auth2.c (faebc97a1cb4f0a36a39f0ba9c1b266e070c5f4f) auth2.c (b2af61ec69826890d075ceb3e20e206be20d6fea)
1/* $OpenBSD: auth2.c,v 1.135 2015/01/19 20:07:45 markus Exp $ */
2/*
3 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright

--- 38 unchanged lines hidden (view full) ---

47#include "compat.h"
48#include "key.h"
49#include "hostfile.h"
50#include "auth.h"
51#include "dispatch.h"
52#include "pathnames.h"
53#include "buffer.h"
54#include "canohost.h"
1/* $OpenBSD: auth2.c,v 1.135 2015/01/19 20:07:45 markus Exp $ */
2/*
3 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright

--- 38 unchanged lines hidden (view full) ---

47#include "compat.h"
48#include "key.h"
49#include "hostfile.h"
50#include "auth.h"
51#include "dispatch.h"
52#include "pathnames.h"
53#include "buffer.h"
54#include "canohost.h"
55#include "blacklist_client.h"
55
56#ifdef GSSAPI
57#include "ssh-gss.h"
58#endif
59#include "monitor_wrap.h"
60
61/* import */
62extern ServerOptions options;

--- 180 unchanged lines hidden (view full) ---

243 authctxt->pw = PRIVSEP(getpwnamallow(user));
244 authctxt->user = xstrdup(user);
245 if (authctxt->pw && strcmp(service, "ssh-connection")==0) {
246 authctxt->valid = 1;
247 debug2("input_userauth_request: setting up authctxt for %s", user);
248 } else {
249 logit("input_userauth_request: invalid user %s", user);
250 authctxt->pw = fakepw();
56
57#ifdef GSSAPI
58#include "ssh-gss.h"
59#endif
60#include "monitor_wrap.h"
61
62/* import */
63extern ServerOptions options;

--- 180 unchanged lines hidden (view full) ---

244 authctxt->pw = PRIVSEP(getpwnamallow(user));
245 authctxt->user = xstrdup(user);
246 if (authctxt->pw && strcmp(service, "ssh-connection")==0) {
247 authctxt->valid = 1;
248 debug2("input_userauth_request: setting up authctxt for %s", user);
249 } else {
250 logit("input_userauth_request: invalid user %s", user);
251 authctxt->pw = fakepw();
252 BLACKLIST_NOTIFY(BLACKLIST_AUTH_FAIL);
251#ifdef SSH_AUDIT_EVENTS
252 PRIVSEP(audit_event(SSH_INVALID_USER));
253#endif
254 }
255#ifdef USE_PAM
256 if (options.use_pam)
257 PRIVSEP(start_pam(authctxt));
258#endif

--- 391 unchanged lines hidden ---
253#ifdef SSH_AUDIT_EVENTS
254 PRIVSEP(audit_event(SSH_INVALID_USER));
255#endif
256 }
257#ifdef USE_PAM
258 if (options.use_pam)
259 PRIVSEP(start_pam(authctxt));
260#endif

--- 391 unchanged lines hidden ---