Displaying 2 results from an estimated 2 matches for "opiechallenge".
2001 Jun 03
1
OPIE support patch
...skey_haskey(authctxt->pw->pw_name) == 0 &&
skey_passcheck(authctxt->pw->pw_name, response) != -1);
}
+#else /* SKEY */
+#ifdef OPIE
+#include <opie.h>
+
+char *
+get_challenge(Authctxt *authctxt, char *devs)
+{
+ static char challenge[OPIE_CHALLENGE_MAX+64];
+ if (opiechallenge(&authctxt->opie_data, authxtxt->user, challenge) != 0)
+ return NULL;
+ strlcat(challenge, "\nOPIE Password: ", sizeof challenge);
+ return challenge;
+}
+int
+verify_response(Authctxt *authctxt, char *response)
+{
+ return authctxt->valid && opieverify(&authctxt...
2001 Nov 04
2
OPIE patch for current CVS
...uthctxt;
+}
+
+#define PROMPT "\nOPIE Password: "
+
+static int
+opie_query(void *ctx, char **name, char **infotxt,
+ u_int* numprompts, char ***prompts, u_int **echo_on)
+{
+ Authctxt *authctxt = ctx;
+ char challenge[OPIE_CHALLENGE_MAX+64], *p;
+ int len;
+ struct opie opie;
+
+ if (opiechallenge(&opie, authctxt->user, challenge) != 0)
+ return -1;
+
+ opieverify(&opie, ""); /* Zap lock again */
+
+ *name = xstrdup("");
+ *infotxt = xstrdup("");
+ *numprompts = 1;
+ *prompts = xmalloc(*numprompts * sizeof(char*));
+ *echo_on = xmalloc(*nump...