diff options
author | Darren Tucker <dtucker@zip.com.au> | 2004-08-12 22:40:24 +1000 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2004-08-12 22:40:24 +1000 |
commit | 5cb30ad2ec4fe129e6d2e440eb2eba1c01f71661 (patch) | |
tree | a302142d8453f6d9387dae1d6c78e1351d6780b6 /auth1.c | |
parent | 6832b83744b807437488d7e122128f9b363dac43 (diff) | |
download | openssh-git-5cb30ad2ec4fe129e6d2e440eb2eba1c01f71661.tar.gz |
- markus@cvs.openbsd.org 2004/07/28 09:40:29
[auth.c auth1.c auth2.c cipher.c cipher.h key.c session.c ssh.c
sshconnect1.c]
more s/illegal/invalid/
Diffstat (limited to 'auth1.c')
-rw-r--r-- | auth1.c | 6 |
1 files changed, 3 insertions, 3 deletions
@@ -10,7 +10,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth1.c,v 1.58 2004/07/21 10:33:31 djm Exp $"); +RCSID("$OpenBSD: auth1.c,v 1.59 2004/07/28 09:40:29 markus Exp $"); #include "xmalloc.h" #include "rsa.h" @@ -71,7 +71,7 @@ do_authloop(Authctxt *authctxt) int prev, type = 0; debug("Attempting authentication for %s%.100s.", - authctxt->valid ? "" : "illegal user ", authctxt->user); + authctxt->valid ? "" : "invalid user ", authctxt->user); /* If the user has no password, accept authentication immediately. */ if (options.password_authentication && @@ -302,7 +302,7 @@ do_authentication(Authctxt *authctxt) if ((authctxt->pw = PRIVSEP(getpwnamallow(user))) != NULL) authctxt->valid = 1; else { - debug("do_authentication: illegal user %s", user); + debug("do_authentication: invalid user %s", user); authctxt->pw = fakepw(); } |