summaryrefslogtreecommitdiff
path: root/auth2-pam.c
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2003-09-01 02:05:26 +0000
committerColin Watson <cjwatson@debian.org>2003-09-01 02:05:26 +0000
commit6d5a72bc1d98a42ba42f082e50a22e911c1d82d3 (patch)
tree1bf23174bdb6fc71e2846dda0eca195a418484e7 /auth2-pam.c
parent2ee26b431f98cf1dc0e4fb9809ad1e0c879b8c08 (diff)
parent58657d96514cd6f16d82add8d6f4adbb36765758 (diff)
Debian release 3.5p1-1.
Diffstat (limited to 'auth2-pam.c')
-rw-r--r--auth2-pam.c11
1 files changed, 5 insertions, 6 deletions
diff --git a/auth2-pam.c b/auth2-pam.c
index 99aedeaeb..a2daf96b7 100644
--- a/auth2-pam.c
+++ b/auth2-pam.c
@@ -1,5 +1,5 @@
1#include "includes.h" 1#include "includes.h"
2RCSID("$Id: auth2-pam.c,v 1.13 2002/06/26 13:58:00 djm Exp $"); 2RCSID("$Id: auth2-pam.c,v 1.14 2002/06/28 16:48:12 mouring Exp $");
3 3
4#ifdef USE_PAM 4#ifdef USE_PAM
5#include <security/pam_appl.h> 5#include <security/pam_appl.h>
@@ -116,11 +116,11 @@ do_pam_conversation_kbd_int(int num_msg, const struct pam_message **msg,
116 while(context_pam2.finished == 0) { 116 while(context_pam2.finished == 0) {
117 done = 1; 117 done = 1;
118 dispatch_run(DISPATCH_BLOCK, &done, appdata_ptr); 118 dispatch_run(DISPATCH_BLOCK, &done, appdata_ptr);
119 if(context_pam2.finished == 0) 119 if (context_pam2.finished == 0)
120 debug("extra packet during conversation"); 120 debug("extra packet during conversation");
121 } 121 }
122 122
123 if(context_pam2.num_received == context_pam2.num_expected) { 123 if (context_pam2.num_received == context_pam2.num_expected) {
124 *resp = context_pam2.responses; 124 *resp = context_pam2.responses;
125 return PAM_SUCCESS; 125 return PAM_SUCCESS;
126 } else 126 } else
@@ -143,8 +143,8 @@ input_userauth_info_response_pam(int type, u_int32_t seqnr, void *ctxt)
143 143
144 if (nresp != context_pam2.num_expected) 144 if (nresp != context_pam2.num_expected)
145 fatal("%s: Received incorrect number of responses " 145 fatal("%s: Received incorrect number of responses "
146 "(expected %u, received %u)", __func__, nresp, 146 "(expected %d, received %u)", __func__,
147 context_pam2.num_expected); 147 context_pam2.num_expected, nresp);
148 148
149 if (nresp > 100) 149 if (nresp > 100)
150 fatal("%s: too many replies", __func__); 150 fatal("%s: too many replies", __func__);
@@ -163,5 +163,4 @@ input_userauth_info_response_pam(int type, u_int32_t seqnr, void *ctxt)
163 163
164 packet_check_eom(); 164 packet_check_eom();
165} 165}
166
167#endif 166#endif