summaryrefslogtreecommitdiff
path: root/monitor.c
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2019-01-19 21:41:18 +0000
committerDamien Miller <djm@mindrot.org>2019-01-20 09:45:17 +1100
commit3a00a921590d4c4b7e96df11bb10e6f9253ad45e (patch)
tree24186d71a6a77de7e303af919a4be64f2c7461bf /monitor.c
parent7ec5cb4d15ed2f2c5c9f5d00e6b361d136fc1e2d (diff)
upstream: convert auth.c to new packet API
with & ok markus@ OpenBSD-Commit-ID: 7e10359f614ff522b52a3f05eec576257794e8e4
Diffstat (limited to 'monitor.c')
-rw-r--r--monitor.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/monitor.c b/monitor.c
index e15a5225d..39bf7705c 100644
--- a/monitor.c
+++ b/monitor.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: monitor.c,v 1.189 2019/01/19 21:31:32 djm Exp $ */ 1/* $OpenBSD: monitor.c,v 1.190 2019/01/19 21:41:18 djm Exp $ */
2/* 2/*
3 * Copyright 2002 Niels Provos <provos@citi.umich.edu> 3 * Copyright 2002 Niels Provos <provos@citi.umich.edu>
4 * Copyright 2002 Markus Friedl <markus@openbsd.org> 4 * Copyright 2002 Markus Friedl <markus@openbsd.org>
@@ -338,7 +338,7 @@ monitor_child_preauth(Authctxt *_authctxt, struct monitor *pmonitor)
338#endif 338#endif
339 } 339 }
340 if (ent->flags & (MON_AUTHDECIDE|MON_ALOG)) { 340 if (ent->flags & (MON_AUTHDECIDE|MON_ALOG)) {
341 auth_log(authctxt, authenticated, partial, 341 auth_log(ssh, authenticated, partial,
342 auth_method, auth_submethod); 342 auth_method, auth_submethod);
343 if (!partial && !authenticated) 343 if (!partial && !authenticated)
344 authctxt->failures++; 344 authctxt->failures++;
@@ -729,7 +729,7 @@ mm_answer_pwnamallow(int sock, struct sshbuf *m)
729 if ((r = sshbuf_get_cstring(m, &username, NULL)) != 0) 729 if ((r = sshbuf_get_cstring(m, &username, NULL)) != 0)
730 fatal("%s: buffer error: %s", __func__, ssh_err(r)); 730 fatal("%s: buffer error: %s", __func__, ssh_err(r));
731 731
732 pwent = getpwnamallow(username); 732 pwent = getpwnamallow(ssh, username);
733 733
734 authctxt->user = xstrdup(username); 734 authctxt->user = xstrdup(username);
735 setproctitle("%s [priv]", pwent ? username : "unknown"); 735 setproctitle("%s [priv]", pwent ? username : "unknown");
@@ -1230,7 +1230,7 @@ mm_answer_keyallowed(int sock, struct sshbuf *m)
1230 hostbased_chost = chost; 1230 hostbased_chost = chost;
1231 } else { 1231 } else {
1232 /* Log failed attempt */ 1232 /* Log failed attempt */
1233 auth_log(authctxt, 0, 0, auth_method, NULL); 1233 auth_log(ssh, 0, 0, auth_method, NULL);
1234 free(cuser); 1234 free(cuser);
1235 free(chost); 1235 free(chost);
1236 } 1236 }