version 1.104, 2003/11/04 08:54:09 |
version 1.104.2.1, 2004/08/19 04:13:26 |
|
|
authctxt->valid = 1; |
authctxt->valid = 1; |
debug2("input_userauth_request: setting up authctxt for %s", user); |
debug2("input_userauth_request: setting up authctxt for %s", user); |
} else { |
} else { |
logit("input_userauth_request: illegal user %s", user); |
logit("input_userauth_request: invalid user %s", user); |
authctxt->pw = fakepw(); |
authctxt->pw = fakepw(); |
} |
} |
setproctitle("%s%s", authctxt->pw ? user : "unknown", |
setproctitle("%s%s", authctxt->valid ? user : "unknown", |
use_privsep ? " [net]" : ""); |
use_privsep ? " [net]" : ""); |
authctxt->user = xstrdup(user); |
authctxt->user = xstrdup(user); |
authctxt->service = xstrdup(service); |
authctxt->service = xstrdup(service); |
|
|
/* now we can break out */ |
/* now we can break out */ |
authctxt->success = 1; |
authctxt->success = 1; |
} else { |
} else { |
if (authctxt->failures++ > AUTH_FAIL_MAX) |
if (authctxt->failures++ > options.max_authtries) |
packet_disconnect(AUTH_FAIL_MSG, authctxt->user); |
packet_disconnect(AUTH_FAIL_MSG, authctxt->user); |
methods = authmethods_get(); |
methods = authmethods_get(); |
packet_start(SSH2_MSG_USERAUTH_FAILURE); |
packet_start(SSH2_MSG_USERAUTH_FAILURE); |