mirror of
https://github.com/PowerShell/openssh-portable.git
synced 2025-07-31 01:35:11 +02:00
upstream: allow 'ssh-keygen -Y find-principals' to match wildcard
principals in allowed_signers files; from Fabian Stelzer OpenBSD-Commit-ID: 1e970b9c025b80717dddff5018fe5e6f470c5098
This commit is contained in:
parent
541667fe6d
commit
15b7199a1f
26
sshsig.c
26
sshsig.c
@ -1,4 +1,4 @@
|
|||||||
/* $OpenBSD: sshsig.c,v 1.27 2022/01/05 04:02:42 djm Exp $ */
|
/* $OpenBSD: sshsig.c,v 1.28 2022/02/01 23:34:47 djm Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2019 Google LLC
|
* Copyright (c) 2019 Google LLC
|
||||||
*
|
*
|
||||||
@ -820,6 +820,7 @@ cert_filter_principals(const char *path, u_long linenum,
|
|||||||
const char *reason;
|
const char *reason;
|
||||||
struct sshbuf *nprincipals;
|
struct sshbuf *nprincipals;
|
||||||
int r = SSH_ERR_INTERNAL_ERROR, success = 0;
|
int r = SSH_ERR_INTERNAL_ERROR, success = 0;
|
||||||
|
u_int i;
|
||||||
|
|
||||||
oprincipals = principals = *principalsp;
|
oprincipals = principals = *principalsp;
|
||||||
*principalsp = NULL;
|
*principalsp = NULL;
|
||||||
@ -830,22 +831,23 @@ cert_filter_principals(const char *path, u_long linenum,
|
|||||||
}
|
}
|
||||||
|
|
||||||
while ((cp = strsep(&principals, ",")) != NULL && *cp != '\0') {
|
while ((cp = strsep(&principals, ",")) != NULL && *cp != '\0') {
|
||||||
if (strcspn(cp, "!?*") != strlen(cp)) {
|
/* Check certificate validity */
|
||||||
debug("%s:%lu: principal \"%s\" not authorized: "
|
|
||||||
"contains wildcards", path, linenum, cp);
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
/* Check against principals list in certificate */
|
|
||||||
if ((r = sshkey_cert_check_authority(cert, 0, 1, 0,
|
if ((r = sshkey_cert_check_authority(cert, 0, 1, 0,
|
||||||
verify_time, cp, &reason)) != 0) {
|
verify_time, NULL, &reason)) != 0) {
|
||||||
debug("%s:%lu: principal \"%s\" not authorized: %s",
|
debug("%s:%lu: principal \"%s\" not authorized: %s",
|
||||||
path, linenum, cp, reason);
|
path, linenum, cp, reason);
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
if ((r = sshbuf_putf(nprincipals, "%s%s",
|
/* Return all matching principal names from the cert */
|
||||||
sshbuf_len(nprincipals) != 0 ? "," : "", cp)) != 0) {
|
for (i = 0; i < cert->cert->nprincipals; i++) {
|
||||||
error_f("buffer error");
|
if (match_pattern(cert->cert->principals[i], cp)) {
|
||||||
goto out;
|
if ((r = sshbuf_putf(nprincipals, "%s%s",
|
||||||
|
sshbuf_len(nprincipals) != 0 ? "," : "",
|
||||||
|
cert->cert->principals[i])) != 0) {
|
||||||
|
error_f("buffer error");
|
||||||
|
goto out;
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (sshbuf_len(nprincipals) == 0) {
|
if (sshbuf_len(nprincipals) == 0) {
|
||||||
|
Loading…
x
Reference in New Issue
Block a user