]> andersk Git - openssh.git/blobdiff - auth2-pam.c
- (bal) auth1.c minor resync while looking at the code.
[openssh.git] / auth2-pam.c
index b2bfa8130649958de564f64fcfebed434f1f5af0..b1f19d22d4e119ca2f857cab46835f365c3b6790 100644 (file)
@@ -116,11 +116,11 @@ do_pam_conversation_kbd_int(int num_msg, const struct pam_message **msg,
        while(context_pam2.finished == 0) {
                done = 1;
                dispatch_run(DISPATCH_BLOCK, &done, appdata_ptr);
-               if(context_pam2.finished == 0)
+               if (context_pam2.finished == 0)
                        debug("extra packet during conversation");
        }
 
-       if(context_pam2.num_received == context_pam2.num_expected) {
+       if (context_pam2.num_received == context_pam2.num_expected) {
                *resp = context_pam2.responses;
                return PAM_SUCCESS;
        } else
@@ -143,8 +143,8 @@ input_userauth_info_response_pam(int type, u_int32_t seqnr, void *ctxt)
 
        if (nresp != context_pam2.num_expected)
                fatal("%s: Received incorrect number of responses "
-                   "(expected %u, received %u)", __func__, nresp,
-                   context_pam2.num_expected);
+                   "(expected %d, received %u)", __func__, 
+                   context_pam2.num_expected, nresp);
 
        if (nresp > 100)
                fatal("%s: too many replies", __func__);
@@ -154,8 +154,7 @@ input_userauth_info_response_pam(int type, u_int32_t seqnr, void *ctxt)
 
                resp = packet_get_string(&rlen);
                context_pam2.responses[j].resp_retcode = PAM_SUCCESS;
-               context_pam2.responses[j].resp = xstrdup(resp);
-               xfree(resp);
+               context_pam2.responses[j].resp = resp;
                context_pam2.num_received++;
        }
 
@@ -163,5 +162,4 @@ input_userauth_info_response_pam(int type, u_int32_t seqnr, void *ctxt)
 
        packet_check_eom();
 }
-
 #endif
This page took 0.034043 seconds and 4 git commands to generate.