You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
21 lines
1.2 KiB
21 lines
1.2 KiB
2 years ago
|
diff --git a/pam_ssh_agent_auth-0.10.2/pam_user_authorized_keys.c b/pam_ssh_agent_auth-0.10.2/pam_user_authorized_keys.c
|
||
|
--- a/pam_ssh_agent_auth-0.10.2/pam_user_authorized_keys.c
|
||
|
+++ b/pam_ssh_agent_auth-0.10.2/pam_user_authorized_keys.c
|
||
|
@@ -158,11 +158,12 @@ parse_authorized_key_file(const char *user,
|
||
|
int
|
||
|
pam_user_key_allowed(const char *ruser, struct sshkey * key)
|
||
|
{
|
||
|
+ struct passwd *pw;
|
||
|
return
|
||
|
- pamsshagentauth_user_key_allowed2(getpwuid(authorized_keys_file_allowed_owner_uid),
|
||
|
- key, authorized_keys_file)
|
||
|
- || pamsshagentauth_user_key_allowed2(getpwuid(0), key,
|
||
|
- authorized_keys_file)
|
||
|
+ ( (pw = getpwuid(authorized_keys_file_allowed_owner_uid)) &&
|
||
|
+ pamsshagentauth_user_key_allowed2(pw, key, authorized_keys_file))
|
||
|
+ || ((pw = getpwuid(0)) &&
|
||
|
+ pamsshagentauth_user_key_allowed2(pw, key, authorized_keys_file))
|
||
|
|| pamsshagentauth_user_key_command_allowed2(authorized_keys_command,
|
||
|
authorized_keys_command_user,
|
||
|
getpwnam(ruser), key);
|