auth2.c (faebc97a1cb4f0a36a39f0ba9c1b266e070c5f4f) | auth2.c (b2af61ec69826890d075ceb3e20e206be20d6fea) |
---|---|
1/* $OpenBSD: auth2.c,v 1.135 2015/01/19 20:07:45 markus Exp $ */ 2/* 3 * Copyright (c) 2000 Markus Friedl. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright --- 38 unchanged lines hidden (view full) --- 47#include "compat.h" 48#include "key.h" 49#include "hostfile.h" 50#include "auth.h" 51#include "dispatch.h" 52#include "pathnames.h" 53#include "buffer.h" 54#include "canohost.h" | 1/* $OpenBSD: auth2.c,v 1.135 2015/01/19 20:07:45 markus Exp $ */ 2/* 3 * Copyright (c) 2000 Markus Friedl. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright --- 38 unchanged lines hidden (view full) --- 47#include "compat.h" 48#include "key.h" 49#include "hostfile.h" 50#include "auth.h" 51#include "dispatch.h" 52#include "pathnames.h" 53#include "buffer.h" 54#include "canohost.h" |
55#include "blacklist_client.h" |
|
55 56#ifdef GSSAPI 57#include "ssh-gss.h" 58#endif 59#include "monitor_wrap.h" 60 61/* import */ 62extern ServerOptions options; --- 180 unchanged lines hidden (view full) --- 243 authctxt->pw = PRIVSEP(getpwnamallow(user)); 244 authctxt->user = xstrdup(user); 245 if (authctxt->pw && strcmp(service, "ssh-connection")==0) { 246 authctxt->valid = 1; 247 debug2("input_userauth_request: setting up authctxt for %s", user); 248 } else { 249 logit("input_userauth_request: invalid user %s", user); 250 authctxt->pw = fakepw(); | 56 57#ifdef GSSAPI 58#include "ssh-gss.h" 59#endif 60#include "monitor_wrap.h" 61 62/* import */ 63extern ServerOptions options; --- 180 unchanged lines hidden (view full) --- 244 authctxt->pw = PRIVSEP(getpwnamallow(user)); 245 authctxt->user = xstrdup(user); 246 if (authctxt->pw && strcmp(service, "ssh-connection")==0) { 247 authctxt->valid = 1; 248 debug2("input_userauth_request: setting up authctxt for %s", user); 249 } else { 250 logit("input_userauth_request: invalid user %s", user); 251 authctxt->pw = fakepw(); |
252 BLACKLIST_NOTIFY(BLACKLIST_AUTH_FAIL); |
|
251#ifdef SSH_AUDIT_EVENTS 252 PRIVSEP(audit_event(SSH_INVALID_USER)); 253#endif 254 } 255#ifdef USE_PAM 256 if (options.use_pam) 257 PRIVSEP(start_pam(authctxt)); 258#endif --- 391 unchanged lines hidden --- | 253#ifdef SSH_AUDIT_EVENTS 254 PRIVSEP(audit_event(SSH_INVALID_USER)); 255#endif 256 } 257#ifdef USE_PAM 258 if (options.use_pam) 259 PRIVSEP(start_pam(authctxt)); 260#endif --- 391 unchanged lines hidden --- |