[openssh-commits] [openssh] 03/03: upstream: avoid spurious error message when loading certificates
git+noreply at mindrot.org
git+noreply at mindrot.org
Mon Sep 29 13:25:11 AEST 2025
This is an automated email from the git hooks/post-receive script.
djm pushed a commit to branch master
in repository openssh.
commit fda31e1e5179b4e70c27094ebb303ee47c11a5a7
Author: djm at openbsd.org <djm at openbsd.org>
AuthorDate: Mon Sep 29 03:17:54 2025 +0000
upstream: avoid spurious error message when loading certificates
only bz3869
OpenBSD-Commit-ID: e7848fec50d15cc142fed946aa8f79abef3c5be7
---
ssh-add.c | 39 ++++++++++++++++++++-------------------
1 file changed, 20 insertions(+), 19 deletions(-)
diff --git a/ssh-add.c b/ssh-add.c
index 67dd8797d..2d5bec89c 100644
--- a/ssh-add.c
+++ b/ssh-add.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssh-add.c,v 1.180 2025/09/25 07:00:43 djm Exp $ */
+/* $OpenBSD: ssh-add.c,v 1.181 2025/09/29 03:17:54 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo at cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo at cs.hut.fi>, Espoo, Finland
@@ -354,26 +354,27 @@ add_file(int agent_fd, const char *filename, int key_only, int cert_only,
skprovider = NULL;
}
- if (!cert_only &&
- (r = ssh_add_identity_constrained(agent_fd, private, comment,
- lifetime, confirm, skprovider,
- dest_constraints, ndest_constraints)) == 0) {
- ret = 0;
- if (!qflag) {
- fprintf(stderr, "Identity added: %s (%s)\n",
- filename, comment);
- if (lifetime != 0) {
- fprintf(stderr, "Lifetime set to %s\n",
- fmt_timeframe((time_t)lifetime));
- }
- if (confirm != 0) {
- fprintf(stderr, "The user must confirm "
- "each use of the key\n");
+ if (!cert_only) {
+ if ((r = ssh_add_identity_constrained(agent_fd, private,
+ comment, lifetime, confirm, skprovider,
+ dest_constraints, ndest_constraints)) == 0) {
+ ret = 0;
+ if (!qflag) {
+ fprintf(stderr, "Identity added: %s (%s)\n",
+ filename, comment);
+ if (lifetime != 0) {
+ fprintf(stderr, "Lifetime set to %s\n",
+ fmt_timeframe((time_t)lifetime));
+ }
+ if (confirm != 0) {
+ fprintf(stderr, "The user must confirm "
+ "each use of the key\n");
+ }
}
+ } else {
+ fprintf(stderr, "Could not add identity \"%s\": %s\n",
+ filename, ssh_err(r));
}
- } else {
- fprintf(stderr, "Could not add identity \"%s\": %s\n",
- filename, ssh_err(r));
}
/* Skip trying to load the cert if requested */
--
To stop receiving notification emails like this one, please contact
djm at mindrot.org.
More information about the openssh-commits
mailing list