diff options
author | dtucker <dtucker> | 2003-12-18 05:08:59 +0000 |
---|---|---|
committer | dtucker <dtucker> | 2003-12-18 05:08:59 +0000 |
commit | e879a1087d8d1a0ba4ada4dcd860aa4384e5cd08 (patch) | |
tree | 6330ddcba4df7319960d2825d6ef3a39da60c7b8 /auth-pam.c | |
parent | 8eae23e7245aadfa810e690fe124856a7ce04a47 (diff) | |
download | openssh-e879a1087d8d1a0ba4ada4dcd860aa4384e5cd08.tar.gz |
Enable commented-out "if (compat20)" test. (Should not have been committed.)
Diffstat (limited to 'auth-pam.c')
-rw-r--r-- | auth-pam.c | 6 |
1 files changed, 3 insertions, 3 deletions
@@ -31,7 +31,7 @@ /* Based on $FreeBSD: src/crypto/openssh/auth2-pam-freebsd.c,v 1.11 2003/03/31 13:48:18 des Exp $ */ #include "includes.h" -RCSID("$Id: auth-pam.c,v 1.85 2003/12/18 04:34:32 dtucker Exp $"); +RCSID("$Id: auth-pam.c,v 1.86 2003/12/18 05:08:59 dtucker Exp $"); #ifdef USE_PAM #include <security/pam_appl.h> @@ -312,7 +312,7 @@ sshpam_thread(void *ctxtp) if (sshpam_err != PAM_SUCCESS) goto auth_fail; - /* if (compat20) { */ + if (compat20) { if (!do_pam_account()) goto auth_fail; if (sshpam_new_authtok_reqd) { @@ -322,7 +322,7 @@ sshpam_thread(void *ctxtp) goto auth_fail; pam_password_change_required(0); } - /* } */ + } buffer_put_cstring(&buffer, "OK"); |