=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/monitor.c,v retrieving revision 1.233 retrieving revision 1.234 diff -u -r1.233 -r1.234 --- src/usr.bin/ssh/monitor.c 2022/05/27 05:01:25 1.233 +++ src/usr.bin/ssh/monitor.c 2022/06/15 16:08:25 1.234 @@ -1,4 +1,4 @@ -/* $OpenBSD: monitor.c,v 1.233 2022/05/27 05:01:25 djm Exp $ */ +/* $OpenBSD: monitor.c,v 1.234 2022/06/15 16:08:25 djm Exp $ */ /* * Copyright 2002 Niels Provos * Copyright 2002 Markus Friedl @@ -902,9 +902,6 @@ u_int type = 0; int r, allowed = 0; struct sshauthopt *opts = NULL; - const char *remote_ip = ssh_remote_ipaddr(ssh); - const char *remote_host = auth_get_canonical_hostname(ssh, - options.use_dns); debug3_f("entering"); if ((r = sshbuf_get_u32(m, &type)) != 0 || @@ -930,8 +927,8 @@ if (!key_base_type_match(auth_method, key, options.pubkey_accepted_algos)) break; - allowed = user_key_allowed(authctxt->pw, key, - pubkey_auth_attempt, remote_ip, remote_host, &opts); + allowed = user_key_allowed(ssh, authctxt->pw, key, + pubkey_auth_attempt, &opts); break; case MM_HOSTKEY: auth_method = "hostbased";