diff options
Diffstat (limited to 'sshd.c')
-rw-r--r-- | sshd.c | 18 |
1 files changed, 9 insertions, 9 deletions
@@ -18,7 +18,7 @@ agent connections. | |||
18 | */ | 18 | */ |
19 | 19 | ||
20 | #include "includes.h" | 20 | #include "includes.h" |
21 | RCSID("$Id: sshd.c,v 1.27 1999/11/21 07:31:57 damien Exp $"); | 21 | RCSID("$Id: sshd.c,v 1.28 1999/11/22 03:27:24 damien Exp $"); |
22 | 22 | ||
23 | #include "xmalloc.h" | 23 | #include "xmalloc.h" |
24 | #include "rsa.h" | 24 | #include "rsa.h" |
@@ -221,14 +221,14 @@ void pam_cleanup_proc(void *context) | |||
221 | if (pam_retval != PAM_SUCCESS) | 221 | if (pam_retval != PAM_SUCCESS) |
222 | { | 222 | { |
223 | log("Cannot close PAM session: %.200s", | 223 | log("Cannot close PAM session: %.200s", |
224 | pam_strerror((pam_handle_t *)pamh, pam_retval)); | 224 | PAM_STRERROR((pam_handle_t *)pamh, pam_retval)); |
225 | } | 225 | } |
226 | 226 | ||
227 | pam_retval = pam_end((pam_handle_t *)pamh, pam_retval); | 227 | pam_retval = pam_end((pam_handle_t *)pamh, pam_retval); |
228 | if (pam_retval != PAM_SUCCESS) | 228 | if (pam_retval != PAM_SUCCESS) |
229 | { | 229 | { |
230 | log("Cannot release PAM authentication: %.200s", | 230 | log("Cannot release PAM authentication: %.200s", |
231 | pam_strerror((pam_handle_t *)pamh, pam_retval)); | 231 | PAM_STRERROR((pam_handle_t *)pamh, pam_retval)); |
232 | } | 232 | } |
233 | } | 233 | } |
234 | } | 234 | } |
@@ -244,7 +244,7 @@ void do_pam_account_and_session(char *username, char *remote_user, | |||
244 | pam_retval = pam_set_item((pam_handle_t *)pamh, PAM_RHOST, remote_host); | 244 | pam_retval = pam_set_item((pam_handle_t *)pamh, PAM_RHOST, remote_host); |
245 | if (pam_retval != PAM_SUCCESS) | 245 | if (pam_retval != PAM_SUCCESS) |
246 | { | 246 | { |
247 | log("PAM set rhost failed: %.200s", pam_strerror((pam_handle_t *)pamh, pam_retval)); | 247 | log("PAM set rhost failed: %.200s", PAM_STRERROR((pam_handle_t *)pamh, pam_retval)); |
248 | do_fake_authloop(username); | 248 | do_fake_authloop(username); |
249 | } | 249 | } |
250 | } | 250 | } |
@@ -255,7 +255,7 @@ void do_pam_account_and_session(char *username, char *remote_user, | |||
255 | pam_retval = pam_set_item((pam_handle_t *)pamh, PAM_RUSER, remote_user); | 255 | pam_retval = pam_set_item((pam_handle_t *)pamh, PAM_RUSER, remote_user); |
256 | if (pam_retval != PAM_SUCCESS) | 256 | if (pam_retval != PAM_SUCCESS) |
257 | { | 257 | { |
258 | log("PAM set ruser failed: %.200s", pam_strerror((pam_handle_t *)pamh, pam_retval)); | 258 | log("PAM set ruser failed: %.200s", PAM_STRERROR((pam_handle_t *)pamh, pam_retval)); |
259 | do_fake_authloop(username); | 259 | do_fake_authloop(username); |
260 | } | 260 | } |
261 | } | 261 | } |
@@ -263,14 +263,14 @@ void do_pam_account_and_session(char *username, char *remote_user, | |||
263 | pam_retval = pam_acct_mgmt((pam_handle_t *)pamh, 0); | 263 | pam_retval = pam_acct_mgmt((pam_handle_t *)pamh, 0); |
264 | if (pam_retval != PAM_SUCCESS) | 264 | if (pam_retval != PAM_SUCCESS) |
265 | { | 265 | { |
266 | log("PAM rejected by account configuration: %.200s", pam_strerror((pam_handle_t *)pamh, pam_retval)); | 266 | log("PAM rejected by account configuration: %.200s", PAM_STRERROR((pam_handle_t *)pamh, pam_retval)); |
267 | do_fake_authloop(username); | 267 | do_fake_authloop(username); |
268 | } | 268 | } |
269 | 269 | ||
270 | pam_retval = pam_open_session((pam_handle_t *)pamh, 0); | 270 | pam_retval = pam_open_session((pam_handle_t *)pamh, 0); |
271 | if (pam_retval != PAM_SUCCESS) | 271 | if (pam_retval != PAM_SUCCESS) |
272 | { | 272 | { |
273 | log("PAM session setup failed: %.200s", pam_strerror((pam_handle_t *)pamh, pam_retval)); | 273 | log("PAM session setup failed: %.200s", PAM_STRERROR((pam_handle_t *)pamh, pam_retval)); |
274 | do_fake_authloop(username); | 274 | do_fake_authloop(username); |
275 | } | 275 | } |
276 | } | 276 | } |
@@ -1206,7 +1206,7 @@ do_authentication(char *user) | |||
1206 | 1206 | ||
1207 | pam_retval = pam_start("sshd", pw->pw_name, &conv, (pam_handle_t**)&pamh); | 1207 | pam_retval = pam_start("sshd", pw->pw_name, &conv, (pam_handle_t**)&pamh); |
1208 | if (pam_retval != PAM_SUCCESS) | 1208 | if (pam_retval != PAM_SUCCESS) |
1209 | fatal("PAM initialisation failed: %.200s", pam_strerror((pam_handle_t *)pamh, pam_retval)); | 1209 | fatal("PAM initialisation failed: %.200s", PAM_STRERROR((pam_handle_t *)pamh, pam_retval)); |
1210 | 1210 | ||
1211 | fatal_add_cleanup(&pam_cleanup_proc, NULL); | 1211 | fatal_add_cleanup(&pam_cleanup_proc, NULL); |
1212 | } | 1212 | } |
@@ -1456,7 +1456,7 @@ do_authloop(struct passwd *pw) | |||
1456 | } | 1456 | } |
1457 | 1457 | ||
1458 | log("PAM Password authentication for \"%.100s\" failed: %s", | 1458 | log("PAM Password authentication for \"%.100s\" failed: %s", |
1459 | pw->pw_name, pam_strerror((pam_handle_t *)pamh, pam_retval)); | 1459 | pw->pw_name, PAM_STRERROR((pam_handle_t *)pamh, pam_retval)); |
1460 | break; | 1460 | break; |
1461 | #else /* HAVE_LIBPAM */ | 1461 | #else /* HAVE_LIBPAM */ |
1462 | /* Try authentication with the password. */ | 1462 | /* Try authentication with the password. */ |