summaryrefslogtreecommitdiff
path: root/auth1.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2000-12-28 16:40:05 +0000
committerBen Lindstrom <mouring@eviladmin.org>2000-12-28 16:40:05 +0000
commit4dccfa5fb73853e6c9281beac2c42a31391acdc7 (patch)
tree2a64c6b1e096010f2b5fd45a08f9878cac5d400e /auth1.c
parent42717bf8fff94146edf43ea266113f1a54456c62 (diff)
- (bal) OpenBSD CVS Update
- markus@cvs.openbsd.org 2000/12/28 14:25:51 [auth.h auth2.c] count authentication failures only - markus@cvs.openbsd.org 2000/12/28 14:25:03 [sshconnect.c] fingerprint for MITM attacks, too. - markus@cvs.openbsd.org 2000/12/28 12:03:57 [sshd.8 sshd.c] document -D - markus@cvs.openbsd.org 2000/12/27 14:19:21 [serverloop.c] less chatty - markus@cvs.openbsd.org 2000/12/27 12:34 [auth1.c sshconnect2.c sshd.c] typo - markus@cvs.openbsd.org 2000/12/27 12:30:19 [readconf.c readconf.h ssh.1 sshconnect.c] new option: HostKeyAlias: allow the user to record the host key under a different name. This is useful for ssh tunneling over forwarded connections or if you run multiple sshd's on different ports on the same machine. - markus@cvs.openbsd.org 2000/12/27 11:51:53 [ssh.1 ssh.c] multiple -t force pty allocation, document ORIGINAL_COMMAND - markus@cvs.openbsd.org 2000/12/27 11:41:31 [sshd.8] update for ssh-2
Diffstat (limited to 'auth1.c')
-rw-r--r--auth1.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/auth1.c b/auth1.c
index 5c906b60b..26472e020 100644
--- a/auth1.c
+++ b/auth1.c
@@ -10,7 +10,7 @@
10 */ 10 */
11 11
12#include "includes.h" 12#include "includes.h"
13RCSID("$OpenBSD: auth1.c,v 1.8 2000/12/19 23:17:55 markus Exp $"); 13RCSID("$OpenBSD: auth1.c,v 1.9 2000/12/27 12:34:49 markus Exp $");
14 14
15#ifdef HAVE_OSF_SIA 15#ifdef HAVE_OSF_SIA
16# include <sia.h> 16# include <sia.h>
@@ -71,7 +71,7 @@ get_authname(int type)
71 71
72/* 72/*
73 * read packets and try to authenticate local user 'luser'. 73 * read packets and try to authenticate local user 'luser'.
74 * return if authentication is successfull. not that pw == NULL 74 * return if authentication is successful. not that pw == NULL
75 * if the user does not exists or is not allowed to login. 75 * if the user does not exists or is not allowed to login.
76 * each auth method has to 'fake' authentication for nonexisting 76 * each auth method has to 'fake' authentication for nonexisting
77 * users. 77 * users.
@@ -469,11 +469,11 @@ do_authentication()
469 } else { 469 } else {
470 /* Loop until the user has been authenticated or the 470 /* Loop until the user has been authenticated or the
471 connection is closed, do_authloop() returns only if 471 connection is closed, do_authloop() returns only if
472 authentication is successfull */ 472 authentication is successful */
473 do_authloop(pw, user); 473 do_authloop(pw, user);
474 } 474 }
475 if (pw == NULL) 475 if (pw == NULL)
476 fatal("internal error, authentication successfull for user '%.100s'", user); 476 fatal("internal error, authentication successful for user '%.100s'", user);
477 477
478 /* The user has been authenticated and accepted. */ 478 /* The user has been authenticated and accepted. */
479 packet_start(SSH_SMSG_SUCCESS); 479 packet_start(SSH_SMSG_SUCCESS);