diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2000-12-28 16:40:05 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2000-12-28 16:40:05 +0000 |
commit | 4dccfa5fb73853e6c9281beac2c42a31391acdc7 (patch) | |
tree | 2a64c6b1e096010f2b5fd45a08f9878cac5d400e /auth1.c | |
parent | 42717bf8fff94146edf43ea266113f1a54456c62 (diff) |
- (bal) OpenBSD CVS Update
- markus@cvs.openbsd.org 2000/12/28 14:25:51
[auth.h auth2.c]
count authentication failures only
- markus@cvs.openbsd.org 2000/12/28 14:25:03
[sshconnect.c]
fingerprint for MITM attacks, too.
- markus@cvs.openbsd.org 2000/12/28 12:03:57
[sshd.8 sshd.c]
document -D
- markus@cvs.openbsd.org 2000/12/27 14:19:21
[serverloop.c]
less chatty
- markus@cvs.openbsd.org 2000/12/27 12:34
[auth1.c sshconnect2.c sshd.c]
typo
- markus@cvs.openbsd.org 2000/12/27 12:30:19
[readconf.c readconf.h ssh.1 sshconnect.c]
new option: HostKeyAlias: allow the user to record the host key
under a different name. This is useful for ssh tunneling over
forwarded connections or if you run multiple sshd's on different
ports on the same machine.
- markus@cvs.openbsd.org 2000/12/27 11:51:53
[ssh.1 ssh.c]
multiple -t force pty allocation, document ORIGINAL_COMMAND
- markus@cvs.openbsd.org 2000/12/27 11:41:31
[sshd.8]
update for ssh-2
Diffstat (limited to 'auth1.c')
-rw-r--r-- | auth1.c | 8 |
1 files changed, 4 insertions, 4 deletions
@@ -10,7 +10,7 @@ | |||
10 | */ | 10 | */ |
11 | 11 | ||
12 | #include "includes.h" | 12 | #include "includes.h" |
13 | RCSID("$OpenBSD: auth1.c,v 1.8 2000/12/19 23:17:55 markus Exp $"); | 13 | RCSID("$OpenBSD: auth1.c,v 1.9 2000/12/27 12:34:49 markus Exp $"); |
14 | 14 | ||
15 | #ifdef HAVE_OSF_SIA | 15 | #ifdef HAVE_OSF_SIA |
16 | # include <sia.h> | 16 | # include <sia.h> |
@@ -71,7 +71,7 @@ get_authname(int type) | |||
71 | 71 | ||
72 | /* | 72 | /* |
73 | * read packets and try to authenticate local user 'luser'. | 73 | * read packets and try to authenticate local user 'luser'. |
74 | * return if authentication is successfull. not that pw == NULL | 74 | * return if authentication is successful. not that pw == NULL |
75 | * if the user does not exists or is not allowed to login. | 75 | * if the user does not exists or is not allowed to login. |
76 | * each auth method has to 'fake' authentication for nonexisting | 76 | * each auth method has to 'fake' authentication for nonexisting |
77 | * users. | 77 | * users. |
@@ -469,11 +469,11 @@ do_authentication() | |||
469 | } else { | 469 | } else { |
470 | /* Loop until the user has been authenticated or the | 470 | /* Loop until the user has been authenticated or the |
471 | connection is closed, do_authloop() returns only if | 471 | connection is closed, do_authloop() returns only if |
472 | authentication is successfull */ | 472 | authentication is successful */ |
473 | do_authloop(pw, user); | 473 | do_authloop(pw, user); |
474 | } | 474 | } |
475 | if (pw == NULL) | 475 | if (pw == NULL) |
476 | fatal("internal error, authentication successfull for user '%.100s'", user); | 476 | fatal("internal error, authentication successful for user '%.100s'", user); |
477 | 477 | ||
478 | /* The user has been authenticated and accepted. */ | 478 | /* The user has been authenticated and accepted. */ |
479 | packet_start(SSH_SMSG_SUCCESS); | 479 | packet_start(SSH_SMSG_SUCCESS); |