From 205cc1ef461d0c6996dc3757e52e229b5053274b Mon Sep 17 00:00:00 2001 From: Kevin Steves <stevesk@pobox.com> Date: Fri, 22 Mar 2002 20:43:05 +0000 Subject: [PATCH] - (stevesk) [auth2.c] merge cleanup/sync --- ChangeLog | 3 ++- auth2.c | 8 +++----- 2 files changed, 5 insertions(+), 6 deletions(-) diff --git a/ChangeLog b/ChangeLog index 236b00753..acd6306f4 100644 --- a/ChangeLog +++ b/ChangeLog @@ -4,6 +4,7 @@ - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms - (stevesk) [monitor_fdpass.c] support for access rights style file descriptor passing + - (stevesk) [auth2.c] merge cleanup/sync 20020321 - (bal) OpenBSD CVS Sync @@ -7998,4 +7999,4 @@ - Wrote replacements for strlcpy and mkdtemp - Released 1.0pre1 -$Id: ChangeLog,v 1.1970 2002/03/22 19:32:53 stevesk Exp $ +$Id: ChangeLog,v 1.1971 2002/03/22 20:43:05 stevesk Exp $ diff --git a/auth2.c b/auth2.c index 98e1eda1a..3377fde8b 100644 --- a/auth2.c +++ b/auth2.c @@ -184,14 +184,12 @@ input_userauth_request(int type, u_int32_t seq, void *ctxt) if (authctxt->attempt++ == 0) { /* setup auth context */ - struct passwd *pw = NULL; - pw = PRIVSEP(getpwnamallow(user)); - if (pw && strcmp(service, "ssh-connection")==0) { - authctxt->pw = pwcopy(pw); + authctxt->pw = PRIVSEP(getpwnamallow(user)); + if (authctxt->pw && strcmp(service, "ssh-connection")==0) { authctxt->valid = 1; debug2("input_userauth_request: setting up authctxt for %s", user); #ifdef USE_PAM - start_pam(pw->pw_name); + start_pam(authctxt->pw->pw_name); #endif } else { log("input_userauth_request: illegal user %s", user);