summaryrefslogtreecommitdiff
path: root/auth-passwd.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2003-06-03 10:25:48 +1000
committerDamien Miller <djm@mindrot.org>2003-06-03 10:25:48 +1000
commit3a961dc0d36c1f87788b707130f6d07709822d38 (patch)
tree57f3a729408e4cbe08fa7f9699de2e583e0b2ca0 /auth-passwd.c
parent35276253a60a3e57ec21b82b2e3c81e03c0206de (diff)
- (djm) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2003/06/02 09:17:34 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c] [canohost.c monitor.c servconf.c servconf.h session.c sshd_config] [sshd_config.5] deprecate VerifyReverseMapping since it's dangerous if combined with IP based access control as noted by Mike Harding; replace with a UseDNS option, UseDNS is on by default and includes the VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@ ok deraadt@, djm@ - (djm) Fix portable-specific uses of verify_reverse_mapping too
Diffstat (limited to 'auth-passwd.c')
-rw-r--r--auth-passwd.c16
1 files changed, 9 insertions, 7 deletions
diff --git a/auth-passwd.c b/auth-passwd.c
index b893165bf..9a94c373f 100644
--- a/auth-passwd.c
+++ b/auth-passwd.c
@@ -144,22 +144,24 @@ auth_password(Authctxt *authctxt, const char *password)
144 HANDLE hToken = cygwin_logon_user(pw, password); 144 HANDLE hToken = cygwin_logon_user(pw, password);
145 145
146 if (hToken == INVALID_HANDLE_VALUE) 146 if (hToken == INVALID_HANDLE_VALUE)
147 return 0; 147 return (0);
148 cygwin_set_impersonation_token(hToken); 148 cygwin_set_impersonation_token(hToken);
149 return 1; 149 return (1);
150 } 150 }
151# endif 151# endif
152# ifdef WITH_AIXAUTHENTICATE 152# ifdef WITH_AIXAUTHENTICATE
153 authsuccess = (authenticate(pw->pw_name,password,&reenter,&authmsg) == 0); 153 authsuccess = (authenticate(pw->pw_name,password,&reenter,&authmsg) == 0);
154 154
155 if (authsuccess) 155 if (authsuccess) {
156 /* We don't have a pty yet, so just label the line as "ssh" */ 156 /* We don't have a pty yet, so just label the line as "ssh" */
157 if (loginsuccess(authctxt->user, 157 if (loginsuccess(authctxt->user,
158 get_canonical_hostname(options.verify_reverse_mapping), 158 get_canonical_hostname(options.use_dns),
159 "ssh", &aixloginmsg) < 0) 159 "ssh", &aixloginmsg) < 0) {
160 aixloginmsg = NULL; 160 aixloginmsg = NULL;
161 }
162 }
161 163
162 return(authsuccess); 164 return (authsuccess);
163# endif 165# endif
164# ifdef KRB4 166# ifdef KRB4
165 if (options.kerberos_authentication == 1) { 167 if (options.kerberos_authentication == 1) {