Displaying 8 results from an estimated 8 matches for "ssh_max_identity_files".
2000 Dec 21
1
Patch to allow DSA as well as RSA identities to be specified on the command line
...4 @@
case 'i':
if (stat(optarg, &st) < 0) {
- fprintf(stderr, "Warning: Identity file %s does not exist.\n",
+ fprintf(stderr, "Warning: RSA identity file %s does not exist.\n",
optarg);
break;
}
if (options.num_identity_files >= SSH_MAX_IDENTITY_FILES)
- fatal("Too many identity files specified (max %d)",
+ fatal("Too many RSA identity files specified (max %d)",
SSH_MAX_IDENTITY_FILES);
options.identity_files[options.num_identity_files++] =
+ xstrdup(optarg);
+ break;
+ case 'I':
+ if (sta...
2017 May 31
1
[PATCH 0/1] Process the IdentityFile option from the included files
Hello,
This change is to get the IdentityFile option processed
from the included configuration files.
Regards,
Oleg
Oleg Zhurakivskyy (1):
Process the IdentityFile option from the included files
readconf.c | 14 ++++++--------
1 file changed, 6 insertions(+), 8 deletions(-)
--
2.9.3
2005 Jul 26
1
Linux in-kernel keys support
...11,15 +1215,18 @@
load_public_identity_files(void)
{
char *filename;
- int i = 0;
+ int i = 0, count;
Key *public;
+#ifdef HAVE_LIBKEYUTIL
+ key_serial_t *keylist;
+#endif
#ifdef SMARTCARD
Key **keys;
if (options.smartcard_device != NULL &&
options.num_identity_files < SSH_MAX_IDENTITY_FILES &&
(keys = sc_get_keys(options.smartcard_device, NULL)) != NULL ) {
- int count = 0;
+ count = 0;
for (i = 0; keys[i] != NULL; i++) {
count++;
memmove(&options.identity_files[1], &options.identity_files[0],
@@ -1246,6 +1253,95 @@
options.identity_files[i] = fil...
2008 Jan 07
0
ssh -q doesn't suppress all warning messages
...age is printed from the -i option:
ssh.c
line 387
case 'i': if (stat(optarg, &st) < 0) { fprintf(stderr, "Warning: Identity file %s " "not accessible: %s.\n", optarg, strerror(errno)); break; } if (options.num_identity_files >= SSH_MAX_IDENTITY_FILES) fatal("Too many identity files specified " "(max %d)", SSH_MAX_IDENTITY_FILES); options.identity_files[options.num_identity_files++] = xstrdup(optarg); break;
So if we can't suppress all warning messages using "-q", should we revise the man p...
2015 Jul 29
2
[PATCH] ssh: Add option to present certificates on command line
...s->num_certificate_files = 0;
options->hostname = NULL;
options->host_key_alias = NULL;
options->proxy_command = NULL;
diff --git a/readconf.h b/readconf.h
index bb2d552..f839016 100644
--- a/readconf.h
+++ b/readconf.h
@@ -94,6 +94,11 @@ typedef struct {
char *identity_files[SSH_MAX_IDENTITY_FILES];
int identity_file_userprovided[SSH_MAX_IDENTITY_FILES];
struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES];
+
+ int num_certificate_files; /* Number of extra certificates for ssh. */
+ char *certificate_files[SSH_MAX_CERTIFICATE_FILES];
+ int certificate_file_userprovided[SSH_MAX_CERTIF...
2003 Nov 27
2
Question about adding another parameter for OpenSSH
...m if appropriate */
/* options->hostname will be set in the main program if appropriate */
--- readconf.h.orig Thu Nov 27 15:19:30 2003
+++ readconf.h Thu Nov 27 15:20:11 2003
@@ -87,6 +87,7 @@
int num_identity_files; /* Number of files for RSA/DSA identities. */
char *identity_files[SSH_MAX_IDENTITY_FILES];
Key *identity_keys[SSH_MAX_IDENTITY_FILES];
+ int group_private_key;
/* Local TCP/IP forward requests. */
int num_local_forwards;
--- ssh.c.orig Thu Nov 27 16:31:08 2003
+++ ssh.c Thu Nov 27 16:30:46 2003
@@ -634,11 +634,13 @@
PRIV_START;
sensitive_data.keys[0] = key_load_p...
2003 Nov 04
0
ServerLiesWarning
...to sshd */
char *smartcard_device; /* Smartcard reader device */
int verify_host_key_dns; /* Verify host key using DNS */
+ int server_lies_warning; /* display warning about server lying */
int num_identity_files; /* Number of files for RSA/DSA identities. */
char *identity_files[SSH_MAX_IDENTITY_FILES];
diff -Nur openssh-3.7.1p2/ssh_config.5 openssh-3.7.1p2-serverlieswarning/ssh_config.5
--- openssh-3.7.1p2/ssh_config.5 2003-09-02 22:13:30.000000000 -0400
+++ openssh-3.7.1p2-serverlieswarning/ssh_config.5 2003-11-04 02:45:47.000000000 -0500
@@ -553,6 +553,12 @@
The default is
.Dq yes .
Note t...
2018 Mar 22
16
Call for testing: OpenSSH 7.7
Hi,
OpenSSH 7.7p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a bugfix release.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available via git using the
instructions at