char *message, *pass;
int reenter = 1;
- pass = tgetpass(prompt, def_ival(I_PW_TIMEOUT) * 60, tgetpass_flags);
+ pass = tgetpass(prompt, def_ival(I_PASSWD_TIMEOUT) * 60, tgetpass_flags);
if (authenticate(pw->pw_name, pass, &reenter, &message) == 0)
return(AUTH_SUCCESS);
else
* S/Key.
*/
if ((s = auth_challenge(as)) == NULL) {
- pass = tgetpass(prompt, def_ival(I_PW_TIMEOUT) * 60, tgetpass_flags);
+ pass = tgetpass(prompt, def_ival(I_PASSWD_TIMEOUT) * 60, tgetpass_flags);
} else {
- pass = tgetpass(s, def_ival(I_PW_TIMEOUT) * 60, tgetpass_flags);
+ pass = tgetpass(s, def_ival(I_PASSWD_TIMEOUT) * 60, tgetpass_flags);
if (!pass || *pass == '\0') {
if ((prompt = strrchr(s, '\n')))
prompt++;
while (isspace(prompt[len]) || prompt[len] == ':')
prompt[len--] = '\0';
easprintf(&s, "%s [echo on]: ", prompt);
- pass = tgetpass(s, def_ival(I_PW_TIMEOUT) * 60,
+ pass = tgetpass(s, def_ival(I_PASSWD_TIMEOUT) * 60,
tgetpass_flags | TGP_ECHO);
free(s);
}
/* Get the password/response from the user. */
if (strncmp(resp, "challenge ", 10) == 0) {
(void) snprintf(buf, sizeof(buf), "%s\nResponse: ", &resp[10]);
- pass = tgetpass(buf, def_ival(I_PW_TIMEOUT) * 60, tgetpass_flags);
+ pass = tgetpass(buf, def_ival(I_PASSWD_TIMEOUT) * 60, tgetpass_flags);
if (!pass || *pass == '\0') {
- pass = tgetpass("Response [echo on]: ", def_ival(I_PW_TIMEOUT) * 60,
- tgetpass_flags | TGP_ECHO);
+ pass = tgetpass("Response [echo on]: ",
+ def_ival(I_PASSWD_TIMEOUT) * 60, tgetpass_flags | TGP_ECHO);
}
} else if (strncmp(resp, "password", 8) == 0) {
- pass = tgetpass(prompt, def_ival(I_PW_TIMEOUT) * 60, tgetpass_flags);
+ pass = tgetpass(prompt, def_ival(I_PASSWD_TIMEOUT) * 60,
+ tgetpass_flags);
} else {
(void) fprintf(stderr, "%s: %s\n", Argv[0], resp);
return(AUTH_FATAL);
p = pm->msg;
/* Read the password. */
pr->resp = estrdup((char *) tgetpass(p,
- def_ival(I_PW_TIMEOUT) * 60, tgetpass_flags));
+ def_ival(I_PASSWD_TIMEOUT) * 60, tgetpass_flags));
if (*pr->resp == '\0')
nil_pw = 1; /* empty password */
break;
switch (rendition) {
case SIAFORM:
case SIAONELINER:
- if (timeout <= 0 || timeout > def_ival(I_PW_TIMEOUT) * 60)
- timeout = def_ival(I_PW_TIMEOUT) * 60;
+ if (timeout <= 0 || timeout > def_ival(I_PASSWD_TIMEOUT) * 60)
+ timeout = def_ival(I_PASSWD_TIMEOUT) * 60;
/*
* Substitute custom prompt if a) the sudo prompt is not "Password:"
* and b) the SIA prompt is "Password:" (so we know it is safe).
struct passwd *pw;
char *prompt;
{
- short counter = def_ival(I_PW_TRIES) + 1;
+ short counter = def_ival(I_PASSWD_TRIES) + 1;
short success = AUTH_FAILURE;
short status;
char *p;
#ifdef AUTH_STANDALONE
p = prompt;
#else
- p = (char *) tgetpass(prompt, def_ival(I_PW_TIMEOUT) * 60,
+ p = (char *) tgetpass(prompt, def_ival(I_PASSWD_TIMEOUT) * 60,
tgetpass_flags);
if (!p || *p == '\0')
nil_pw = 1;
/* Exit loop on nil password, but give it a chance to match first. */
if (nil_pw) {
- if (counter == def_ival(I_PW_TRIES))
+ if (counter == def_ival(I_PASSWD_TRIES))
exit(1);
else
break;
return;
case AUTH_FAILURE:
log_error(NO_MAIL, "%d incorrect password attempt%s",
- def_ival(I_PW_TRIES) - counter,
- (def_ival(I_PW_TRIES) - counter == 1) ? "" : "s");
+ def_ival(I_PASSWD_TRIES) - counter,
+ (def_ival(I_PASSWD_TRIES) - counter == 1) ? "" : "s");
case AUTH_FATAL:
exit(1);
}
(void) fprintf(fp, "%s\n", INSULT);
else
#endif
- (void) fprintf(fp, "%s\n", def_str(I_BADPASS_MSG));
+ (void) fprintf(fp, "%s\n", def_str(I_BADPASS_MESSAGE));
}
void