Displaying 2 results from an estimated 2 matches for "verify_time".
Did you mean:
verify_name
2025 Apr 29
1
Multiple allowed signer files in `ssh-keygen -Y verify`
...const char *revoked_keys, char * const *opts, size_t nopts)
{
- int r, ret = -1;
+ int r, ret = -1, matched = 0;
int print_pubkey = 0;
struct sshbuf *sigbuf = NULL, *abuf = NULL;
struct sshkey *sign_key = NULL;
char *fp = NULL;
struct sshkey_sig_details *sig_details = NULL;
uint64_t verify_time = 0;
+ size_t i;
if (sig_process_opts(opts, nopts, NULL, &verify_time,
&print_pubkey) != 0)
@@ -2850,9 +2855,23 @@ sig_verify(const char *signature, const char *sig_namespace,
}
}
- if (allowed_keys != NULL && (r = sshsig_check_allowed_keys(allowed_keys,
- sign_...
2025 Apr 23
1
Multiple allowed signer files in `ssh-keygen -Y verify`
Hello,
I'm currently evaluating using `ssh-keygen -Y verify` to check OS
artifacts (e.g. packages) and I noticed that the `-f
allowed_signers_file` option can be passed only once. A side remark:
technically it can be passed multiple times without a warning but the
last invocation overrides all previous ones. Tested using:
$ ssh-keygen -Y verify -f allowed_signers -f /dev/null -n file -s