summaryrefslogtreecommitdiff
path: root/auth1.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2001-02-04 23:20:18 +1100
committerDamien Miller <djm@mindrot.org>2001-02-04 23:20:18 +1100
commit33804263583e82fb7e6e36477fe63ebd14f15ecb (patch)
tree90d891bedf231b49acdd91f456d58a4142070bd6 /auth1.c
parent45cb2937bc8a74c1e1f7da3b35ad4319d3033baf (diff)
NB: big update - may break stuff. Please test!
- (djm) OpenBSD CVS sync: - markus@cvs.openbsd.org 2001/02/03 03:08:38 [auth-options.c auth-rh-rsa.c auth-rhosts.c auth.c canohost.c] [canohost.h servconf.c servconf.h session.c sshconnect1.c sshd.8] [sshd_config] make ReverseMappingCheck optional in sshd_config; ok djm@,dugsong@ - markus@cvs.openbsd.org 2001/02/03 03:19:51 [ssh.1 sshd.8 sshd_config] Skey is now called ChallengeResponse - markus@cvs.openbsd.org 2001/02/03 03:43:09 [sshd.8] use no-pty option in .ssh/authorized_keys* if you need a 8-bit clean channel. note from Erik.Anggard@cygate.se (pr/1659) - stevesk@cvs.openbsd.org 2001/02/03 10:03:06 [ssh.1] typos; ok markus@ - djm@cvs.openbsd.org 2001/02/04 04:11:56 [scp.1 sftp-server.c ssh.1 sshd.8 sftp-client.c sftp-client.h] [sftp-common.c sftp-common.h sftp-int.c sftp-int.h sftp.1 sftp.c] Basic interactive sftp client; ok theo@ - (djm) Update RPM specs for new sftp binary - (djm) Update several bits for new optional reverse lookup stuff. I think I got them all.
Diffstat (limited to 'auth1.c')
-rw-r--r--auth1.c12
1 files changed, 8 insertions, 4 deletions
diff --git a/auth1.c b/auth1.c
index 6e9808e5e..1986b2d8d 100644
--- a/auth1.c
+++ b/auth1.c
@@ -266,8 +266,8 @@ do_authloop(Authctxt *authctxt)
266#elif defined(HAVE_OSF_SIA) 266#elif defined(HAVE_OSF_SIA)
267 /* Do SIA auth with password */ 267 /* Do SIA auth with password */
268 if (sia_validate_user(NULL, saved_argc, saved_argv, 268 if (sia_validate_user(NULL, saved_argc, saved_argv,
269 get_canonical_hostname(), pw->pw_name, NULL, 0, 269 get_canonical_hostname(options.reverse_mapping_check),
270 NULL, password) == SIASUCCESS) { 270 pw->pw_name, NULL, 0, NULL, password) == SIASUCCESS) {
271 authenticated = 1; 271 authenticated = 1;
272 } 272 }
273#else /* !USE_PAM && !HAVE_OSF_SIA */ 273#else /* !USE_PAM && !HAVE_OSF_SIA */
@@ -347,7 +347,9 @@ do_authloop(Authctxt *authctxt)
347 347
348 if (authctxt->failures++ > AUTH_FAIL_MAX) { 348 if (authctxt->failures++ > AUTH_FAIL_MAX) {
349#ifdef WITH_AIXAUTHENTICATE 349#ifdef WITH_AIXAUTHENTICATE
350 loginfailed(user,get_canonical_hostname(),"ssh"); 350 loginfailed(user,
351 get_canonical_hostname(options.reverse_mapping_check),
352 "ssh");
351#endif /* WITH_AIXAUTHENTICATE */ 353#endif /* WITH_AIXAUTHENTICATE */
352 packet_disconnect(AUTH_FAIL_MSG, authctxt->user); 354 packet_disconnect(AUTH_FAIL_MSG, authctxt->user);
353 } 355 }
@@ -433,7 +435,9 @@ do_authentication()
433 435
434#ifdef WITH_AIXAUTHENTICATE 436#ifdef WITH_AIXAUTHENTICATE
435 /* We don't have a pty yet, so just label the line as "ssh" */ 437 /* We don't have a pty yet, so just label the line as "ssh" */
436 if (loginsuccess(authctxt->user,get_canonical_hostname(),"ssh",&aixloginmsg) < 0) 438 if (loginsuccess(authctxt->user,
439 get_canonical_hostname(options.reverse_mapping_check),
440 "ssh", &aixloginmsg) < 0)
437 aixloginmsg = NULL; 441 aixloginmsg = NULL;
438#endif /* WITH_AIXAUTHENTICATE */ 442#endif /* WITH_AIXAUTHENTICATE */
439 443