summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2011-05-20 19:03:31 +1000
committerDamien Miller <djm@mindrot.org>2011-05-20 19:03:31 +1000
commit5d74e58e62df1e80c23ff8444ff22483cba1995a (patch)
treea24935b2d44262fc16cacbac072f28b067eea039
parent8f639fe722133495eebad594f2f9c886857a5ef8 (diff)
- djm@cvs.openbsd.org 2011/05/20 00:55:02
[servconf.c] the options TrustedUserCAKeys, RevokedKeysFile, AuthorizedKeysFile and AuthorizedPrincipalsFile were not being correctly applied in Match blocks, despite being overridable there; ok dtucker@
-rw-r--r--ChangeLog5
-rw-r--r--servconf.c11
2 files changed, 11 insertions, 5 deletions
diff --git a/ChangeLog b/ChangeLog
index 6a0cf4932..eb5136178 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -15,6 +15,11 @@
15 [key.c] 15 [key.c]
16 fatal() if asked to generate a legacy ECDSA cert (these don't exist) 16 fatal() if asked to generate a legacy ECDSA cert (these don't exist)
17 and fix the regress test that was trying to generate them :) 17 and fix the regress test that was trying to generate them :)
18 - djm@cvs.openbsd.org 2011/05/20 00:55:02
19 [servconf.c]
20 the options TrustedUserCAKeys, RevokedKeysFile, AuthorizedKeysFile
21 and AuthorizedPrincipalsFile were not being correctly applied in
22 Match blocks, despite being overridable there; ok dtucker@
18 23
1920110515 2420110515
20 - (djm) OpenBSD CVS Sync 25 - (djm) OpenBSD CVS Sync
diff --git a/servconf.c b/servconf.c
index f862fbfd8..ab134ee55 100644
--- a/servconf.c
+++ b/servconf.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: servconf.c,v 1.215 2011/05/11 04:47:06 djm Exp $ */ 1/* $OpenBSD: servconf.c,v 1.216 2011/05/20 00:55:02 djm Exp $ */
2/* 2/*
3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 3 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
4 * All rights reserved 4 * All rights reserved
@@ -1500,14 +1500,15 @@ copy_set_server_options(ServerOptions *dst, ServerOptions *src, int preauth)
1500 M_CP_INTOPT(ip_qos_bulk); 1500 M_CP_INTOPT(ip_qos_bulk);
1501 1501
1502 M_CP_STROPT(banner); 1502 M_CP_STROPT(banner);
1503 if (preauth)
1504 return;
1505 M_CP_STROPT(adm_forced_command);
1506 M_CP_STROPT(chroot_directory);
1507 M_CP_STROPT(trusted_user_ca_keys); 1503 M_CP_STROPT(trusted_user_ca_keys);
1508 M_CP_STROPT(revoked_keys_file); 1504 M_CP_STROPT(revoked_keys_file);
1509 M_CP_STROPT(authorized_keys_file); 1505 M_CP_STROPT(authorized_keys_file);
1510 M_CP_STROPT(authorized_principals_file); 1506 M_CP_STROPT(authorized_principals_file);
1507
1508 if (preauth)
1509 return;
1510 M_CP_STROPT(adm_forced_command);
1511 M_CP_STROPT(chroot_directory);
1511} 1512}
1512 1513
1513#undef M_CP_INTOPT 1514#undef M_CP_INTOPT