diff options
author | Colin Watson <cjwatson@debian.org> | 2014-02-09 16:10:02 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2014-02-09 23:43:41 +0000 |
commit | 490aadd108dc4bf7f4b5084e3336d88ec23f6b19 (patch) | |
tree | 97c83c038cbc8717a6a5fbdf59a3957df1b57412 /auth2-pubkey.c | |
parent | d77a569da1afcb73c6ddfc934092461eeb4edb53 (diff) |
Quieten logs when multiple from= restrictions are used
Bug-Debian: http://bugs.debian.org/630606
Forwarded: no
Last-Update: 2013-09-14
Patch-Name: auth-log-verbosity.patch
Diffstat (limited to 'auth2-pubkey.c')
-rw-r--r-- | auth2-pubkey.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/auth2-pubkey.c b/auth2-pubkey.c index 2b3ecb104..4d87f4867 100644 --- a/auth2-pubkey.c +++ b/auth2-pubkey.c | |||
@@ -257,6 +257,7 @@ match_principals_file(char *file, struct passwd *pw, struct KeyCert *cert) | |||
257 | restore_uid(); | 257 | restore_uid(); |
258 | return 0; | 258 | return 0; |
259 | } | 259 | } |
260 | auth_start_parse_options(); | ||
260 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { | 261 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { |
261 | /* Skip leading whitespace. */ | 262 | /* Skip leading whitespace. */ |
262 | for (cp = line; *cp == ' ' || *cp == '\t'; cp++) | 263 | for (cp = line; *cp == ' ' || *cp == '\t'; cp++) |
@@ -318,6 +319,7 @@ check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw) | |||
318 | found_key = 0; | 319 | found_key = 0; |
319 | 320 | ||
320 | found = NULL; | 321 | found = NULL; |
322 | auth_start_parse_options(); | ||
321 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { | 323 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { |
322 | char *cp, *key_options = NULL; | 324 | char *cp, *key_options = NULL; |
323 | if (found != NULL) | 325 | if (found != NULL) |
@@ -453,6 +455,7 @@ user_cert_trusted_ca(struct passwd *pw, Key *key) | |||
453 | if (key_cert_check_authority(key, 0, 1, | 455 | if (key_cert_check_authority(key, 0, 1, |
454 | principals_file == NULL ? pw->pw_name : NULL, &reason) != 0) | 456 | principals_file == NULL ? pw->pw_name : NULL, &reason) != 0) |
455 | goto fail_reason; | 457 | goto fail_reason; |
458 | auth_start_parse_options(); | ||
456 | if (auth_cert_options(key, pw) != 0) | 459 | if (auth_cert_options(key, pw) != 0) |
457 | goto out; | 460 | goto out; |
458 | 461 | ||