Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also .

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also .
base repository: openssh/openssh-portable
base: master
Choose a base ref
head repository: Feandil/openssh-portable
compare: master
Choose a head ref
Checking mergeability… Don’t worry, you can still create the pull request.
  • 17 commits
  • 16 files changed
  • 2 contributors

Commits on Jul 1, 2016

  1. Expose auth_details to pam via "SSH_USER_AUTH"

    Whenever the pam device is called, update the "SSH_USER_AUTH" PAM
    environment variable (Doing it outside this module exposes us to a NULL
    sshpam_handle).
    
    When a session will be later created, this variable, still part of the
    PAM environment variable will be copied to the child environment before
    being overriden by the latest value stored in auth_details. As a result,
    using the same variable name as the final one is key to prevent the
    final environment to be poluted with an outdated value.
    Feandil committed Jul 1, 2016
  2. privsep: Expose success auth methods

    Unfortunately, in the monitor thread, not the same amount of data is
    available when an key-base authentication succeed. It could be possible
    to extract the key information of all key that pass through
    mm_answer_keyverify, but linking it to the authentication success would
    be dangerous.
    
    Simply exposing the successul methods would already be a progress
    Feandil committed Jul 1, 2016
  3. Fix memory leak in pubkey_auth_info

    Bug introduced by c087cdf
    Feandil committed Jul 1, 2016
  4. Always clean last_details, even for authentication failures

    last_details is supposed to be only filled on authentication success, but may
    be incorrectly filled in the future. This patch make sure that this field is
    cleaned even on authentication failures to make sure than even incorrect
    authentication modules cannot polute the SSH_USER_AUTH string for another
    module
    Feandil committed Jul 1, 2016