summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog6
-rw-r--r--auth2-pam.c11
2 files changed, 10 insertions, 7 deletions
diff --git a/ChangeLog b/ChangeLog
index 0140549c1..36d14dd3d 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,7 @@
120020629
2 - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style
3 clean up while I'm near it.
4
120020628 520020628
2 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented 6 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
3 options should contain default value. from solar. 7 options should contain default value. from solar.
@@ -1197,4 +1201,4 @@
1197 - (stevesk) entropy.c: typo in debug message 1201 - (stevesk) entropy.c: typo in debug message
1198 - (djm) ssh-keygen -i needs seeded RNG; report from markus@ 1202 - (djm) ssh-keygen -i needs seeded RNG; report from markus@
1199 1203
1200$Id: ChangeLog,v 1.2311 2002/06/28 00:37:33 mouring Exp $ 1204$Id: ChangeLog,v 1.2312 2002/06/28 16:48:11 mouring Exp $
diff --git a/auth2-pam.c b/auth2-pam.c
index 99aedeaeb..a2daf96b7 100644
--- a/auth2-pam.c
+++ b/auth2-pam.c
@@ -1,5 +1,5 @@
1#include "includes.h" 1#include "includes.h"
2RCSID("$Id: auth2-pam.c,v 1.13 2002/06/26 13:58:00 djm Exp $"); 2RCSID("$Id: auth2-pam.c,v 1.14 2002/06/28 16:48:12 mouring Exp $");
3 3
4#ifdef USE_PAM 4#ifdef USE_PAM
5#include <security/pam_appl.h> 5#include <security/pam_appl.h>
@@ -116,11 +116,11 @@ do_pam_conversation_kbd_int(int num_msg, const struct pam_message **msg,
116 while(context_pam2.finished == 0) { 116 while(context_pam2.finished == 0) {
117 done = 1; 117 done = 1;
118 dispatch_run(DISPATCH_BLOCK, &done, appdata_ptr); 118 dispatch_run(DISPATCH_BLOCK, &done, appdata_ptr);
119 if(context_pam2.finished == 0) 119 if (context_pam2.finished == 0)
120 debug("extra packet during conversation"); 120 debug("extra packet during conversation");
121 } 121 }
122 122
123 if(context_pam2.num_received == context_pam2.num_expected) { 123 if (context_pam2.num_received == context_pam2.num_expected) {
124 *resp = context_pam2.responses; 124 *resp = context_pam2.responses;
125 return PAM_SUCCESS; 125 return PAM_SUCCESS;
126 } else 126 } else
@@ -143,8 +143,8 @@ input_userauth_info_response_pam(int type, u_int32_t seqnr, void *ctxt)
143 143
144 if (nresp != context_pam2.num_expected) 144 if (nresp != context_pam2.num_expected)
145 fatal("%s: Received incorrect number of responses " 145 fatal("%s: Received incorrect number of responses "
146 "(expected %u, received %u)", __func__, nresp, 146 "(expected %d, received %u)", __func__,
147 context_pam2.num_expected); 147 context_pam2.num_expected, nresp);
148 148
149 if (nresp > 100) 149 if (nresp > 100)
150 fatal("%s: too many replies", __func__); 150 fatal("%s: too many replies", __func__);
@@ -163,5 +163,4 @@ input_userauth_info_response_pam(int type, u_int32_t seqnr, void *ctxt)
163 163
164 packet_check_eom(); 164 packet_check_eom();
165} 165}
166
167#endif 166#endif