summaryrefslogtreecommitdiffstats
path: root/crypto/openssh/auth1.c
diff options
context:
space:
mode:
authorru <ru@FreeBSD.org>2002-03-26 12:52:28 +0000
committerru <ru@FreeBSD.org>2002-03-26 12:52:28 +0000
commit065ea04bd88fea07a99cd23a16fe51d92d340e2c (patch)
treee352a6b9a5d29d9cd8f84432f8c5e8f8971ac83b /crypto/openssh/auth1.c
parent833cdae90669254b5fca898fc0ff90cf0641e72c (diff)
downloadFreeBSD-src-065ea04bd88fea07a99cd23a16fe51d92d340e2c.zip
FreeBSD-src-065ea04bd88fea07a99cd23a16fe51d92d340e2c.tar.gz
Switch over to using pam_login_access(8) module in sshd(8).
(Fixes static compilation. Reduces diffs to OpenSSH.) Reviewed by: bde
Diffstat (limited to 'crypto/openssh/auth1.c')
-rw-r--r--crypto/openssh/auth1.c11
1 files changed, 2 insertions, 9 deletions
diff --git a/crypto/openssh/auth1.c b/crypto/openssh/auth1.c
index 54a23d5..9611c6d 100644
--- a/crypto/openssh/auth1.c
+++ b/crypto/openssh/auth1.c
@@ -88,12 +88,12 @@ do_authloop(Authctxt *authctxt)
#ifdef USE_PAM
struct inverted_pam_cookie *pam_cookie;
#endif /* USE_PAM */
-#if defined(HAVE_LOGIN_CAP) || defined(LOGIN_ACCESS)
+#if defined(HAVE_LOGIN_CAP)
const char *from_host, *from_ip;
from_host = get_canonical_hostname(options.verify_reverse_mapping);
from_ip = get_remote_ipaddr();
-#endif /* HAVE_LOGIN_CAP || LOGIN_ACCESS */
+#endif /* HAVE_LOGIN_CAP */
debug("Attempting authentication for %s%.100s.",
authctxt->valid ? "" : "illegal user ", authctxt->user);
@@ -369,13 +369,6 @@ do_authloop(Authctxt *authctxt)
lc = NULL;
}
#endif /* HAVE_LOGIN_CAP */
-#ifdef LOGIN_ACCESS
- if (pw != NULL && !login_access(pw->pw_name, from_host)) {
- log("Denied connection for %.200s from %.200s [%.200s].",
- pw->pw_name, from_host, from_ip);
- packet_disconnect("Sorry, you are not allowed to connect.");
- }
-#endif /* LOGIN_ACCESS */
#ifdef BSD_AUTH
if (authctxt->as) {
auth_close(authctxt->as);
OpenPOWER on IntegriCloud