Displaying 2 results from an estimated 2 matches for "opieverify".
2001 Nov 04
2
OPIE patch for current CVS
..._query(void *ctx, char **name, char **infotxt,
+ u_int* numprompts, char ***prompts, u_int **echo_on)
+{
+ Authctxt *authctxt = ctx;
+ char challenge[OPIE_CHALLENGE_MAX+64], *p;
+ int len;
+ struct opie opie;
+
+ if (opiechallenge(&opie, authctxt->user, challenge) != 0)
+ return -1;
+
+ opieverify(&opie, ""); /* Zap lock again */
+
+ *name = xstrdup("");
+ *infotxt = xstrdup("");
+ *numprompts = 1;
+ *prompts = xmalloc(*numprompts * sizeof(char*));
+ *echo_on = xmalloc(*numprompts * sizeof(u_int));
+ (*echo_on)[0] = 0;
+
+ len = strlen(challenge) +...
2001 Jun 03
1
OPIE support patch
...64];
+ if (opiechallenge(&authctxt->opie_data, authxtxt->user, challenge) != 0)
+ return NULL;
+ strlcat(challenge, "\nOPIE Password: ", sizeof challenge);
+ return challenge;
+}
+int
+verify_response(Authctxt *authctxt, char *response)
+{
+ return authctxt->valid && opieverify(&authctxt->opie_data, response);
+}
+
#else
/* not available */
char *
@@ -100,5 +119,5 @@
{
return 0;
}
-#endif
-#endif
+#endif /* !SKEY */
+#endif /* !BSD_AUTH */
diff -wur org/openssh-2.5.2p2/auth.h openssh-2.5.2p2/auth.h
--- org/openssh-2.5.2p2/auth.h Mon Mar 5 06:56:41 2001
+++...