diff options
author | Damien Miller <djm@mindrot.org> | 2001-02-04 23:20:18 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2001-02-04 23:20:18 +1100 |
commit | 33804263583e82fb7e6e36477fe63ebd14f15ecb (patch) | |
tree | 90d891bedf231b49acdd91f456d58a4142070bd6 /auth2.c | |
parent | 45cb2937bc8a74c1e1f7da3b35ad4319d3033baf (diff) |
NB: big update - may break stuff. Please test!
- (djm) OpenBSD CVS sync:
- markus@cvs.openbsd.org 2001/02/03 03:08:38
[auth-options.c auth-rh-rsa.c auth-rhosts.c auth.c canohost.c]
[canohost.h servconf.c servconf.h session.c sshconnect1.c sshd.8]
[sshd_config]
make ReverseMappingCheck optional in sshd_config; ok djm@,dugsong@
- markus@cvs.openbsd.org 2001/02/03 03:19:51
[ssh.1 sshd.8 sshd_config]
Skey is now called ChallengeResponse
- markus@cvs.openbsd.org 2001/02/03 03:43:09
[sshd.8]
use no-pty option in .ssh/authorized_keys* if you need a 8-bit clean
channel. note from Erik.Anggard@cygate.se (pr/1659)
- stevesk@cvs.openbsd.org 2001/02/03 10:03:06
[ssh.1]
typos; ok markus@
- djm@cvs.openbsd.org 2001/02/04 04:11:56
[scp.1 sftp-server.c ssh.1 sshd.8 sftp-client.c sftp-client.h]
[sftp-common.c sftp-common.h sftp-int.c sftp-int.h sftp.1 sftp.c]
Basic interactive sftp client; ok theo@
- (djm) Update RPM specs for new sftp binary
- (djm) Update several bits for new optional reverse lookup stuff. I
think I got them all.
Diffstat (limited to 'auth2.c')
-rw-r--r-- | auth2.c | 13 |
1 files changed, 8 insertions, 5 deletions
@@ -310,7 +310,8 @@ userauth_reply(Authctxt *authctxt, int authenticated) | |||
310 | #ifdef WITH_AIXAUTHENTICATE | 310 | #ifdef WITH_AIXAUTHENTICATE |
311 | /* We don't have a pty yet, so just label the line as "ssh" */ | 311 | /* We don't have a pty yet, so just label the line as "ssh" */ |
312 | if (loginsuccess(authctxt->user?authctxt->user:"NOUSER", | 312 | if (loginsuccess(authctxt->user?authctxt->user:"NOUSER", |
313 | get_canonical_hostname(), "ssh", &aixloginmsg) < 0) | 313 | get_canonical_hostname(options.reverse_mapping_check), |
314 | "ssh", &aixloginmsg) < 0) | ||
314 | aixloginmsg = NULL; | 315 | aixloginmsg = NULL; |
315 | #endif /* WITH_AIXAUTHENTICATE */ | 316 | #endif /* WITH_AIXAUTHENTICATE */ |
316 | /* turn off userauth */ | 317 | /* turn off userauth */ |
@@ -354,8 +355,9 @@ userauth_none(Authctxt *authctxt) | |||
354 | return auth_pam_password(authctxt->pw, ""); | 355 | return auth_pam_password(authctxt->pw, ""); |
355 | #elif defined(HAVE_OSF_SIA) | 356 | #elif defined(HAVE_OSF_SIA) |
356 | return (sia_validate_user(NULL, saved_argc, saved_argv, | 357 | return (sia_validate_user(NULL, saved_argc, saved_argv, |
357 | get_canonical_hostname(), authctxt->user?authctxt->user:"NOUSER", | 358 | get_canonical_hostname(options.reverse_mapping_check), |
358 | NULL, 0, NULL, "") == SIASUCCESS); | 359 | authctxt->user?authctxt->user:"NOUSER", NULL, 0, |
360 | NULL, "") == SIASUCCESS); | ||
359 | #else /* !HAVE_OSF_SIA && !USE_PAM */ | 361 | #else /* !HAVE_OSF_SIA && !USE_PAM */ |
360 | return auth_password(authctxt->pw, ""); | 362 | return auth_password(authctxt->pw, ""); |
361 | #endif /* USE_PAM */ | 363 | #endif /* USE_PAM */ |
@@ -381,8 +383,9 @@ userauth_passwd(Authctxt *authctxt) | |||
381 | auth_pam_password(authctxt->pw, password) == 1) | 383 | auth_pam_password(authctxt->pw, password) == 1) |
382 | #elif defined(HAVE_OSF_SIA) | 384 | #elif defined(HAVE_OSF_SIA) |
383 | sia_validate_user(NULL, saved_argc, saved_argv, | 385 | sia_validate_user(NULL, saved_argc, saved_argv, |
384 | get_canonical_hostname(), authctxt->user?authctxt->user:"NOUSER", | 386 | get_canonical_hostname(options.reverse_mapping_check), |
385 | NULL, 0, NULL, password) == SIASUCCESS) | 387 | authctxt->user?authctxt->user:"NOUSER", NULL, 0, NULL, |
388 | password) == SIASUCCESS) | ||
386 | #else /* !USE_PAM && !HAVE_OSF_SIA */ | 389 | #else /* !USE_PAM && !HAVE_OSF_SIA */ |
387 | auth_password(authctxt->pw, password) == 1) | 390 | auth_password(authctxt->pw, password) == 1) |
388 | #endif /* USE_PAM */ | 391 | #endif /* USE_PAM */ |