=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/auth-options.c,v retrieving revision 1.8 retrieving revision 1.9 diff -u -r1.8 -r1.9 --- src/usr.bin/ssh/auth-options.c 2001/01/13 18:38:00 1.8 +++ src/usr.bin/ssh/auth-options.c 2001/01/19 15:55:10 1.9 @@ -10,12 +10,13 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth-options.c,v 1.8 2001/01/13 18:38:00 markus Exp $"); +RCSID("$OpenBSD: auth-options.c,v 1.9 2001/01/19 15:55:10 markus Exp $"); #include "ssh.h" #include "packet.h" #include "xmalloc.h" #include "match.h" +#include "pathnames.h" /* Flags set authorized_keys flags */ int no_port_forwarding_flag = 0; @@ -106,9 +107,9 @@ } if (!*options) { debug("%.100s, line %lu: missing end quote", - SSH_USER_PERMITTED_KEYS, linenum); + _PATH_SSH_USER_PERMITTED_KEYS, linenum); packet_send_debug("%.100s, line %lu: missing end quote", - SSH_USER_PERMITTED_KEYS, linenum); + _PATH_SSH_USER_PERMITTED_KEYS, linenum); continue; } forced_command[i] = 0; @@ -136,9 +137,9 @@ } if (!*options) { debug("%.100s, line %lu: missing end quote", - SSH_USER_PERMITTED_KEYS, linenum); + _PATH_SSH_USER_PERMITTED_KEYS, linenum); packet_send_debug("%.100s, line %lu: missing end quote", - SSH_USER_PERMITTED_KEYS, linenum); + _PATH_SSH_USER_PERMITTED_KEYS, linenum); continue; } s[i] = 0; @@ -170,9 +171,9 @@ } if (!*options) { debug("%.100s, line %lu: missing end quote", - SSH_USER_PERMITTED_KEYS, linenum); + _PATH_SSH_USER_PERMITTED_KEYS, linenum); packet_send_debug("%.100s, line %lu: missing end quote", - SSH_USER_PERMITTED_KEYS, linenum); + _PATH_SSH_USER_PERMITTED_KEYS, linenum); continue; } patterns[i] = 0; @@ -219,9 +220,9 @@ bad_option: log("Bad options in %.100s file, line %lu: %.50s", - SSH_USER_PERMITTED_KEYS, linenum, options); + _PATH_SSH_USER_PERMITTED_KEYS, linenum, options); packet_send_debug("Bad options in %.100s file, line %lu: %.50s", - SSH_USER_PERMITTED_KEYS, linenum, options); + _PATH_SSH_USER_PERMITTED_KEYS, linenum, options); /* deny access */ return 0; }