version 1.93, 2020/08/27 01:07:09 |
version 1.94, 2020/10/18 11:32:01 |
|
|
int r, ret = -1, found; |
int r, ret = -1, found; |
|
|
if ((c = sshbuf_fromb(oblob)) == NULL) { |
if ((c = sshbuf_fromb(oblob)) == NULL) { |
error("%s: sshbuf_fromb failed", __func__); |
error_f("sshbuf_fromb failed"); |
goto out; |
goto out; |
} |
} |
|
|
|
|
data = NULL; |
data = NULL; |
if ((r = sshbuf_get_cstring(c, &name, NULL)) != 0 || |
if ((r = sshbuf_get_cstring(c, &name, NULL)) != 0 || |
(r = sshbuf_froms(c, &data)) != 0) { |
(r = sshbuf_froms(c, &data)) != 0) { |
error("Unable to parse certificate options: %s", |
error_r(r, "Unable to parse certificate options"); |
ssh_err(r)); |
|
goto out; |
goto out; |
} |
} |
debug3("found certificate option \"%.100s\" len %zu", |
debug3("found certificate option \"%.100s\" len %zu", |
|
|
} else if (strcmp(name, "force-command") == 0) { |
} else if (strcmp(name, "force-command") == 0) { |
if ((r = sshbuf_get_cstring(data, &command, |
if ((r = sshbuf_get_cstring(data, &command, |
NULL)) != 0) { |
NULL)) != 0) { |
error("Unable to parse \"%s\" " |
error_r(r, "Unable to parse \"%s\" " |
"section: %s", name, ssh_err(r)); |
"section", name); |
goto out; |
goto out; |
} |
} |
if (opts->force_command != NULL) { |
if (opts->force_command != NULL) { |
|
|
} else if (strcmp(name, "source-address") == 0) { |
} else if (strcmp(name, "source-address") == 0) { |
if ((r = sshbuf_get_cstring(data, &allowed, |
if ((r = sshbuf_get_cstring(data, &allowed, |
NULL)) != 0) { |
NULL)) != 0) { |
error("Unable to parse \"%s\" " |
error_r(r, "Unable to parse \"%s\" " |
"section: %s", name, ssh_err(r)); |
"section", name); |
goto out; |
goto out; |
} |
} |
if (opts->required_from_host_cert != NULL) { |
if (opts->required_from_host_cert != NULL) { |