diff options
author | Kevin Steves <stevesk@pobox.com> | 2002-04-01 18:04:35 +0000 |
---|---|---|
committer | Kevin Steves <stevesk@pobox.com> | 2002-04-01 18:04:35 +0000 |
commit | bd1901b7dc7ba80aae9aa3d6e6be3fb5e8aedb61 (patch) | |
tree | 488323f0030f922cfc71af8bbba15b335df8a17d /monitor.c | |
parent | c85496222b42d3c30fea50434efbd42c11361427 (diff) |
- (stevesk) [monitor.c] PAM should work again; will *not* work with
UsePrivilegeSeparation=yes.
Diffstat (limited to 'monitor.c')
-rw-r--r-- | monitor.c | 6 |
1 files changed, 6 insertions, 0 deletions
@@ -143,7 +143,9 @@ struct mon_table mon_dispatch_proto20[] = { | |||
143 | {MONITOR_REQ_SIGN, MON_ONCE, mm_answer_sign}, | 143 | {MONITOR_REQ_SIGN, MON_ONCE, mm_answer_sign}, |
144 | {MONITOR_REQ_PWNAM, MON_ONCE, mm_answer_pwnamallow}, | 144 | {MONITOR_REQ_PWNAM, MON_ONCE, mm_answer_pwnamallow}, |
145 | {MONITOR_REQ_AUTHSERV, MON_ONCE, mm_answer_authserv}, | 145 | {MONITOR_REQ_AUTHSERV, MON_ONCE, mm_answer_authserv}, |
146 | #if !defined(USE_PAM) | ||
146 | {MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword}, | 147 | {MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword}, |
148 | #endif | ||
147 | #ifdef BSD_AUTH | 149 | #ifdef BSD_AUTH |
148 | {MONITOR_REQ_BSDAUTHQUERY, MON_ISAUTH, mm_answer_bsdauthquery}, | 150 | {MONITOR_REQ_BSDAUTHQUERY, MON_ISAUTH, mm_answer_bsdauthquery}, |
149 | {MONITOR_REQ_BSDAUTHRESPOND, MON_AUTH,mm_answer_bsdauthrespond}, | 151 | {MONITOR_REQ_BSDAUTHRESPOND, MON_AUTH,mm_answer_bsdauthrespond}, |
@@ -170,7 +172,9 @@ struct mon_table mon_dispatch_proto15[] = { | |||
170 | {MONITOR_REQ_PWNAM, MON_ONCE, mm_answer_pwnamallow}, | 172 | {MONITOR_REQ_PWNAM, MON_ONCE, mm_answer_pwnamallow}, |
171 | {MONITOR_REQ_SESSKEY, MON_ONCE, mm_answer_sesskey}, | 173 | {MONITOR_REQ_SESSKEY, MON_ONCE, mm_answer_sesskey}, |
172 | {MONITOR_REQ_SESSID, MON_ONCE, mm_answer_sessid}, | 174 | {MONITOR_REQ_SESSID, MON_ONCE, mm_answer_sessid}, |
175 | #if !defined(USE_PAM) | ||
173 | {MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword}, | 176 | {MONITOR_REQ_AUTHPASSWORD, MON_AUTH, mm_answer_authpassword}, |
177 | #endif | ||
174 | {MONITOR_REQ_RSAKEYALLOWED, MON_ISAUTH, mm_answer_rsa_keyallowed}, | 178 | {MONITOR_REQ_RSAKEYALLOWED, MON_ISAUTH, mm_answer_rsa_keyallowed}, |
175 | {MONITOR_REQ_KEYALLOWED, MON_ISAUTH, mm_answer_keyallowed}, | 179 | {MONITOR_REQ_KEYALLOWED, MON_ISAUTH, mm_answer_keyallowed}, |
176 | {MONITOR_REQ_RSACHALLENGE, MON_ONCE, mm_answer_rsa_challenge}, | 180 | {MONITOR_REQ_RSACHALLENGE, MON_ONCE, mm_answer_rsa_challenge}, |
@@ -533,6 +537,7 @@ mm_answer_authserv(int socket, Buffer *m) | |||
533 | return (0); | 537 | return (0); |
534 | } | 538 | } |
535 | 539 | ||
540 | #if !defined(USE_PAM) | ||
536 | int | 541 | int |
537 | mm_answer_authpassword(int socket, Buffer *m) | 542 | mm_answer_authpassword(int socket, Buffer *m) |
538 | { | 543 | { |
@@ -561,6 +566,7 @@ mm_answer_authpassword(int socket, Buffer *m) | |||
561 | /* Causes monitor loop to terminate if authenticated */ | 566 | /* Causes monitor loop to terminate if authenticated */ |
562 | return (authenticated); | 567 | return (authenticated); |
563 | } | 568 | } |
569 | #endif | ||
564 | 570 | ||
565 | #ifdef BSD_AUTH | 571 | #ifdef BSD_AUTH |
566 | int | 572 | int |