diff options
author | djm@openbsd.org <djm@openbsd.org> | 2016-09-21 01:34:45 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2016-09-21 11:41:22 +1000 |
commit | bfa9d969ab6235d4938ce069d4db7e5825c56a19 (patch) | |
tree | 5ff7ef621e0e6660f4eae3a61b133d07f3bd4f5b /auth2-pubkey.c | |
parent | 920585b826af1c639e4ed78b2eba01fd2337b127 (diff) |
upstream commit
add a way for principals command to get see key ID and serial
too
Upstream-ID: 0d30978bdcf7e8eaeee4eea1b030eb2eb1823fcb
Diffstat (limited to 'auth2-pubkey.c')
-rw-r--r-- | auth2-pubkey.c | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/auth2-pubkey.c b/auth2-pubkey.c index a08354c7e..cc5466613 100644 --- a/auth2-pubkey.c +++ b/auth2-pubkey.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: auth2-pubkey.c,v 1.57 2016/09/14 20:11:26 djm Exp $ */ | 1 | /* $OpenBSD: auth2-pubkey.c,v 1.58 2016/09/21 01:34:45 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -639,6 +639,7 @@ match_principals_command(struct passwd *user_pw, const struct sshkey *key) | |||
639 | pid_t pid; | 639 | pid_t pid; |
640 | char *tmp, *username = NULL, *command = NULL, **av = NULL; | 640 | char *tmp, *username = NULL, *command = NULL, **av = NULL; |
641 | char *ca_fp = NULL, *key_fp = NULL, *catext = NULL, *keytext = NULL; | 641 | char *ca_fp = NULL, *key_fp = NULL, *catext = NULL, *keytext = NULL; |
642 | char serial_s[16]; | ||
642 | void (*osigchld)(int); | 643 | void (*osigchld)(int); |
643 | 644 | ||
644 | if (options.authorized_principals_command == NULL) | 645 | if (options.authorized_principals_command == NULL) |
@@ -694,6 +695,7 @@ match_principals_command(struct passwd *user_pw, const struct sshkey *key) | |||
694 | error("%s: sshkey_to_base64 failed: %s", __func__, ssh_err(r)); | 695 | error("%s: sshkey_to_base64 failed: %s", __func__, ssh_err(r)); |
695 | goto out; | 696 | goto out; |
696 | } | 697 | } |
698 | snprintf(serial_s, sizeof(serial_s), "%llu", cert->serial); | ||
697 | for (i = 1; i < ac; i++) { | 699 | for (i = 1; i < ac; i++) { |
698 | tmp = percent_expand(av[i], | 700 | tmp = percent_expand(av[i], |
699 | "u", user_pw->pw_name, | 701 | "u", user_pw->pw_name, |
@@ -704,6 +706,8 @@ match_principals_command(struct passwd *user_pw, const struct sshkey *key) | |||
704 | "F", ca_fp, | 706 | "F", ca_fp, |
705 | "k", keytext, | 707 | "k", keytext, |
706 | "K", catext, | 708 | "K", catext, |
709 | "i", cert->key_id, | ||
710 | "s", serial_s, | ||
707 | (char *)NULL); | 711 | (char *)NULL); |
708 | if (tmp == NULL) | 712 | if (tmp == NULL) |
709 | fatal("%s: percent_expand failed", __func__); | 713 | fatal("%s: percent_expand failed", __func__); |