summaryrefslogtreecommitdiff
path: root/sshd.c
diff options
context:
space:
mode:
Diffstat (limited to 'sshd.c')
-rw-r--r--sshd.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/sshd.c b/sshd.c
index 5d8fa6dbe..e87810767 100644
--- a/sshd.c
+++ b/sshd.c
@@ -18,7 +18,7 @@ agent connections.
18*/ 18*/
19 19
20#include "includes.h" 20#include "includes.h"
21RCSID("$Id: sshd.c,v 1.27 1999/11/21 07:31:57 damien Exp $"); 21RCSID("$Id: sshd.c,v 1.28 1999/11/22 03:27:24 damien Exp $");
22 22
23#include "xmalloc.h" 23#include "xmalloc.h"
24#include "rsa.h" 24#include "rsa.h"
@@ -221,14 +221,14 @@ void pam_cleanup_proc(void *context)
221 if (pam_retval != PAM_SUCCESS) 221 if (pam_retval != PAM_SUCCESS)
222 { 222 {
223 log("Cannot close PAM session: %.200s", 223 log("Cannot close PAM session: %.200s",
224 pam_strerror((pam_handle_t *)pamh, pam_retval)); 224 PAM_STRERROR((pam_handle_t *)pamh, pam_retval));
225 } 225 }
226 226
227 pam_retval = pam_end((pam_handle_t *)pamh, pam_retval); 227 pam_retval = pam_end((pam_handle_t *)pamh, pam_retval);
228 if (pam_retval != PAM_SUCCESS) 228 if (pam_retval != PAM_SUCCESS)
229 { 229 {
230 log("Cannot release PAM authentication: %.200s", 230 log("Cannot release PAM authentication: %.200s",
231 pam_strerror((pam_handle_t *)pamh, pam_retval)); 231 PAM_STRERROR((pam_handle_t *)pamh, pam_retval));
232 } 232 }
233 } 233 }
234} 234}
@@ -244,7 +244,7 @@ void do_pam_account_and_session(char *username, char *remote_user,
244 pam_retval = pam_set_item((pam_handle_t *)pamh, PAM_RHOST, remote_host); 244 pam_retval = pam_set_item((pam_handle_t *)pamh, PAM_RHOST, remote_host);
245 if (pam_retval != PAM_SUCCESS) 245 if (pam_retval != PAM_SUCCESS)
246 { 246 {
247 log("PAM set rhost failed: %.200s", pam_strerror((pam_handle_t *)pamh, pam_retval)); 247 log("PAM set rhost failed: %.200s", PAM_STRERROR((pam_handle_t *)pamh, pam_retval));
248 do_fake_authloop(username); 248 do_fake_authloop(username);
249 } 249 }
250 } 250 }
@@ -255,7 +255,7 @@ void do_pam_account_and_session(char *username, char *remote_user,
255 pam_retval = pam_set_item((pam_handle_t *)pamh, PAM_RUSER, remote_user); 255 pam_retval = pam_set_item((pam_handle_t *)pamh, PAM_RUSER, remote_user);
256 if (pam_retval != PAM_SUCCESS) 256 if (pam_retval != PAM_SUCCESS)
257 { 257 {
258 log("PAM set ruser failed: %.200s", pam_strerror((pam_handle_t *)pamh, pam_retval)); 258 log("PAM set ruser failed: %.200s", PAM_STRERROR((pam_handle_t *)pamh, pam_retval));
259 do_fake_authloop(username); 259 do_fake_authloop(username);
260 } 260 }
261 } 261 }
@@ -263,14 +263,14 @@ void do_pam_account_and_session(char *username, char *remote_user,
263 pam_retval = pam_acct_mgmt((pam_handle_t *)pamh, 0); 263 pam_retval = pam_acct_mgmt((pam_handle_t *)pamh, 0);
264 if (pam_retval != PAM_SUCCESS) 264 if (pam_retval != PAM_SUCCESS)
265 { 265 {
266 log("PAM rejected by account configuration: %.200s", pam_strerror((pam_handle_t *)pamh, pam_retval)); 266 log("PAM rejected by account configuration: %.200s", PAM_STRERROR((pam_handle_t *)pamh, pam_retval));
267 do_fake_authloop(username); 267 do_fake_authloop(username);
268 } 268 }
269 269
270 pam_retval = pam_open_session((pam_handle_t *)pamh, 0); 270 pam_retval = pam_open_session((pam_handle_t *)pamh, 0);
271 if (pam_retval != PAM_SUCCESS) 271 if (pam_retval != PAM_SUCCESS)
272 { 272 {
273 log("PAM session setup failed: %.200s", pam_strerror((pam_handle_t *)pamh, pam_retval)); 273 log("PAM session setup failed: %.200s", PAM_STRERROR((pam_handle_t *)pamh, pam_retval));
274 do_fake_authloop(username); 274 do_fake_authloop(username);
275 } 275 }
276} 276}
@@ -1206,7 +1206,7 @@ do_authentication(char *user)
1206 1206
1207 pam_retval = pam_start("sshd", pw->pw_name, &conv, (pam_handle_t**)&pamh); 1207 pam_retval = pam_start("sshd", pw->pw_name, &conv, (pam_handle_t**)&pamh);
1208 if (pam_retval != PAM_SUCCESS) 1208 if (pam_retval != PAM_SUCCESS)
1209 fatal("PAM initialisation failed: %.200s", pam_strerror((pam_handle_t *)pamh, pam_retval)); 1209 fatal("PAM initialisation failed: %.200s", PAM_STRERROR((pam_handle_t *)pamh, pam_retval));
1210 1210
1211 fatal_add_cleanup(&pam_cleanup_proc, NULL); 1211 fatal_add_cleanup(&pam_cleanup_proc, NULL);
1212 } 1212 }
@@ -1456,7 +1456,7 @@ do_authloop(struct passwd *pw)
1456 } 1456 }
1457 1457
1458 log("PAM Password authentication for \"%.100s\" failed: %s", 1458 log("PAM Password authentication for \"%.100s\" failed: %s",
1459 pw->pw_name, pam_strerror((pam_handle_t *)pamh, pam_retval)); 1459 pw->pw_name, PAM_STRERROR((pam_handle_t *)pamh, pam_retval));
1460 break; 1460 break;
1461#else /* HAVE_LIBPAM */ 1461#else /* HAVE_LIBPAM */
1462 /* Try authentication with the password. */ 1462 /* Try authentication with the password. */