version 1.42, 2008/05/08 12:02:23 |
version 1.43, 2008/06/10 23:06:19 |
|
|
} |
} |
patterns[i] = '\0'; |
patterns[i] = '\0'; |
opts++; |
opts++; |
if (match_host_and_ip(remote_host, remote_ip, |
switch (match_host_and_ip(remote_host, remote_ip, |
patterns) != 1) { |
patterns)) { |
|
case 1: |
xfree(patterns); |
xfree(patterns); |
|
/* Host name matches. */ |
|
goto next_option; |
|
case -1: |
|
debug("%.100s, line %lu: invalid criteria", |
|
file, linenum); |
|
auth_debug_add("%.100s, line %lu: " |
|
"invalid criteria", file, linenum); |
|
/* FALLTHROUGH */ |
|
case 0: |
|
xfree(patterns); |
logit("Authentication tried for %.100s with " |
logit("Authentication tried for %.100s with " |
"correct key but not from a permitted " |
"correct key but not from a permitted " |
"host (host=%.200s, ip=%.200s).", |
"host (host=%.200s, ip=%.200s).", |
|
|
auth_debug_add("Your host '%.200s' is not " |
auth_debug_add("Your host '%.200s' is not " |
"permitted to use this key for login.", |
"permitted to use this key for login.", |
remote_host); |
remote_host); |
/* deny access */ |
break; |
return 0; |
|
} |
} |
xfree(patterns); |
/* deny access */ |
/* Host name matches. */ |
return 0; |
goto next_option; |
|
} |
} |
cp = "permitopen=\""; |
cp = "permitopen=\""; |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |
if (strncasecmp(opts, cp, strlen(cp)) == 0) { |