diff options
author | Darren Tucker <dtucker@zip.com.au> | 2004-08-12 22:40:24 +1000 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2004-08-12 22:40:24 +1000 |
commit | 5cb30ad2ec4fe129e6d2e440eb2eba1c01f71661 (patch) | |
tree | a302142d8453f6d9387dae1d6c78e1351d6780b6 /auth2.c | |
parent | 6832b83744b807437488d7e122128f9b363dac43 (diff) | |
download | openssh-git-5cb30ad2ec4fe129e6d2e440eb2eba1c01f71661.tar.gz |
- markus@cvs.openbsd.org 2004/07/28 09:40:29
[auth.c auth1.c auth2.c cipher.c cipher.h key.c session.c ssh.c
sshconnect1.c]
more s/illegal/invalid/
Diffstat (limited to 'auth2.c')
-rw-r--r-- | auth2.c | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -23,7 +23,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth2.c,v 1.106 2004/07/21 10:33:31 djm Exp $"); +RCSID("$OpenBSD: auth2.c,v 1.107 2004/07/28 09:40:29 markus Exp $"); #include "ssh2.h" #include "xmalloc.h" @@ -159,7 +159,7 @@ input_userauth_request(int type, u_int32_t seq, void *ctxt) PRIVSEP(start_pam(authctxt)); #endif } else { - logit("input_userauth_request: illegal user %s", user); + logit("input_userauth_request: invalid user %s", user); authctxt->pw = fakepw(); #ifdef USE_PAM if (options.use_pam) |