diff options
author | Colin Watson <cjwatson@debian.org> | 2014-02-09 16:10:02 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2017-03-29 01:39:47 +0100 |
commit | e08f96cf1105a3ee9a23de7102d593443e031e0c (patch) | |
tree | 9c93015f3103621c06f793f2b35e040c08355fd4 /auth2-pubkey.c | |
parent | 1e06dfb99d3a59ef0b0a804ed1c2a590b3fab71c (diff) |
Quieten logs when multiple from= restrictions are used
Bug-Debian: http://bugs.debian.org/630606
Forwarded: no
Last-Update: 2013-09-14
Patch-Name: auth-log-verbosity.patch
Diffstat (limited to 'auth2-pubkey.c')
-rw-r--r-- | auth2-pubkey.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/auth2-pubkey.c b/auth2-pubkey.c index 3e5706f4d..6dc5076ef 100644 --- a/auth2-pubkey.c +++ b/auth2-pubkey.c | |||
@@ -566,6 +566,7 @@ process_principals(FILE *f, char *file, struct passwd *pw, | |||
566 | u_long linenum = 0; | 566 | u_long linenum = 0; |
567 | u_int i, found_principal = 0; | 567 | u_int i, found_principal = 0; |
568 | 568 | ||
569 | auth_start_parse_options(); | ||
569 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { | 570 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { |
570 | /* Always consume entire input */ | 571 | /* Always consume entire input */ |
571 | if (found_principal) | 572 | if (found_principal) |
@@ -771,6 +772,7 @@ check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw) | |||
771 | found_key = 0; | 772 | found_key = 0; |
772 | 773 | ||
773 | found = NULL; | 774 | found = NULL; |
775 | auth_start_parse_options(); | ||
774 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { | 776 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { |
775 | char *cp, *key_options = NULL, *fp = NULL; | 777 | char *cp, *key_options = NULL, *fp = NULL; |
776 | const char *reason = NULL; | 778 | const char *reason = NULL; |
@@ -921,6 +923,7 @@ user_cert_trusted_ca(struct passwd *pw, Key *key) | |||
921 | if (key_cert_check_authority(key, 0, 1, | 923 | if (key_cert_check_authority(key, 0, 1, |
922 | use_authorized_principals ? NULL : pw->pw_name, &reason) != 0) | 924 | use_authorized_principals ? NULL : pw->pw_name, &reason) != 0) |
923 | goto fail_reason; | 925 | goto fail_reason; |
926 | auth_start_parse_options(); | ||
924 | if (auth_cert_options(key, pw, &reason) != 0) | 927 | if (auth_cert_options(key, pw, &reason) != 0) |
925 | goto fail_reason; | 928 | goto fail_reason; |
926 | 929 | ||