summaryrefslogtreecommitdiff
path: root/auth2-pubkey.c
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2014-02-09 16:10:02 +0000
committerColin Watson <cjwatson@debian.org>2017-03-29 01:39:47 +0100
commite08f96cf1105a3ee9a23de7102d593443e031e0c (patch)
tree9c93015f3103621c06f793f2b35e040c08355fd4 /auth2-pubkey.c
parent1e06dfb99d3a59ef0b0a804ed1c2a590b3fab71c (diff)
Quieten logs when multiple from= restrictions are used
Bug-Debian: http://bugs.debian.org/630606 Forwarded: no Last-Update: 2013-09-14 Patch-Name: auth-log-verbosity.patch
Diffstat (limited to 'auth2-pubkey.c')
-rw-r--r--auth2-pubkey.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/auth2-pubkey.c b/auth2-pubkey.c
index 3e5706f4d..6dc5076ef 100644
--- a/auth2-pubkey.c
+++ b/auth2-pubkey.c
@@ -566,6 +566,7 @@ process_principals(FILE *f, char *file, struct passwd *pw,
566 u_long linenum = 0; 566 u_long linenum = 0;
567 u_int i, found_principal = 0; 567 u_int i, found_principal = 0;
568 568
569 auth_start_parse_options();
569 while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { 570 while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) {
570 /* Always consume entire input */ 571 /* Always consume entire input */
571 if (found_principal) 572 if (found_principal)
@@ -771,6 +772,7 @@ check_authkeys_file(FILE *f, char *file, Key* key, struct passwd *pw)
771 found_key = 0; 772 found_key = 0;
772 773
773 found = NULL; 774 found = NULL;
775 auth_start_parse_options();
774 while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { 776 while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) {
775 char *cp, *key_options = NULL, *fp = NULL; 777 char *cp, *key_options = NULL, *fp = NULL;
776 const char *reason = NULL; 778 const char *reason = NULL;
@@ -921,6 +923,7 @@ user_cert_trusted_ca(struct passwd *pw, Key *key)
921 if (key_cert_check_authority(key, 0, 1, 923 if (key_cert_check_authority(key, 0, 1,
922 use_authorized_principals ? NULL : pw->pw_name, &reason) != 0) 924 use_authorized_principals ? NULL : pw->pw_name, &reason) != 0)
923 goto fail_reason; 925 goto fail_reason;
926 auth_start_parse_options();
924 if (auth_cert_options(key, pw, &reason) != 0) 927 if (auth_cert_options(key, pw, &reason) != 0)
925 goto fail_reason; 928 goto fail_reason;
926 929