summaryrefslogtreecommitdiff
path: root/auth-bsdauth.c
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2005-01-20 11:05:34 +1100
committerDarren Tucker <dtucker@zip.com.au>2005-01-20 11:05:34 +1100
commit611649ebf093bf030f2dde18103dde8c1af9226c (patch)
tree123d4895161d5a2b0fe9b07b295ac310d3000bc6 /auth-bsdauth.c
parentea7c8127ce64879f81d6267897162a2fbf173124 (diff)
- dtucker@cvs.openbsd.org 2005/01/19 13:11:47
[auth-bsdauth.c auth2-chall.c] Have keyboard-interactive code call the drivers even for responses for invalid logins. This allows the drivers themselves to decide how to handle them and prevent leaking information where possible. Existing behaviour for bsdauth is maintained by checking authctxt->valid in the bsdauth driver. Note that any third-party kbdint drivers will now need to be able to handle responses for invalid logins. ok markus@
Diffstat (limited to 'auth-bsdauth.c')
-rw-r--r--auth-bsdauth.c5
1 files changed, 4 insertions, 1 deletions
diff --git a/auth-bsdauth.c b/auth-bsdauth.c
index 2ac27a7a2..920c977d8 100644
--- a/auth-bsdauth.c
+++ b/auth-bsdauth.c
@@ -22,7 +22,7 @@
22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 22 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23 */ 23 */
24#include "includes.h" 24#include "includes.h"
25RCSID("$OpenBSD: auth-bsdauth.c,v 1.5 2002/06/30 21:59:45 deraadt Exp $"); 25RCSID("$OpenBSD: auth-bsdauth.c,v 1.6 2005/01/19 13:11:47 dtucker Exp $");
26 26
27#ifdef BSD_AUTH 27#ifdef BSD_AUTH
28#include "xmalloc.h" 28#include "xmalloc.h"
@@ -83,6 +83,9 @@ bsdauth_respond(void *ctx, u_int numresponses, char **responses)
83 Authctxt *authctxt = ctx; 83 Authctxt *authctxt = ctx;
84 int authok; 84 int authok;
85 85
86 if (!authctxt->valid)
87 return -1;
88
86 if (authctxt->as == 0) 89 if (authctxt->as == 0)
87 error("bsdauth_respond: no bsd auth session"); 90 error("bsdauth_respond: no bsd auth session");
88 91