version 1.26, 2002/07/30 17:03:55 |
version 1.26.4.2, 2004/03/04 18:18:15 |
|
|
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
const char *remote_ip = get_remote_ipaddr(); |
const char *remote_ip = get_remote_ipaddr(); |
const char *remote_host = get_canonical_hostname( |
const char *remote_host = get_canonical_hostname( |
options.verify_reverse_mapping); |
options.use_dns); |
char *patterns = xmalloc(strlen(opts) + 1); |
char *patterns = xmalloc(strlen(opts) + 1); |
|
|
opts += strlen(cp); |
opts += strlen(cp); |
|
|
if (match_host_and_ip(remote_host, remote_ip, |
if (match_host_and_ip(remote_host, remote_ip, |
patterns) != 1) { |
patterns) != 1) { |
xfree(patterns); |
xfree(patterns); |
log("Authentication tried for %.100s with " |
logit("Authentication tried for %.100s with " |
"correct key but not from a permitted " |
"correct key but not from a permitted " |
"host (host=%.200s, ip=%.200s).", |
"host (host=%.200s, ip=%.200s).", |
pw->pw_name, remote_host, remote_ip); |
pw->pw_name, remote_host, remote_ip); |
|
|
return 1; |
return 1; |
|
|
bad_option: |
bad_option: |
log("Bad options in %.100s file, line %lu: %.50s", |
logit("Bad options in %.100s file, line %lu: %.50s", |
file, linenum, opts); |
file, linenum, opts); |
auth_debug_add("Bad options in %.100s file, line %lu: %.50s", |
auth_debug_add("Bad options in %.100s file, line %lu: %.50s", |
file, linenum, opts); |
file, linenum, opts); |