Displaying 4 results from an estimated 4 matches for "process_request_identities".
2023 Oct 16
2
ssh-agent hides sk "confirm user presence" message
Hey Damien,
> Generally we prefer to use ssh-askpass for agent notifications. Are you able to use that?
Hmm, okay, but it's not clear to me how to make that work. Is what you have in mind documented somewhere? I don't see this specific situation covered in the manpages and a web search doesn't turn up much.
I thought ssh-askpass was only invoked when the key is first added to the
2015 Jul 26
2
[PATCH] ssh-agent: Add support to load additional certificates
...sshkey_fingerprint(id->key, fingerprint_hash, SSH_FP_DEFAULT);
+ p = sshkey_fingerprint(id->idkey->key, fingerprint_hash, SSH_FP_DEFAULT);
if (p != NULL &&
ask_permission("Allow use of key %s?\nKey fingerprint %s.",
id->comment, p))
@@ -256,14 +304,14 @@ process_request_identities(SocketEntry *
(r = sshbuf_put_u32(msg, tab->nentries)) != 0)
fatal("%s: buffer error: %s", __func__, ssh_err(r));
TAILQ_FOREACH(id, &tab->idlist, next) {
- if (id->key->type == KEY_RSA1) {
+ if (id->idkey->key->type == KEY_RSA1) {
#ifdef WITH_SSH1...
2023 Sep 11
21
[Bug 3613] New: Unable to sign using certificates and PKCS#11
...pkcs11_k11_free: parent 0x55878dee7640 ptr 0x55878dee5f20 idx 1
debug1: pkcs11_provider_unref: provider
"/usr/lib/x86_64-linux-gnu/libp11-kit.so.0.3.0" refcount 3
debug1: new_socket: type = CONNECTION
debug2: fd 4 setting O_NONBLOCK
debug1: process_message: socket 1 (fd=4) type 11
debug2: process_request_identities: entering
debug3: identity_permitted: entering: key RSA comment "Public key for
PIV Authentication", 0 socket bindings, 0 constraints
debug3: identity_permitted: entering: key RSA comment "Public key for
PIV Attestation", 0 socket bindings, 0 constraints
debug2: process_request_...
2012 Mar 11
2
[patch] Threading support in ssh-agent
...entity(id);
tab->nentries--;
+
+ tpool_barrier(&tpool);
+
+ free_identity(id);
}
}
}
@@ -861,7 +1144,7 @@
break;
/* ssh2 */
case SSH2_AGENTC_SIGN_REQUEST:
- process_sign_request2(e);
+ schedule_sign_request2(e);
break;
case SSH2_AGENTC_REQUEST_IDENTITIES:
process_request_identities(e, 2);
@@ -943,6 +1226,10 @@
break;
case AUTH_UNUSED:
break;
+#ifdef HAVE_LIBPTHREAD
+ case AUTH_INUSE:
+ break;
+#endif
default:
fatal("Unknown socket type %d", sockets[i].type);
break;
@@ -981,6 +1268,13 @@
if (parent_alive_interval != 0)
deadline = (deadli...