version 1.189, 2019/01/19 21:31:32 |
version 1.190, 2019/01/19 21:41:18 |
|
|
authenticated = 0; |
authenticated = 0; |
} |
} |
if (ent->flags & (MON_AUTHDECIDE|MON_ALOG)) { |
if (ent->flags & (MON_AUTHDECIDE|MON_ALOG)) { |
auth_log(authctxt, authenticated, partial, |
auth_log(ssh, authenticated, partial, |
auth_method, auth_submethod); |
auth_method, auth_submethod); |
if (!partial && !authenticated) |
if (!partial && !authenticated) |
authctxt->failures++; |
authctxt->failures++; |
|
|
if ((r = sshbuf_get_cstring(m, &username, NULL)) != 0) |
if ((r = sshbuf_get_cstring(m, &username, NULL)) != 0) |
fatal("%s: buffer error: %s", __func__, ssh_err(r)); |
fatal("%s: buffer error: %s", __func__, ssh_err(r)); |
|
|
pwent = getpwnamallow(username); |
pwent = getpwnamallow(ssh, username); |
|
|
authctxt->user = xstrdup(username); |
authctxt->user = xstrdup(username); |
setproctitle("%s [priv]", pwent ? username : "unknown"); |
setproctitle("%s [priv]", pwent ? username : "unknown"); |
|
|
hostbased_chost = chost; |
hostbased_chost = chost; |
} else { |
} else { |
/* Log failed attempt */ |
/* Log failed attempt */ |
auth_log(authctxt, 0, 0, auth_method, NULL); |
auth_log(ssh, 0, 0, auth_method, NULL); |
free(cuser); |
free(cuser); |
free(chost); |
free(chost); |
} |
} |