diff options
author | Darren Tucker <dtucker@zip.com.au> | 2004-03-08 23:04:06 +1100 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2004-03-08 23:04:06 +1100 |
commit | dbf7a74ee569a9544276db42eb7aee1141072a24 (patch) | |
tree | f9aea6fab5efea9441557696611b04a065ad8128 /monitor.c | |
parent | 86c093d2895989d1258459b797ce3630eaa47d1a (diff) | |
download | openssh-git-dbf7a74ee569a9544276db42eb7aee1141072a24.tar.gz |
- (dtucker) [auth-pam.c auth-pam.h auth1.c auth2.c monitor.c monitor_wrap.c
monitor_wrap.h] Bug #808: Ensure force_pwchange is correctly initialized
even if keyboard-interactive is not used by the client. Prevents segfaults
in some cases where the user's password is expired (note this is not
considered a security exposure). ok djm@
Diffstat (limited to 'monitor.c')
-rw-r--r-- | monitor.c | 8 |
1 files changed, 1 insertions, 7 deletions
@@ -782,16 +782,10 @@ mm_answer_skeyrespond(int socket, Buffer *m) int mm_answer_pam_start(int socket, Buffer *m) { - char *user; - if (!options.use_pam) fatal("UsePAM not set, but ended up in %s anyway", __func__); - user = buffer_get_string(m, NULL); - - start_pam(user); - - xfree(user); + start_pam(authctxt); monitor_permit(mon_dispatch, MONITOR_REQ_PAM_ACCOUNT, 1); |