version 1.57, 2016/09/14 20:11:26 |
version 1.58, 2016/09/21 01:34:45 |
|
|
pid_t pid; |
pid_t pid; |
char *tmp, *username = NULL, *command = NULL, **av = NULL; |
char *tmp, *username = NULL, *command = NULL, **av = NULL; |
char *ca_fp = NULL, *key_fp = NULL, *catext = NULL, *keytext = NULL; |
char *ca_fp = NULL, *key_fp = NULL, *catext = NULL, *keytext = NULL; |
|
char serial_s[16]; |
void (*osigchld)(int); |
void (*osigchld)(int); |
|
|
if (options.authorized_principals_command == NULL) |
if (options.authorized_principals_command == NULL) |
|
|
error("%s: sshkey_to_base64 failed: %s", __func__, ssh_err(r)); |
error("%s: sshkey_to_base64 failed: %s", __func__, ssh_err(r)); |
goto out; |
goto out; |
} |
} |
|
snprintf(serial_s, sizeof(serial_s), "%llu", cert->serial); |
for (i = 1; i < ac; i++) { |
for (i = 1; i < ac; i++) { |
tmp = percent_expand(av[i], |
tmp = percent_expand(av[i], |
"u", user_pw->pw_name, |
"u", user_pw->pw_name, |
|
|
"F", ca_fp, |
"F", ca_fp, |
"k", keytext, |
"k", keytext, |
"K", catext, |
"K", catext, |
|
"i", cert->key_id, |
|
"s", serial_s, |
(char *)NULL); |
(char *)NULL); |
if (tmp == NULL) |
if (tmp == NULL) |
fatal("%s: percent_expand failed", __func__); |
fatal("%s: percent_expand failed", __func__); |