Re: no mutual signature algorithm with RSA user certs client 7.8, server 7.4

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Thu, Oct 11, 2018 at 12:19 PM Damien Miller <djm@xxxxxxxxxxx> wrote:
> No, I think I figured it out :)

Thanks again for your help. I think there are still 2 more sets of
duplicated lines that can go. ie I think we can delete:

diff --git a/sshkey.c b/sshkey.c
index 21e61a2c..6555c5ef 100644
--- a/sshkey.c
+++ b/sshkey.c
@@ -124,10 +124,6 @@ static const struct keytype keytypes[] = {
            "rsa-sha2-512", KEY_RSA_CERT, 0, 1, 1 },
        { "ssh-dss-cert-v01@xxxxxxxxxxx", "DSA-CERT", NULL,
            KEY_DSA_CERT, 0, 1, 0 },
-       { "ssh-rsa-cert-v01@xxxxxxxxxxx", "RSA-CERT", NULL,
-           KEY_RSA_CERT, 0, 1, 0 },
-       { "ssh-dss-cert-v01@xxxxxxxxxxx", "DSA-CERT", NULL,
-           KEY_DSA_CERT, 0, 1, 0 },
 # ifdef OPENSSL_HAS_ECC
        { "ecdsa-sha2-nistp256-cert-v01@xxxxxxxxxxx", "ECDSA-CERT", NULL,
            KEY_ECDSA_CERT, NID_X9_62_prime256v1, 1, 0 },
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux