restore_uid();
return 0;
}
+ auth_start_parse_options();
while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) {
/* Skip leading whitespace. */
for (cp = line; *cp == ' ' || *cp == '\t'; cp++)
found_key = 0;
found = key_new(key_is_cert(key) ? KEY_UNSPEC : key->type);
+ auth_start_parse_options();
+
while (read_keyfile_line(f, file, line, sizeof(line), &linenum) != -1) {
char *cp, *key_options = NULL;
if (key_cert_check_authority(key, 0, 1,
principals_file == NULL ? pw->pw_name : NULL, &reason) != 0)
goto fail_reason;
+ auth_start_parse_options();
if (auth_cert_options(key, pw) != 0)
goto out;
u_int success, i;
char *file;
- if (auth_key_is_revoked(key))
+ if (auth_key_is_revoked(key, 0))
return 0;
- if (key_is_cert(key) && auth_key_is_revoked(key->cert->signature_key))
+ if (key_is_cert(key) &&
+ auth_key_is_revoked(key->cert->signature_key, 0))
return 0;
success = user_cert_trusted_ca(pw, key);