Lines Matching +full:common +full:- +full:auth
1 /*-
65 * 94065, (415)595-8782, or from DIGITAL"
77 #include "auth.h"
97 static KTEXT_ST auth; variable
115 if (c == -1)
126 *p++ = ap->type;
127 *p++ = ap->way;
129 while (c-- > 0) {
136 printsub('>', &str_data[2], p - (&str_data[2]));
137 return(net_write(str_data, p - str_data));
199 cnt--;
202 memmove((void *)auth.dat, (void *)data, auth.length = cnt);
205 Data(ap, RSA_ENCPWD_REJECT, (void *)"Auth failed", -1);
218 r = accept_rsa_encpwd(&auth, key, challenge,
221 Data(ap, RSA_ENCPWD_REJECT, (void *)"Auth failed", -1);
230 Data(ap, RSA_ENCPWD_REJECT, (void *)"Illegal password", -1);
246 if ((ap->way & AUTH_HOW_MASK) == AUTH_HOW_ONE_WAY) {
260 Data(ap, RSA_ENCPWD_REJECT, (void *)"Auth failed", -1);
317 if (cnt-- < 1)
356 local_des_read_pw_string(user_passwd, sizeof(user_passwd)-1, "Password: ", 0);
393 #define BUMP(buf, len) while (*(buf)) {++(buf), --(len);}
394 #define ADDC(buf, len, c) if ((len) > 0) {*(buf)++ = (c); --(len);}
404 buf[buflen-1] = '\0'; /* make sure its NULL terminated */
405 buflen -= 1;
410 goto common;
414 common:
426 strncpy((char *)buf, " AUTH", buflen);
456 salt = pwd->pw_passwd;
461 if (pwd && !strcmp(p, pwd->pw_passwd)) {