diff options
author | Colin Watson <cjwatson@debian.org> | 2014-02-09 16:10:02 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2014-03-20 00:32:29 +0000 |
commit | 283322f493ee7dc75511f6cf9e9b88e536de0874 (patch) | |
tree | 1031c9ad0f9b9a9a47862e4d8a4e57f3cdd86e03 /auth2-pubkey.c | |
parent | 912129ba92bea401d8cdeadc7aa7084fbf7625a1 (diff) |
Quieten logs when multiple from= restrictions are used
Bug-Debian: http://bugs.debian.org/630606
Forwarded: no
Last-Update: 2013-09-14
Patch-Name: auth-log-verbosity.patch
Diffstat (limited to 'auth2-pubkey.c')
-rw-r--r-- | auth2-pubkey.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/auth2-pubkey.c b/auth2-pubkey.c index 0fd27bb92..7c5692750 100644 --- a/auth2-pubkey.c +++ b/auth2-pubkey.c | |||
@@ -263,6 +263,7 @@ match_principals_file(char *file, struct passwd *pw, struct KeyCert *cert) | |||
263 | restore_uid(); | 263 | restore_uid(); |
264 | return 0; | 264 | return 0; |
265 | } | 265 | } |
266 | auth_start_parse_options(); | ||
266 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { | 267 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { |
267 | /* Skip leading whitespace. */ | 268 | /* Skip leading whitespace. */ |
268 | for (cp = line; *cp == ' ' || *cp == '\t'; cp++) | 269 | for (cp = line; *cp == ' ' || *cp == '\t'; cp++) |
@@ -324,6 +325,7 @@ check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw) | |||
324 | found_key = 0; | 325 | found_key = 0; |
325 | 326 | ||
326 | found = NULL; | 327 | found = NULL; |
328 | auth_start_parse_options(); | ||
327 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { | 329 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { |
328 | char *cp, *key_options = NULL; | 330 | char *cp, *key_options = NULL; |
329 | if (found != NULL) | 331 | if (found != NULL) |
@@ -459,6 +461,7 @@ user_cert_trusted_ca(struct passwd *pw, Key *key) | |||
459 | if (key_cert_check_authority(key, 0, 1, | 461 | if (key_cert_check_authority(key, 0, 1, |
460 | principals_file == NULL ? pw->pw_name : NULL, &reason) != 0) | 462 | principals_file == NULL ? pw->pw_name : NULL, &reason) != 0) |
461 | goto fail_reason; | 463 | goto fail_reason; |
464 | auth_start_parse_options(); | ||
462 | if (auth_cert_options(key, pw) != 0) | 465 | if (auth_cert_options(key, pw) != 0) |
463 | goto out; | 466 | goto out; |
464 | 467 | ||