diff options
-rw-r--r-- | auth2-pubkey.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/auth2-pubkey.c b/auth2-pubkey.c index 4e01b6055..05fa5c9f8 100644 --- a/auth2-pubkey.c +++ b/auth2-pubkey.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: auth2-pubkey.c,v 1.89 2019/06/14 03:39:59 djm Exp $ */ | 1 | /* $OpenBSD: auth2-pubkey.c,v 1.90 2019/06/21 03:19:59 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -450,12 +450,12 @@ match_principals_command(struct ssh *ssh, struct passwd *user_pw, | |||
450 | /* Turn the command into an argument vector */ | 450 | /* Turn the command into an argument vector */ |
451 | if (argv_split(options.authorized_principals_command, &ac, &av) != 0) { | 451 | if (argv_split(options.authorized_principals_command, &ac, &av) != 0) { |
452 | error("AuthorizedPrincipalsCommand \"%s\" contains " | 452 | error("AuthorizedPrincipalsCommand \"%s\" contains " |
453 | "invalid quotes", command); | 453 | "invalid quotes", options.authorized_principals_command); |
454 | goto out; | 454 | goto out; |
455 | } | 455 | } |
456 | if (ac == 0) { | 456 | if (ac == 0) { |
457 | error("AuthorizedPrincipalsCommand \"%s\" yielded no arguments", | 457 | error("AuthorizedPrincipalsCommand \"%s\" yielded no arguments", |
458 | command); | 458 | options.authorized_principals_command); |
459 | goto out; | 459 | goto out; |
460 | } | 460 | } |
461 | if ((ca_fp = sshkey_fingerprint(cert->signature_key, | 461 | if ((ca_fp = sshkey_fingerprint(cert->signature_key, |