81d24c0aa7
The content of this branch was automatically imported from Fedora ELN with the following as its source: https://src.fedoraproject.org/rpms/openssh#a048fcc3d0920b13b79be801efbae08388212c5f
21 lines
1.2 KiB
Diff
21 lines
1.2 KiB
Diff
diff --git a/pam_ssh_agent_auth-0.10.2/pam_user_authorized_keys.c b/pam_ssh_agent_auth-0.10.2/pam_user_authorized_keys.c
|
|
--- a/pam_ssh_agent_auth-0.10.2/pam_user_authorized_keys.c
|
|
+++ b/pam_ssh_agent_auth-0.10.2/pam_user_authorized_keys.c
|
|
@@ -158,11 +158,12 @@ parse_authorized_key_file(const char *user,
|
|
int
|
|
pam_user_key_allowed(const char *ruser, struct sshkey * key)
|
|
{
|
|
+ struct passwd *pw;
|
|
return
|
|
- pamsshagentauth_user_key_allowed2(getpwuid(authorized_keys_file_allowed_owner_uid),
|
|
- key, authorized_keys_file)
|
|
- || pamsshagentauth_user_key_allowed2(getpwuid(0), key,
|
|
- authorized_keys_file)
|
|
+ ( (pw = getpwuid(authorized_keys_file_allowed_owner_uid)) &&
|
|
+ pamsshagentauth_user_key_allowed2(pw, key, authorized_keys_file))
|
|
+ || ((pw = getpwuid(0)) &&
|
|
+ pamsshagentauth_user_key_allowed2(pw, key, authorized_keys_file))
|
|
|| pamsshagentauth_user_key_command_allowed2(authorized_keys_command,
|
|
authorized_keys_command_user,
|
|
getpwnam(ruser), key);
|