summary refs log tree commit diff
path: root/pkgs/os-specific/linux/pam_ssh_agent_auth/multiple-key-files.patch
diff options
context:
space:
mode:
authorgithub-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>2020-12-21 18:23:33 +0000
committerGitHub <noreply@github.com>2020-12-21 18:23:33 +0000
commite1c2ee0555e0f2e01dcda2a682b39d5a06f71a6f (patch)
tree7e530784f8d027825116d585d7bc84a2ba901e50 /pkgs/os-specific/linux/pam_ssh_agent_auth/multiple-key-files.patch
parent21bb0f56c5ad09272aaeb5c311e36ce6076ce647 (diff)
parent85b7955180c6025f564ea05f02bd48dafc8b4c4c (diff)
downloadnixpkgs-e1c2ee0555e0f2e01dcda2a682b39d5a06f71a6f.tar
nixpkgs-e1c2ee0555e0f2e01dcda2a682b39d5a06f71a6f.tar.gz
nixpkgs-e1c2ee0555e0f2e01dcda2a682b39d5a06f71a6f.tar.bz2
nixpkgs-e1c2ee0555e0f2e01dcda2a682b39d5a06f71a6f.tar.lz
nixpkgs-e1c2ee0555e0f2e01dcda2a682b39d5a06f71a6f.tar.xz
nixpkgs-e1c2ee0555e0f2e01dcda2a682b39d5a06f71a6f.tar.zst
nixpkgs-e1c2ee0555e0f2e01dcda2a682b39d5a06f71a6f.zip
Merge staging-next into staging
Diffstat (limited to 'pkgs/os-specific/linux/pam_ssh_agent_auth/multiple-key-files.patch')
-rw-r--r--pkgs/os-specific/linux/pam_ssh_agent_auth/multiple-key-files.patch12
1 files changed, 9 insertions, 3 deletions
diff --git a/pkgs/os-specific/linux/pam_ssh_agent_auth/multiple-key-files.patch b/pkgs/os-specific/linux/pam_ssh_agent_auth/multiple-key-files.patch
index 190325251c9..71d8e08ecd0 100644
--- a/pkgs/os-specific/linux/pam_ssh_agent_auth/multiple-key-files.patch
+++ b/pkgs/os-specific/linux/pam_ssh_agent_auth/multiple-key-files.patch
@@ -87,21 +87,27 @@ diff -u pam_ssh_agent_auth-0.10.3-orig/pam_ssh_agent_auth.c pam_ssh_agent_auth-0
  
      /*
       * PAM_USER and PAM_RUSER do not necessarily have to get set by the calling application, and we may be unable to divine the latter.
-@@ -187,16 +184,17 @@
+@@ -184,5 +181,5 @@
       */
  
      if(user && strlen(ruser) > 0) {
 -        pamsshagentauth_verbose("Attempting authentication: `%s' as `%s' using %s", ruser, user, authorized_keys_file);
 +        pamsshagentauth_verbose("Attempting authentication: `%s' as `%s' using %s", ruser, user, authorized_keys_file_input);
  
+@@ -201,3 +197,3 @@
+                 retval = PAM_SUCCESS;
+-                pamsshagentauth_logit("Authenticated (sshd): `%s' as `%s' using %s", ruser, user, authorized_keys_file);
++                pamsshagentauth_logit("Authenticated (sshd): `%s' as `%s' using %s", ruser, user, authorized_keys_file_input);
+ 
+@@ -211,11 +208,12 @@
          /*
           * this pw_uid is used to validate the SSH_AUTH_SOCK, and so must be the uid of the ruser invoking the program, not the target-user
           */
 -        if(pamsshagentauth_find_authorized_keys(user, ruser, servicename)) { /* getpwnam(ruser)->pw_uid)) { */
--            pamsshagentauth_logit("Authenticated: `%s' as `%s' using %s", ruser, user, authorized_keys_file);
+-            pamsshagentauth_logit("Authenticated (agent): `%s' as `%s' using %s", ruser, user, authorized_keys_file);
 +        const char *key_file;
 +        if((key_file = pamsshagentauth_find_authorized_keys(user, ruser, servicename))) { /* getpwnam(ruser)->pw_uid)) { */
-+            pamsshagentauth_logit("Authenticated: `%s' as `%s' using %s", ruser, user, key_file);
++            pamsshagentauth_logit("Authenticated (agent): `%s' as `%s' using %s", ruser, user, key_file);
              retval = PAM_SUCCESS;
          } else {
 -            pamsshagentauth_logit("Failed Authentication: `%s' as `%s' using %s", ruser, user, authorized_keys_file);