version 1.55.2.1, 2004/08/19 04:13:26 |
version 1.56, 2004/05/09 01:19:27 |
|
|
int type = 0; |
int type = 0; |
|
|
debug("Attempting authentication for %s%.100s.", |
debug("Attempting authentication for %s%.100s.", |
authctxt->valid ? "" : "invalid user ", authctxt->user); |
authctxt->valid ? "" : "illegal user ", authctxt->user); |
|
|
/* If the user has no password, accept authentication immediately. */ |
/* If the user has no password, accept authentication immediately. */ |
if (options.password_authentication && |
if (options.password_authentication && |
|
|
if (authenticated) |
if (authenticated) |
return; |
return; |
|
|
if (authctxt->failures++ > options.max_authtries) |
if (authctxt->failures++ > AUTH_FAIL_MAX) |
packet_disconnect(AUTH_FAIL_MSG, authctxt->user); |
packet_disconnect(AUTH_FAIL_MSG, authctxt->user); |
|
|
packet_start(SSH_SMSG_FAILURE); |
packet_start(SSH_SMSG_FAILURE); |
|
|
if ((authctxt->pw = PRIVSEP(getpwnamallow(user))) != NULL) |
if ((authctxt->pw = PRIVSEP(getpwnamallow(user))) != NULL) |
authctxt->valid = 1; |
authctxt->valid = 1; |
else { |
else { |
debug("do_authentication: invalid user %s", user); |
debug("do_authentication: illegal user %s", user); |
authctxt->pw = fakepw(); |
authctxt->pw = fakepw(); |
} |
} |
|
|
setproctitle("%s%s", authctxt->valid ? user : "unknown", |
setproctitle("%s%s", authctxt->pw ? user : "unknown", |
use_privsep ? " [net]" : ""); |
use_privsep ? " [net]" : ""); |
|
|
/* |
/* |