options.batch_mode && perm_ok) {
+
+ /*if -u flag is set just check to see if key is valid and exit.*/
+ if (options.checkey && perm_ok) {
+ snprintf(buf, sizeof(buf), "RSA key '%.100s' is Valid",comment);
+ xfree(commen...
2015 Jun 05
0
[Bug 1967] Potential memory leak in ssh [detected by melton]
...ot be freed itself.
>--- sshconnect2.c 29 May 2011 11:42:34 -0000 1.180
>+++ sshconnect2.c 30 Dec 2011 09:27:33 -0000
>@@ -1323,8 +1323,11 @@ load_identity_file(char *filename)
> return NULL;
> }
> private = key_load_private_type(KEY_UNSPEC, filename, "", NULL, &perm_ok);
>- if (!perm_ok)
>+ if (!perm_ok) {
>+ if (private != NULL)
>+ key_free(private);
This code has been refactored and the leak eliminated.
>@@ -1892,9 +1895,9 @@ authmethod_get(char *authlist)
> xfree(name);
> return current;
> }
>+ if (name != NULL)
>+...
2010 Jan 07
6
[Bug 1693] New: ssh prompts for passphrase even when identity file is unreadable
https://bugzilla.mindrot.org/show_bug.cgi?id=1693
Summary: ssh prompts for passphrase even when identity file is
unreadable
Product: Portable OpenSSH
Version: 5.3p1
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs
2019 Jul 29
2
[PATCH] regress: Fix possible memleaks
Hello,
Could attached patch be reviewed. This patch provides a fix for bug:
https://bugzilla.mindrot.org/show_bug.cgi?id=3037
Thanks,
Jitendra