version 1.152, 2020/02/06 22:30:54 |
version 1.153, 2020/02/18 08:58:33 |
|
|
static int fingerprint_hash = SSH_FP_HASH_DEFAULT; |
static int fingerprint_hash = SSH_FP_HASH_DEFAULT; |
|
|
/* Default lifetime (0 == forever) */ |
/* Default lifetime (0 == forever) */ |
static int lifetime = 0; |
static long lifetime = 0; |
|
|
/* User has to confirm key use */ |
/* User has to confirm key use */ |
static int confirm = 0; |
static int confirm = 0; |
|
|
filename, comment); |
filename, comment); |
if (lifetime != 0) { |
if (lifetime != 0) { |
fprintf(stderr, |
fprintf(stderr, |
"Lifetime set to %d seconds\n", lifetime); |
"Lifetime set to %ld seconds\n", lifetime); |
} |
} |
if (confirm != 0) { |
if (confirm != 0) { |
fprintf(stderr, "The user must confirm " |
fprintf(stderr, "The user must confirm " |
|
|
fprintf(stderr, "Certificate added: %s (%s)\n", certpath, |
fprintf(stderr, "Certificate added: %s (%s)\n", certpath, |
private->cert->key_id); |
private->cert->key_id); |
if (lifetime != 0) { |
if (lifetime != 0) { |
fprintf(stderr, "Lifetime set to %d seconds\n", |
fprintf(stderr, "Lifetime set to %ld seconds\n", |
lifetime); |
lifetime); |
} |
} |
if (confirm != 0) { |
if (confirm != 0) { |
|
|
sshkey_type(keys[i]), fp); |
sshkey_type(keys[i]), fp); |
if (lifetime != 0) { |
if (lifetime != 0) { |
fprintf(stderr, |
fprintf(stderr, |
"Lifetime set to %d seconds\n", lifetime); |
"Lifetime set to %ld seconds\n", lifetime); |
} |
} |
if (confirm != 0) { |
if (confirm != 0) { |
fprintf(stderr, "The user must confirm " |
fprintf(stderr, "The user must confirm " |
|
|
pkcs11provider = optarg; |
pkcs11provider = optarg; |
break; |
break; |
case 't': |
case 't': |
if ((lifetime = convtime(optarg)) == -1) { |
if ((lifetime = convtime(optarg)) == -1 || |
|
lifetime < 0 || lifetime > UINT32_MAX) { |
fprintf(stderr, "Invalid lifetime\n"); |
fprintf(stderr, "Invalid lifetime\n"); |
ret = 1; |
ret = 1; |
goto done; |
goto done; |