Changeset View
Changeset View
Standalone View
Standalone View
head/crypto/openssh/auth2.c
Show First 20 Lines • Show All 311 Lines • ▼ Show 20 Lines | #endif | ||||
packet_disconnect("Change of username or service not allowed: " | packet_disconnect("Change of username or service not allowed: " | ||||
"(%s,%s) -> (%s,%s)", | "(%s,%s) -> (%s,%s)", | ||||
authctxt->user, authctxt->service, user, service); | authctxt->user, authctxt->service, user, service); | ||||
} | } | ||||
#ifdef HAVE_LOGIN_CAP | #ifdef HAVE_LOGIN_CAP | ||||
if (authctxt->pw != NULL && | if (authctxt->pw != NULL && | ||||
(lc = PRIVSEP(login_getpwclass(authctxt->pw))) != NULL) { | (lc = PRIVSEP(login_getpwclass(authctxt->pw))) != NULL) { | ||||
logit("user %s login class %s", authctxt->pw->pw_name, | |||||
authctxt->pw->pw_class); | |||||
from_host = auth_get_canonical_hostname(ssh, options.use_dns); | from_host = auth_get_canonical_hostname(ssh, options.use_dns); | ||||
from_ip = ssh_remote_ipaddr(ssh); | from_ip = ssh_remote_ipaddr(ssh); | ||||
if (!auth_hostok(lc, from_host, from_ip)) { | if (!auth_hostok(lc, from_host, from_ip)) { | ||||
logit("Denied connection for %.200s from %.200s [%.200s].", | logit("Denied connection for %.200s from %.200s [%.200s].", | ||||
authctxt->pw->pw_name, from_host, from_ip); | authctxt->pw->pw_name, from_host, from_ip); | ||||
packet_disconnect("Sorry, you are not allowed to connect."); | packet_disconnect("Sorry, you are not allowed to connect."); | ||||
} | } | ||||
if (!auth_timeok(lc, time(NULL))) { | if (!auth_timeok(lc, time(NULL))) { | ||||
▲ Show 20 Lines • Show All 495 Lines • Show Last 20 Lines |