aboutsummaryrefslogtreecommitdiff
path: root/ui
diff options
context:
space:
mode:
authorDaniel P. Berrangé <berrange@redhat.com>2024-09-11 13:17:04 +0100
committerDaniel P. Berrangé <berrange@redhat.com>2024-10-22 11:44:23 +0100
commit2b69564798f3cd43ab9bdf70a96d2373cb544a9a (patch)
tree9d623c7bf335395f64c540fbd047ca2520a8e99e /ui
parentc0a9c92bd5a9c410a2b981f4d88f5584b55c1dfd (diff)
downloadqemu-2b69564798f3cd43ab9bdf70a96d2373cb544a9a.zip
qemu-2b69564798f3cd43ab9bdf70a96d2373cb544a9a.tar.gz
qemu-2b69564798f3cd43ab9bdf70a96d2373cb544a9a.tar.bz2
ui/vnc: don't check for SSF after SASL authentication on UNIX sockets
Although we avoid requesting an SSF when querying SASL mechanisms for a UNIX socket client, we still mistakenly checked for availability of an SSF once the SASL auth process is complete. Reviewed-by: Marc-André Lureau <marcandre.lureau@redhat.com> Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
Diffstat (limited to 'ui')
-rw-r--r--ui/vnc-auth-sasl.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/ui/vnc-auth-sasl.c b/ui/vnc-auth-sasl.c
index 4351544..25f6b4b 100644
--- a/ui/vnc-auth-sasl.c
+++ b/ui/vnc-auth-sasl.c
@@ -628,7 +628,7 @@ void start_auth_sasl(VncState *vs)
goto authabort;
}
} else {
- vs->sasl.wantSSF = 1;
+ vs->sasl.wantSSF = !vnc_socket_is_unix(vs->sioc);
}
memset (&secprops, 0, sizeof secprops);