Blame SOURCES/0056-ssh-add-support-for-certificates-from-non-default-vi.patch

ecf709
From 61c2661fe7445531f53ef298a98a21ae0278397c Mon Sep 17 00:00:00 2001
ecf709
From: Sumit Bose <sbose@redhat.com>
ecf709
Date: Thu, 16 Mar 2017 13:00:48 +0100
ecf709
Subject: [PATCH 56/60] ssh: add support for certificates from non-default
ecf709
 views
ecf709
ecf709
Reviewed-by: Jakub Hrozek <jhrozek@redhat.com>
ecf709
---
ecf709
 src/responder/ssh/ssh_reply.c | 20 +++++++++++++++++++-
ecf709
 1 file changed, 19 insertions(+), 1 deletion(-)
ecf709
ecf709
diff --git a/src/responder/ssh/ssh_reply.c b/src/responder/ssh/ssh_reply.c
ecf709
index 7093e47253b5687bab387feed5299c2d0841d43c..1bb9d331868cc18488718c24fd82f32af780b525 100644
ecf709
--- a/src/responder/ssh/ssh_reply.c
ecf709
+++ b/src/responder/ssh/ssh_reply.c
ecf709
@@ -204,7 +204,7 @@ ssh_get_output_keys(TALLOC_CTX *mem_ctx,
ecf709
     uint32_t i = 0;
ecf709
     errno_t ret;
ecf709
 
ecf709
-    elements = talloc_zero_array(mem_ctx, struct ldb_message_element *, 5);
ecf709
+    elements = talloc_zero_array(mem_ctx, struct ldb_message_element *, 6);
ecf709
     if (elements == NULL) {
ecf709
         return ENOMEM;
ecf709
     }
ecf709
@@ -244,6 +244,24 @@ ssh_get_output_keys(TALLOC_CTX *mem_ctx,
ecf709
         }
ecf709
     }
ecf709
 
ecf709
+    if (DOM_HAS_VIEWS(domain)) {
ecf709
+        user_cert = ldb_msg_find_element(msg, OVERRIDE_PREFIX SYSDB_USER_CERT);
ecf709
+        if (user_cert != NULL) {
ecf709
+            ret = get_valid_certs_keys(elements, ssh_ctx, user_cert,
ecf709
+                                       &elements[i]);
ecf709
+            if (ret != EOK) {
ecf709
+                DEBUG(SSSDBG_OP_FAILURE, "get_valid_certs_keys failed.\n");
ecf709
+                goto done;
ecf709
+            }
ecf709
+
ecf709
+            if (elements[i] != NULL) {
ecf709
+                elements[i]->flags |= SSS_EL_FLAG_BIN_DATA;
ecf709
+                num_keys += elements[i]->num_values;
ecf709
+                i++;
ecf709
+            }
ecf709
+        }
ecf709
+    }
ecf709
+
ecf709
     *_elements = elements;
ecf709
     *_num_keys = num_keys;
ecf709
 
ecf709
-- 
ecf709
2.9.3
ecf709