diff options
author | Damien Miller <djm@mindrot.org> | 2019-01-20 04:55:27 +0100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2019-01-20 04:55:27 +0100 |
commit | 9b655dc9c9a353f0a527f0c6c43a5e35653c9503 (patch) | |
tree | 78b3512ffa1a9e5b8d954aca6fb45a0a3045504b /auth2.c | |
parent | remove PAM dependencies on old packet API (diff) | |
download | openssh-9b655dc9c9a353f0a527f0c6c43a5e35653c9503.tar.xz openssh-9b655dc9c9a353f0a527f0c6c43a5e35653c9503.zip |
last bits of old packet API / active_state global
Diffstat (limited to 'auth2.c')
-rw-r--r-- | auth2.c | 6 |
1 files changed, 3 insertions, 3 deletions
@@ -294,7 +294,7 @@ input_userauth_request(int type, u_int32_t seq, struct ssh *ssh) /* Invalid user, fake password information */ authctxt->pw = fakepw(); #ifdef SSH_AUDIT_EVENTS - PRIVSEP(audit_event(SSH_INVALID_USER)); + PRIVSEP(audit_event(ssh, SSH_INVALID_USER)); #endif } #ifdef USE_PAM @@ -369,7 +369,7 @@ userauth_finish(struct ssh *ssh, int authenticated, const char *method, !auth_root_allowed(ssh, method)) { authenticated = 0; #ifdef SSH_AUDIT_EVENTS - PRIVSEP(audit_event(SSH_LOGIN_ROOT_DENIED)); + PRIVSEP(audit_event(ssh, SSH_LOGIN_ROOT_DENIED)); #endif } @@ -430,7 +430,7 @@ userauth_finish(struct ssh *ssh, int authenticated, const char *method, authctxt->failures++; if (authctxt->failures >= options.max_authtries) { #ifdef SSH_AUDIT_EVENTS - PRIVSEP(audit_event(SSH_LOGIN_EXCEED_MAXTRIES)); + PRIVSEP(audit_event(ssh, SSH_LOGIN_EXCEED_MAXTRIES)); #endif auth_maxtries_exceeded(ssh); } |