diff options
-rw-r--r-- | ChangeLog | 6 | ||||
-rw-r--r-- | auth2-pam.c | 11 |
2 files changed, 10 insertions, 7 deletions
@@ -1,3 +1,7 @@ | |||
1 | 20020629 | ||
2 | - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style | ||
3 | clean up while I'm near it. | ||
4 | |||
1 | 20020628 | 5 | 20020628 |
2 | - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented | 6 | - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented |
3 | options should contain default value. from solar. | 7 | options should contain default value. from solar. |
@@ -1197,4 +1201,4 @@ | |||
1197 | - (stevesk) entropy.c: typo in debug message | 1201 | - (stevesk) entropy.c: typo in debug message |
1198 | - (djm) ssh-keygen -i needs seeded RNG; report from markus@ | 1202 | - (djm) ssh-keygen -i needs seeded RNG; report from markus@ |
1199 | 1203 | ||
1200 | $Id: ChangeLog,v 1.2311 2002/06/28 00:37:33 mouring Exp $ | 1204 | $Id: ChangeLog,v 1.2312 2002/06/28 16:48:11 mouring Exp $ |
diff --git a/auth2-pam.c b/auth2-pam.c index 99aedeaeb..a2daf96b7 100644 --- a/auth2-pam.c +++ b/auth2-pam.c | |||
@@ -1,5 +1,5 @@ | |||
1 | #include "includes.h" | 1 | #include "includes.h" |
2 | RCSID("$Id: auth2-pam.c,v 1.13 2002/06/26 13:58:00 djm Exp $"); | 2 | RCSID("$Id: auth2-pam.c,v 1.14 2002/06/28 16:48:12 mouring Exp $"); |
3 | 3 | ||
4 | #ifdef USE_PAM | 4 | #ifdef USE_PAM |
5 | #include <security/pam_appl.h> | 5 | #include <security/pam_appl.h> |
@@ -116,11 +116,11 @@ do_pam_conversation_kbd_int(int num_msg, const struct pam_message **msg, | |||
116 | while(context_pam2.finished == 0) { | 116 | while(context_pam2.finished == 0) { |
117 | done = 1; | 117 | done = 1; |
118 | dispatch_run(DISPATCH_BLOCK, &done, appdata_ptr); | 118 | dispatch_run(DISPATCH_BLOCK, &done, appdata_ptr); |
119 | if(context_pam2.finished == 0) | 119 | if (context_pam2.finished == 0) |
120 | debug("extra packet during conversation"); | 120 | debug("extra packet during conversation"); |
121 | } | 121 | } |
122 | 122 | ||
123 | if(context_pam2.num_received == context_pam2.num_expected) { | 123 | if (context_pam2.num_received == context_pam2.num_expected) { |
124 | *resp = context_pam2.responses; | 124 | *resp = context_pam2.responses; |
125 | return PAM_SUCCESS; | 125 | return PAM_SUCCESS; |
126 | } else | 126 | } else |
@@ -143,8 +143,8 @@ input_userauth_info_response_pam(int type, u_int32_t seqnr, void *ctxt) | |||
143 | 143 | ||
144 | if (nresp != context_pam2.num_expected) | 144 | if (nresp != context_pam2.num_expected) |
145 | fatal("%s: Received incorrect number of responses " | 145 | fatal("%s: Received incorrect number of responses " |
146 | "(expected %u, received %u)", __func__, nresp, | 146 | "(expected %d, received %u)", __func__, |
147 | context_pam2.num_expected); | 147 | context_pam2.num_expected, nresp); |
148 | 148 | ||
149 | if (nresp > 100) | 149 | if (nresp > 100) |
150 | fatal("%s: too many replies", __func__); | 150 | fatal("%s: too many replies", __func__); |
@@ -163,5 +163,4 @@ input_userauth_info_response_pam(int type, u_int32_t seqnr, void *ctxt) | |||
163 | 163 | ||
164 | packet_check_eom(); | 164 | packet_check_eom(); |
165 | } | 165 | } |
166 | |||
167 | #endif | 166 | #endif |