diff options
author | Damien Miller <djm@mindrot.org> | 2001-01-19 15:46:38 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2001-01-19 15:46:38 +1100 |
commit | 22e22bf9bab94862c860ad4ed652f308dda63f81 (patch) | |
tree | b4d1a83f4ea81c3b1c82a3a5a28de21bbd5d4c2c /auth-pam.c | |
parent | f569241db2e79b0bd7d1be6e288f2bd25e9c7ab4 (diff) | |
download | openssh-git-22e22bf9bab94862c860ad4ed652f308dda63f81.tar.gz |
- (djm) Merge patch from Tim Waugh (via Nalin Dahyabhai <nalin@redhat.com>)
to fix NULL pointer deref and fake authloop breakage in PAM code.
Diffstat (limited to 'auth-pam.c')
-rw-r--r-- | auth-pam.c | 8 |
1 files changed, 4 insertions, 4 deletions
@@ -29,7 +29,7 @@ #include "xmalloc.h" #include "servconf.h" -RCSID("$Id: auth-pam.c,v 1.20 2000/12/20 02:34:49 djm Exp $"); +RCSID("$Id: auth-pam.c,v 1.21 2001/01/19 04:46:38 djm Exp $"); #define NEW_AUTHTOK_MSG \ "Warning: Your password has expired, please change it now" @@ -323,13 +323,13 @@ void finish_pam(void) } /* Start PAM authentication for specified account */ -void start_pam(struct passwd *pw) +void start_pam(const char *user) { int pam_retval; - debug("Starting up PAM with username \"%.200s\"", pw->pw_name); + debug("Starting up PAM with username \"%.200s\"", user); - pam_retval = pam_start(SSHD_PAM_SERVICE, pw->pw_name, &conv, &pamh); + pam_retval = pam_start(SSHD_PAM_SERVICE, user, &conv, &pamh); if (pam_retval != PAM_SUCCESS) { fatal("PAM initialisation failed[%d]: %.200s", |