summaryrefslogtreecommitdiff
path: root/auth-options.c
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2012-05-18 12:16:05 +0100
committerColin Watson <cjwatson@debian.org>2012-05-18 12:16:05 +0100
commitdabbdfacc9f6995b0739772a47704186dcf34ea5 (patch)
tree0a0b306a637bc85eb719261b74884f0b9573ec41 /auth-options.c
parent1e0d51b642cac9a6bfb719e6320905625aa5f943 (diff)
parentdd5ed53e20d218607260916a6b04d1c8c5b3d88f (diff)
* New upstream release (http://www.openssh.org/txt/release-6.0).
- Fix IPQoS not being set on non-mapped v4-in-v6 addressed connections (closes: #643312, #650512). - Add a new privilege separation sandbox implementation for Linux's new seccomp sandbox, automatically enabled on platforms that support it. (Note: privilege separation sandboxing is still experimental.)
Diffstat (limited to 'auth-options.c')
-rw-r--r--auth-options.c18
1 files changed, 2 insertions, 16 deletions
diff --git a/auth-options.c b/auth-options.c
index 8d1ef0a18..146b3d174 100644
--- a/auth-options.c
+++ b/auth-options.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth-options.c,v 1.54 2010/12/24 21:41:48 djm Exp $ */ 1/* $OpenBSD: auth-options.c,v 1.56 2011/10/18 04:58:26 djm Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -355,7 +355,7 @@ auth_parse_options(struct passwd *pw, char *opts, char *file, u_long linenum)
355 goto bad_option; 355 goto bad_option;
356 } 356 }
357 host = cleanhostname(host); 357 host = cleanhostname(host);
358 if (p == NULL || (port = a2port(p)) <= 0) { 358 if (p == NULL || (port = permitopen_port(p)) < 0) {
359 debug("%.100s, line %lu: Bad permitopen port " 359 debug("%.100s, line %lu: Bad permitopen port "
360 "<%.100s>", file, linenum, p ? p : ""); 360 "<%.100s>", file, linenum, p ? p : "");
361 auth_debug_add("%.100s, line %lu: " 361 auth_debug_add("%.100s, line %lu: "
@@ -466,10 +466,6 @@ parse_option_list(u_char *optblob, size_t optblob_len, struct passwd *pw,
466 buffer_append(&data, data_blob, dlen); 466 buffer_append(&data, data_blob, dlen);
467 debug3("found certificate option \"%.100s\" len %u", 467 debug3("found certificate option \"%.100s\" len %u",
468 name, dlen); 468 name, dlen);
469 if (strlen(name) != nlen) {
470 error("Certificate constraint name contains \\0");
471 goto out;
472 }
473 found = 0; 469 found = 0;
474 if ((which & OPTIONS_EXTENSIONS) != 0) { 470 if ((which & OPTIONS_EXTENSIONS) != 0) {
475 if (strcmp(name, "permit-X11-forwarding") == 0) { 471 if (strcmp(name, "permit-X11-forwarding") == 0) {
@@ -499,11 +495,6 @@ parse_option_list(u_char *optblob, size_t optblob_len, struct passwd *pw,
499 "corrupt", name); 495 "corrupt", name);
500 goto out; 496 goto out;
501 } 497 }
502 if (strlen(command) != clen) {
503 error("force-command constraint "
504 "contains \\0");
505 goto out;
506 }
507 if (*cert_forced_command != NULL) { 498 if (*cert_forced_command != NULL) {
508 error("Certificate has multiple " 499 error("Certificate has multiple "
509 "force-command options"); 500 "force-command options");
@@ -520,11 +511,6 @@ parse_option_list(u_char *optblob, size_t optblob_len, struct passwd *pw,
520 "\"%s\" corrupt", name); 511 "\"%s\" corrupt", name);
521 goto out; 512 goto out;
522 } 513 }
523 if (strlen(allowed) != clen) {
524 error("source-address constraint "
525 "contains \\0");
526 goto out;
527 }
528 if ((*cert_source_address_done)++) { 514 if ((*cert_source_address_done)++) {
529 error("Certificate has multiple " 515 error("Certificate has multiple "
530 "source-address options"); 516 "source-address options");