version 1.253, 2020/01/25 00:03:36 |
version 1.254, 2020/01/25 00:06:48 |
|
|
int success = 0, confirm = 0; |
int success = 0, confirm = 0; |
u_int seconds, maxsign; |
u_int seconds, maxsign; |
char *fp, *comment = NULL, *ext_name = NULL, *sk_provider = NULL; |
char *fp, *comment = NULL, *ext_name = NULL, *sk_provider = NULL; |
|
char canonical_provider[PATH_MAX]; |
time_t death = 0; |
time_t death = 0; |
struct sshkey *k = NULL; |
struct sshkey *k = NULL; |
u_char ctype; |
u_char ctype; |
|
|
free(sk_provider); |
free(sk_provider); |
goto send; |
goto send; |
} |
} |
if (strcasecmp(sk_provider, "internal") == 0) |
if (strcasecmp(sk_provider, "internal") == 0) { |
debug("%s: internal provider", __func__); |
debug("%s: internal provider", __func__); |
else if (match_pattern_list(sk_provider, |
} else { |
provider_whitelist, 0) != 1) { |
if (realpath(sk_provider, canonical_provider) == NULL) { |
error("Refusing add key: provider %s not whitelisted", |
verbose("failed provider \"%.100s\": " |
sk_provider); |
"realpath: %s", sk_provider, |
|
strerror(errno)); |
|
free(sk_provider); |
|
goto send; |
|
} |
free(sk_provider); |
free(sk_provider); |
goto send; |
sk_provider = xstrdup(canonical_provider); |
|
if (match_pattern_list(sk_provider, |
|
provider_whitelist, 0) != 1) { |
|
error("Refusing add key: " |
|
"provider %s not whitelisted", sk_provider); |
|
free(sk_provider); |
|
goto send; |
|
} |
} |
} |
} |
} |
if ((r = sshkey_shield_private(k)) != 0) { |
if ((r = sshkey_shield_private(k)) != 0) { |