summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/auth.c
diff options
context:
space:
mode:
authordjm <djm@openbsd.org>2015-05-01 04:17:51 +0000
committerdjm <djm@openbsd.org>2015-05-01 04:17:51 +0000
commit7a5ec2392c50f99cee78ac915c51dd61a5b83be1 (patch)
treea153c5e45acdfce2e8358e1c8c5fcbfe2033fd80 /usr.bin/ssh/auth.c
parentremove failed remote forwards established by muliplexing from the (diff)
downloadwireguard-openbsd-7a5ec2392c50f99cee78ac915c51dd61a5b83be1.tar.xz
wireguard-openbsd-7a5ec2392c50f99cee78ac915c51dd61a5b83be1.zip
make handling of AuthorizedPrincipalsFile=none more consistent
with other =none options; bz#2288 from Jakub Jelen; ok dtucker@
Diffstat (limited to 'usr.bin/ssh/auth.c')
-rw-r--r--usr.bin/ssh/auth.c5
1 files changed, 2 insertions, 3 deletions
diff --git a/usr.bin/ssh/auth.c b/usr.bin/ssh/auth.c
index 6eea5386946..cd5abbbc6a6 100644
--- a/usr.bin/ssh/auth.c
+++ b/usr.bin/ssh/auth.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: auth.c,v 1.110 2015/02/25 17:29:38 djm Exp $ */
+/* $OpenBSD: auth.c,v 1.111 2015/05/01 04:17:51 djm Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
*
@@ -309,8 +309,7 @@ expand_authorized_keys(const char *filename, struct passwd *pw)
char *
authorized_principals_file(struct passwd *pw)
{
- if (options.authorized_principals_file == NULL ||
- strcasecmp(options.authorized_principals_file, "none") == 0)
+ if (options.authorized_principals_file == NULL)
return NULL;
return expand_authorized_keys(options.authorized_principals_file, pw);
}