summaryrefslogtreecommitdiff
path: root/auth2.c
diff options
context:
space:
mode:
Diffstat (limited to 'auth2.c')
-rw-r--r--auth2.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/auth2.c b/auth2.c
index 1177efa73..b98309576 100644
--- a/auth2.c
+++ b/auth2.c
@@ -23,7 +23,7 @@
23 */ 23 */
24 24
25#include "includes.h" 25#include "includes.h"
26RCSID("$OpenBSD: auth2.c,v 1.104 2003/11/04 08:54:09 djm Exp $"); 26RCSID("$OpenBSD: auth2.c,v 1.107 2004/07/28 09:40:29 markus Exp $");
27 27
28#include "ssh2.h" 28#include "ssh2.h"
29#include "xmalloc.h" 29#include "xmalloc.h"
@@ -159,14 +159,14 @@ input_userauth_request(int type, u_int32_t seq, void *ctxt)
159 PRIVSEP(start_pam(authctxt)); 159 PRIVSEP(start_pam(authctxt));
160#endif 160#endif
161 } else { 161 } else {
162 logit("input_userauth_request: illegal user %s", user); 162 logit("input_userauth_request: invalid user %s", user);
163 authctxt->pw = fakepw(); 163 authctxt->pw = fakepw();
164#ifdef USE_PAM 164#ifdef USE_PAM
165 if (options.use_pam) 165 if (options.use_pam)
166 PRIVSEP(start_pam(authctxt)); 166 PRIVSEP(start_pam(authctxt));
167#endif 167#endif
168 } 168 }
169 setproctitle("%s%s", authctxt->pw ? user : "unknown", 169 setproctitle("%s%s", authctxt->valid ? user : "unknown",
170 use_privsep ? " [net]" : ""); 170 use_privsep ? " [net]" : "");
171 authctxt->service = xstrdup(service); 171 authctxt->service = xstrdup(service);
172 authctxt->style = style ? xstrdup(style) : NULL; 172 authctxt->style = style ? xstrdup(style) : NULL;
@@ -243,7 +243,7 @@ userauth_finish(Authctxt *authctxt, int authenticated, char *method)
243 /* now we can break out */ 243 /* now we can break out */
244 authctxt->success = 1; 244 authctxt->success = 1;
245 } else { 245 } else {
246 if (authctxt->failures++ > AUTH_FAIL_MAX) 246 if (authctxt->failures++ > options.max_authtries)
247 packet_disconnect(AUTH_FAIL_MSG, authctxt->user); 247 packet_disconnect(AUTH_FAIL_MSG, authctxt->user);
248 methods = authmethods_get(); 248 methods = authmethods_get();
249 packet_start(SSH2_MSG_USERAUTH_FAILURE); 249 packet_start(SSH2_MSG_USERAUTH_FAILURE);