diff options
author | djm@openbsd.org <djm@openbsd.org> | 2021-07-23 03:37:52 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2021-07-23 14:07:19 +1000 |
commit | d0bb1ce731762c55acb95817df4d5fab526c7ecd (patch) | |
tree | d842850a20b4d61cd15e7ff9c9dc6474831797ca /sshkey.h | |
parent | 44142068dc7ef783d135e91ff954e754d2ed432e (diff) | |
download | openssh-git-d0bb1ce731762c55acb95817df4d5fab526c7ecd.tar.gz |
upstream: Let allowed signers files used by ssh-keygen(1)
signatures support key lifetimes, and allow the verification mode to specify
a signature time to check at. This is intended for use by git to support
signing objects using ssh keys. ok dtucker@
OpenBSD-Commit-ID: 3e2c67b7dcd94f0610194d1e8e4907829a40cf31
Diffstat (limited to 'sshkey.h')
-rw-r--r-- | sshkey.h | 4 |
1 files changed, 3 insertions, 1 deletions
@@ -1,4 +1,4 @@ -/* $OpenBSD: sshkey.h,v 1.49 2021/01/26 00:49:30 djm Exp $ */ +/* $OpenBSD: sshkey.h,v 1.50 2021/07/23 03:37:52 djm Exp $ */ /* * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. @@ -196,6 +196,8 @@ int sshkey_to_certified(struct sshkey *); int sshkey_drop_cert(struct sshkey *); int sshkey_cert_copy(const struct sshkey *, struct sshkey *); int sshkey_cert_check_authority(const struct sshkey *, int, int, int, + uint64_t, const char *, const char **); +int sshkey_cert_check_authority_now(const struct sshkey *, int, int, int, const char *, const char **); int sshkey_cert_check_host(const struct sshkey *, const char *, int , const char *, const char **); |