upstream: allow 'ssh-keygen -Y find-principals' to match wildcard

principals in allowed_signers files; from Fabian Stelzer

OpenBSD-Commit-ID: 1e970b9c025b80717dddff5018fe5e6f470c5098
This commit is contained in:
djm@openbsd.org 2022-02-01 23:34:47 +00:00 committed by Damien Miller
parent 541667fe6d
commit 15b7199a1f

View File

@ -1,4 +1,4 @@
/* $OpenBSD: sshsig.c,v 1.27 2022/01/05 04:02:42 djm Exp $ */ /* $OpenBSD: sshsig.c,v 1.28 2022/02/01 23:34:47 djm Exp $ */
/* /*
* Copyright (c) 2019 Google LLC * Copyright (c) 2019 Google LLC
* *
@ -820,6 +820,7 @@ cert_filter_principals(const char *path, u_long linenum,
const char *reason; const char *reason;
struct sshbuf *nprincipals; struct sshbuf *nprincipals;
int r = SSH_ERR_INTERNAL_ERROR, success = 0; int r = SSH_ERR_INTERNAL_ERROR, success = 0;
u_int i;
oprincipals = principals = *principalsp; oprincipals = principals = *principalsp;
*principalsp = NULL; *principalsp = NULL;
@ -830,22 +831,23 @@ cert_filter_principals(const char *path, u_long linenum,
} }
while ((cp = strsep(&principals, ",")) != NULL && *cp != '\0') { while ((cp = strsep(&principals, ",")) != NULL && *cp != '\0') {
if (strcspn(cp, "!?*") != strlen(cp)) { /* Check certificate validity */
debug("%s:%lu: principal \"%s\" not authorized: "
"contains wildcards", path, linenum, cp);
continue;
}
/* Check against principals list in certificate */
if ((r = sshkey_cert_check_authority(cert, 0, 1, 0, if ((r = sshkey_cert_check_authority(cert, 0, 1, 0,
verify_time, cp, &reason)) != 0) { verify_time, NULL, &reason)) != 0) {
debug("%s:%lu: principal \"%s\" not authorized: %s", debug("%s:%lu: principal \"%s\" not authorized: %s",
path, linenum, cp, reason); path, linenum, cp, reason);
continue; continue;
} }
if ((r = sshbuf_putf(nprincipals, "%s%s", /* Return all matching principal names from the cert */
sshbuf_len(nprincipals) != 0 ? "," : "", cp)) != 0) { for (i = 0; i < cert->cert->nprincipals; i++) {
error_f("buffer error"); if (match_pattern(cert->cert->principals[i], cp)) {
goto out; if ((r = sshbuf_putf(nprincipals, "%s%s",
sshbuf_len(nprincipals) != 0 ? "," : "",
cert->cert->principals[i])) != 0) {
error_f("buffer error");
goto out;
}
}
} }
} }
if (sshbuf_len(nprincipals) == 0) { if (sshbuf_len(nprincipals) == 0) {