diff options
author | Colin Watson <cjwatson@debian.org> | 2014-02-09 16:10:02 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2017-10-04 13:54:48 +0100 |
commit | 50e9edb57b6808cbbf63fe3433febb103baac1e8 (patch) | |
tree | fc751a3326cc04f9392f2a08f48791e9f8a2cff5 /auth2-pubkey.c | |
parent | f500e89e2310f6308a998357d72d767e3b01553c (diff) |
Quieten logs when multiple from= restrictions are used
Bug-Debian: http://bugs.debian.org/630606
Forwarded: no
Last-Update: 2017-10-04
Patch-Name: auth-log-verbosity.patch
Diffstat (limited to 'auth2-pubkey.c')
-rw-r--r-- | auth2-pubkey.c | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/auth2-pubkey.c b/auth2-pubkey.c index 169839b01..43f880b6b 100644 --- a/auth2-pubkey.c +++ b/auth2-pubkey.c | |||
@@ -269,6 +269,7 @@ process_principals(FILE *f, const char *file, struct passwd *pw, | |||
269 | u_long linenum = 0; | 269 | u_long linenum = 0; |
270 | u_int i, found_principal = 0; | 270 | u_int i, found_principal = 0; |
271 | 271 | ||
272 | auth_start_parse_options(); | ||
272 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { | 273 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { |
273 | /* Always consume entire input */ | 274 | /* Always consume entire input */ |
274 | if (found_principal) | 275 | if (found_principal) |
@@ -471,6 +472,7 @@ check_authkeys_file(FILE *f, char *file, struct sshkey *key, struct passwd *pw) | |||
471 | u_long linenum = 0; | 472 | u_long linenum = 0; |
472 | struct sshkey *found = NULL; | 473 | struct sshkey *found = NULL; |
473 | 474 | ||
475 | auth_start_parse_options(); | ||
474 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { | 476 | while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) { |
475 | char *cp, *key_options = NULL, *fp = NULL; | 477 | char *cp, *key_options = NULL, *fp = NULL; |
476 | const char *reason = NULL; | 478 | const char *reason = NULL; |
@@ -624,6 +626,7 @@ user_cert_trusted_ca(struct passwd *pw, struct sshkey *key) | |||
624 | if (sshkey_cert_check_authority(key, 0, 1, | 626 | if (sshkey_cert_check_authority(key, 0, 1, |
625 | use_authorized_principals ? NULL : pw->pw_name, &reason) != 0) | 627 | use_authorized_principals ? NULL : pw->pw_name, &reason) != 0) |
626 | goto fail_reason; | 628 | goto fail_reason; |
629 | auth_start_parse_options(); | ||
627 | if (auth_cert_options(key, pw, &reason) != 0) | 630 | if (auth_cert_options(key, pw, &reason) != 0) |
628 | goto fail_reason; | 631 | goto fail_reason; |
629 | 632 | ||