diff options
author | djm@openbsd.org <djm@openbsd.org> | 2019-01-19 21:41:18 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2019-01-20 09:45:17 +1100 |
commit | 3a00a921590d4c4b7e96df11bb10e6f9253ad45e (patch) | |
tree | 24186d71a6a77de7e303af919a4be64f2c7461bf /monitor.c | |
parent | 7ec5cb4d15ed2f2c5c9f5d00e6b361d136fc1e2d (diff) |
upstream: convert auth.c to new packet API
with & ok markus@
OpenBSD-Commit-ID: 7e10359f614ff522b52a3f05eec576257794e8e4
Diffstat (limited to 'monitor.c')
-rw-r--r-- | monitor.c | 8 |
1 files changed, 4 insertions, 4 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: monitor.c,v 1.189 2019/01/19 21:31:32 djm Exp $ */ | 1 | /* $OpenBSD: monitor.c,v 1.190 2019/01/19 21:41:18 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> | 3 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> |
4 | * Copyright 2002 Markus Friedl <markus@openbsd.org> | 4 | * Copyright 2002 Markus Friedl <markus@openbsd.org> |
@@ -338,7 +338,7 @@ monitor_child_preauth(Authctxt *_authctxt, struct monitor *pmonitor) | |||
338 | #endif | 338 | #endif |
339 | } | 339 | } |
340 | if (ent->flags & (MON_AUTHDECIDE|MON_ALOG)) { | 340 | if (ent->flags & (MON_AUTHDECIDE|MON_ALOG)) { |
341 | auth_log(authctxt, authenticated, partial, | 341 | auth_log(ssh, authenticated, partial, |
342 | auth_method, auth_submethod); | 342 | auth_method, auth_submethod); |
343 | if (!partial && !authenticated) | 343 | if (!partial && !authenticated) |
344 | authctxt->failures++; | 344 | authctxt->failures++; |
@@ -729,7 +729,7 @@ mm_answer_pwnamallow(int sock, struct sshbuf *m) | |||
729 | if ((r = sshbuf_get_cstring(m, &username, NULL)) != 0) | 729 | if ((r = sshbuf_get_cstring(m, &username, NULL)) != 0) |
730 | fatal("%s: buffer error: %s", __func__, ssh_err(r)); | 730 | fatal("%s: buffer error: %s", __func__, ssh_err(r)); |
731 | 731 | ||
732 | pwent = getpwnamallow(username); | 732 | pwent = getpwnamallow(ssh, username); |
733 | 733 | ||
734 | authctxt->user = xstrdup(username); | 734 | authctxt->user = xstrdup(username); |
735 | setproctitle("%s [priv]", pwent ? username : "unknown"); | 735 | setproctitle("%s [priv]", pwent ? username : "unknown"); |
@@ -1230,7 +1230,7 @@ mm_answer_keyallowed(int sock, struct sshbuf *m) | |||
1230 | hostbased_chost = chost; | 1230 | hostbased_chost = chost; |
1231 | } else { | 1231 | } else { |
1232 | /* Log failed attempt */ | 1232 | /* Log failed attempt */ |
1233 | auth_log(authctxt, 0, 0, auth_method, NULL); | 1233 | auth_log(ssh, 0, 0, auth_method, NULL); |
1234 | free(cuser); | 1234 | free(cuser); |
1235 | free(chost); | 1235 | free(chost); |
1236 | } | 1236 | } |