=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/auth.c,v retrieving revision 1.51.2.2 retrieving revision 1.52 diff -u -r1.51.2.2 -r1.52 --- src/usr.bin/ssh/auth.c 2005/03/10 17:15:04 1.51.2.2 +++ src/usr.bin/ssh/auth.c 2004/05/08 00:01:37 1.52 @@ -23,7 +23,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth.c,v 1.51.2.2 2005/03/10 17:15:04 brad Exp $"); +RCSID("$OpenBSD: auth.c,v 1.52 2004/05/08 00:01:37 deraadt Exp $"); #include @@ -99,9 +99,8 @@ for (i = 0; i < options.num_deny_users; i++) if (match_user(pw->pw_name, hostname, ipaddr, options.deny_users[i])) { - logit("User %.100s from %.100s not allowed " - "because listed in DenyUsers", - pw->pw_name, hostname); + logit("User %.100s not allowed because listed in DenyUsers", + pw->pw_name); return 0; } } @@ -113,16 +112,16 @@ break; /* i < options.num_allow_users iff we break for loop */ if (i >= options.num_allow_users) { - logit("User %.100s from %.100s not allowed because " - "not listed in AllowUsers", pw->pw_name, hostname); + logit("User %.100s not allowed because not listed in AllowUsers", + pw->pw_name); return 0; } } if (options.num_deny_groups > 0 || options.num_allow_groups > 0) { /* Get the user's group access list (primary and supplementary) */ if (ga_init(pw->pw_name, pw->pw_gid) == 0) { - logit("User %.100s from %.100s not allowed because " - "not in any group", pw->pw_name, hostname); + logit("User %.100s not allowed because not in any group", + pw->pw_name); return 0; } @@ -131,9 +130,8 @@ if (ga_match(options.deny_groups, options.num_deny_groups)) { ga_free(); - logit("User %.100s from %.100s not allowed " - "because a group is listed in DenyGroups", - pw->pw_name, hostname); + logit("User %.100s not allowed because a group is listed in DenyGroups", + pw->pw_name); return 0; } /* @@ -144,9 +142,8 @@ if (!ga_match(options.allow_groups, options.num_allow_groups)) { ga_free(); - logit("User %.100s from %.100s not allowed " - "because none of user's groups are listed " - "in AllowGroups", pw->pw_name, hostname); + logit("User %.100s not allowed because none of user's groups are listed in AllowGroups", + pw->pw_name); return 0; } ga_free(); @@ -164,7 +161,7 @@ /* Raise logging level */ if (authenticated == 1 || !authctxt->valid || - authctxt->failures >= options.max_authtries / 2 || + authctxt->failures >= AUTH_FAIL_LOG || strcmp(method, "password") == 0) authlog = logit; @@ -176,7 +173,7 @@ authlog("%s %s for %s%.100s from %.200s port %d%s", authmsg, method, - authctxt->valid ? "" : "invalid user ", + authctxt->valid ? "" : "illegal user ", authctxt->user, get_remote_ipaddr(), get_remote_port(), @@ -400,7 +397,7 @@ pw = getpwnam(user); if (pw == NULL) { - logit("Invalid user %.100s from %.100s", + logit("Illegal user %.100s from %.100s", user, get_remote_ipaddr()); return (NULL); } @@ -476,8 +473,8 @@ fake.pw_passwd = "$2a$06$r3.juUaHZDlIbQaO2dS9FuYxL1W9M81R1Tc92PoSNmzvpEqLkLGrK"; fake.pw_gecos = "NOUSER"; - fake.pw_uid = (uid_t)-1; - fake.pw_gid = (gid_t)-1; + fake.pw_uid = -1; + fake.pw_gid = -1; fake.pw_class = ""; fake.pw_dir = "/nonexist"; fake.pw_shell = "/nonexist";