version 1.513, 2020/01/23 10:24:29 |
version 1.514, 2020/01/25 00:03:36 |
|
|
struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; |
struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; |
int certificate_file_userprovided[SSH_MAX_CERTIFICATE_FILES]; |
int certificate_file_userprovided[SSH_MAX_CERTIFICATE_FILES]; |
#ifdef ENABLE_PKCS11 |
#ifdef ENABLE_PKCS11 |
struct sshkey **keys; |
struct sshkey **keys = NULL; |
|
char **comments = NULL; |
int nkeys; |
int nkeys; |
#endif /* PKCS11 */ |
#endif /* PKCS11 */ |
|
|
|
|
options.num_identity_files < SSH_MAX_IDENTITY_FILES && |
options.num_identity_files < SSH_MAX_IDENTITY_FILES && |
(pkcs11_init(!options.batch_mode) == 0) && |
(pkcs11_init(!options.batch_mode) == 0) && |
(nkeys = pkcs11_add_provider(options.pkcs11_provider, NULL, |
(nkeys = pkcs11_add_provider(options.pkcs11_provider, NULL, |
&keys)) > 0) { |
&keys, &comments)) > 0) { |
for (i = 0; i < nkeys; i++) { |
for (i = 0; i < nkeys; i++) { |
if (n_ids >= SSH_MAX_IDENTITY_FILES) { |
if (n_ids >= SSH_MAX_IDENTITY_FILES) { |
sshkey_free(keys[i]); |
sshkey_free(keys[i]); |
|
free(comments[i]); |
continue; |
continue; |
} |
} |
identity_keys[n_ids] = keys[i]; |
identity_keys[n_ids] = keys[i]; |
identity_files[n_ids] = |
identity_files[n_ids] = comments[i]; /* transferred */ |
xstrdup(options.pkcs11_provider); /* XXX */ |
|
n_ids++; |
n_ids++; |
} |
} |
free(keys); |
free(keys); |
|
free(comments); |
} |
} |
#endif /* ENABLE_PKCS11 */ |
#endif /* ENABLE_PKCS11 */ |
for (i = 0; i < options.num_identity_files; i++) { |
for (i = 0; i < options.num_identity_files; i++) { |