summaryrefslogtreecommitdiff
path: root/usr.bin/ssh
diff options
context:
space:
mode:
authorTheo de Raadt <deraadt@cvs.openbsd.org>1999-10-19 15:56:42 +0000
committerTheo de Raadt <deraadt@cvs.openbsd.org>1999-10-19 15:56:42 +0000
commit65c460045ebb36ca62a8a4570ebbcb05b7797754 (patch)
tree27db9ebd0ec7b8ab49cb5db19288aaaab607f0ec /usr.bin/ssh
parent38ac5bdca74f63a860431ad49b081615ad9ea833 (diff)
stop leak; after branch, builders take note
Diffstat (limited to 'usr.bin/ssh')
-rw-r--r--usr.bin/ssh/auth-passwd.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/usr.bin/ssh/auth-passwd.c b/usr.bin/ssh/auth-passwd.c
index 41a6f7a11f4..589f00b6dc7 100644
--- a/usr.bin/ssh/auth-passwd.c
+++ b/usr.bin/ssh/auth-passwd.c
@@ -15,7 +15,7 @@ the password is valid for the user.
*/
#include "includes.h"
-RCSID("$Id: auth-passwd.c,v 1.7 1999/10/14 19:56:02 markus Exp $");
+RCSID("$Id: auth-passwd.c,v 1.8 1999/10/19 15:56:41 deraadt Exp $");
#include "packet.h"
#include "ssh.h"
@@ -36,13 +36,13 @@ int auth_password(struct passwd *pw, const char *password)
if (pw->pw_uid == 0 && options.permit_root_login == 2)
{
- packet_send_debug("Server does not permit root login with password.");
+ /*packet_send_debug("Server does not permit root login with password.");*/
return 0;
}
if (*password == '\0' && options.permit_empty_passwd == 0)
{
- packet_send_debug("Server does not permit empty password login.");
+ /*packet_send_debug("Server does not permit empty password login.");*/
return 0;
}