Commit Graph

11 Commits

Author SHA1 Message Date
christos 6a6c8f616b PR/45805: Borodin Oleg: telnet/telnetd with -DAUTHENTICATION -DENCRYPTION
(rfc2941)
- minimal fixes to compile with WARNS=4
- separate kerberos (USE_KERBEROS) from encryption (MKCRYPTO)
2012-01-09 15:25:33 +00:00
christos cdf62a44d3 - use defines for lengths
- strlcpy/snprintf
- KNK
2011-07-01 15:09:28 +00:00
joerg cfdb8ebbda Fix memset usage. XXX should use static allocate and proper sizeof() 2011-07-01 01:15:27 +00:00
christos 23dfb0b17f eliminate unused passpromptlen and copy a default password each time we
don't receive one in SRA_CONTINUE.
2005-10-25 23:36:07 +00:00
christos 64fe9d910c XXX: SRA does not have a protocol feature to pass back a password prompt
which is needed for things like S/KEY. We abuse the SRA_CONTINUE message
passing the password prompt there. That is usually NULL, so SRA
implementations usually ignore it. While I am here, if telnet_gets() fails
[user hit <eof> for example], then we exit.
2005-10-25 22:03:34 +00:00
lukem 0d885c3aa4 Don't perform a check for "secure" tty for root logins when using PAM;
that is what we provide pam_securetty(8) for.

Fix the -DNOPAM build option by allowing it to compile
(even though we don't use this source file when USE_PAM=no).
2005-05-05 23:21:58 +00:00
lukem f4ee085480 PAM may change the user name during the authentication process;
ensure that we deal with this so that SRA authenticated logins
will pass the changed user name to login(1).
2005-05-05 22:43:56 +00:00
lukem 94b84ac8a2 Fix the check for insecure root logins in rootterm():
- It was originally referring to a bogus version of `line'.
  (problem solved by using 'extern char *line' instead of 'extern char line[]')
- It wasn't stripping the leading "/dev/" off `line' before calling getttynam(3)
2005-05-05 02:20:45 +00:00
christos 262b0ba97f check pwd != NULL 2005-04-19 03:19:46 +00:00
christos 382db3eda9 Use getpwnam_r. From john nemeth. 2005-04-09 22:43:51 +00:00
christos 185393efaa PAM support from FreeBSD. 2005-02-19 21:55:52 +00:00