diff options
author | jsing@openbsd.org <jsing@openbsd.org> | 2015-06-15 18:44:22 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2015-06-17 22:12:05 +1000 |
commit | 596dbca82f3f567fb3d2d69af4b4e1d3ba1e6403 (patch) | |
tree | 83d8c183a65709172408da4b4473fe90ab9efca3 /regress/key-options.sh | |
parent | aff3e94c0d75d0d0fa84ea392b50ab04f8c57905 (diff) |
upstream commit
If AuthorizedPrincipalsCommand is specified, however
AuthorizedPrincipalsFile is not (or is set to "none"), authentication will
potentially fail due to key_cert_check_authority() failing to locate a
principal that matches the username, even though an authorized principal has
already been matched in the output of the subprocess. Fix this by using the
same logic to determine if pw->pw_name should be passed, as is used to
determine if a authorized principal must be matched earlier on.
ok djm@
Upstream-ID: 43b42302ec846b0ea68aceb40677245391b9409d
Diffstat (limited to 'regress/key-options.sh')
0 files changed, 0 insertions, 0 deletions