version 1.18, 2001/05/31 10:30:12 |
version 1.19, 2001/06/24 05:25:09 |
|
|
} |
} |
cp = "from=\""; |
cp = "from=\""; |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
int mname, mip; |
|
const char *remote_ip = get_remote_ipaddr(); |
const char *remote_ip = get_remote_ipaddr(); |
const char *remote_host = get_canonical_hostname( |
const char *remote_host = get_canonical_hostname( |
options.reverse_mapping_check); |
options.reverse_mapping_check); |
|
|
} |
} |
patterns[i] = 0; |
patterns[i] = 0; |
opts++; |
opts++; |
/* |
if (match_host_and_ip(remote_host, remote_ip, |
* Deny access if we get a negative |
patterns) != 1) { |
* match for the hostname or the ip |
xfree(patterns); |
* or if we get not match at all |
|
*/ |
|
mname = match_hostname(remote_host, patterns, |
|
strlen(patterns)); |
|
mip = match_hostname(remote_ip, patterns, |
|
strlen(patterns)); |
|
xfree(patterns); |
|
if (mname == -1 || mip == -1 || |
|
(mname != 1 && mip != 1)) { |
|
log("Authentication tried for %.100s with " |
log("Authentication tried for %.100s with " |
"correct key but not from a permitted " |
"correct key but not from a permitted " |
"host (host=%.200s, ip=%.200s).", |
"host (host=%.200s, ip=%.200s).", |
|
|
/* deny access */ |
/* deny access */ |
return 0; |
return 0; |
} |
} |
|
xfree(patterns); |
/* Host name matches. */ |
/* Host name matches. */ |
goto next_option; |
goto next_option; |
} |
} |