summaryrefslogtreecommitdiffhomepage
path: root/svr-authpasswd.c
diff options
context:
space:
mode:
authorMatt Johnston <matt@ucc.asn.au>2004-07-27 16:30:46 +0000
committerMatt Johnston <matt@ucc.asn.au>2004-07-27 16:30:46 +0000
commita76b1ba06868c1743837a5267efcbf2e07c9d81d (patch)
tree52e8706431b92b98d2a86b51699635ea7f29486f /svr-authpasswd.c
parent052bf7df933634688ccfd89efeec7f29aa628510 (diff)
Progressing client support
--HG-- extra : convert_revision : 48946be1cef774d1c33b0f78689962b18720c627
Diffstat (limited to 'svr-authpasswd.c')
-rw-r--r--svr-authpasswd.c12
1 files changed, 6 insertions, 6 deletions
diff --git a/svr-authpasswd.c b/svr-authpasswd.c
index 859cfd5..f161b69 100644
--- a/svr-authpasswd.c
+++ b/svr-authpasswd.c
@@ -35,7 +35,7 @@
/* Process a password auth request, sending success or failure messages as
* appropriate */
-void passwordauth() {
+void svr_auth_password() {
#ifdef HAVE_SHADOW_H
struct spwd *spasswd;
@@ -47,10 +47,10 @@ void passwordauth() {
unsigned char changepw;
- passwdcrypt = svr_ses.authstate.pw->pw_passwd;
+ passwdcrypt = ses.authstate.pw->pw_passwd;
#ifdef HAVE_SHADOW_H
/* get the shadow password if possible */
- spasswd = getspnam(svr_ses.authstate.pw->pw_name);
+ spasswd = getspnam(ses.authstate.pw->pw_name);
if (spasswd != NULL && spasswd->sp_pwdp != NULL) {
passwdcrypt = spasswd->sp_pwdp;
}
@@ -66,7 +66,7 @@ void passwordauth() {
* in auth.c */
if (passwdcrypt[0] == '\0') {
dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected",
- svr_ses.authstate.printableuser);
+ ses.authstate.printableuser);
send_msg_userauth_failure(0, 1);
return;
}
@@ -92,12 +92,12 @@ void passwordauth() {
/* successful authentication */
dropbear_log(LOG_NOTICE,
"password auth succeeded for '%s'",
- svr_ses.authstate.printableuser);
+ ses.authstate.printableuser);
send_msg_userauth_success();
} else {
dropbear_log(LOG_WARNING,
"bad password attempt for '%s'",
- svr_ses.authstate.printableuser);
+ ses.authstate.printableuser);
send_msg_userauth_failure(0, 1);
}