freebsd-skq/contrib/opie/libopie
ache 3b103d7c51 MFC: r269806,r269809,r269811,r269810
r269806:
Fix too long (seed length >12 chars) challenge handling.
1) " ext" length should be included into OPIE_CHALLENGE_MAX (as all places
of opie code expects that).
2) Overflow check in challenge.c is off by 1 even with corrected
OPIE_CHALLENGE_MAX
3) When fallback to randomchallenge() happens and rval is 0 (i.e.
challenge is too long), its value should be set to error state too.

To demonstrate the bug, run opiepasswd with valid seed:
opiepasswd -s 1234567890123456
and notice that it falls back to randomchallenge() (i.e. no
1234567890123456 in the prompt).

r269809:
When sha1 support was added, they forget to increase OPIE_HASHNAME_MAX

r269811:
Last '/' for program name, not first one.

r269810:
Link otp-sha1 to match real challenge prompt, not otp-sha.

PR:     191511
Submitted by: mitsururike@gmail.com (partially, PR 269806)
2014-08-18 02:13:45 +00:00
..
accessfile.c
atob8.c
btoa8.c
btoe.c
btoh.c
challenge.c MFC: r269806,r269809,r269811,r269810 2014-08-18 02:13:45 +00:00
generator.c
getsequence.c
getutmpentry.c
hash.c RFC 2289 requires all hashes be stored in little endian format before 2012-08-10 04:48:58 +00:00
hashlen.c RFC 2289 requires all hashes be stored in little endian format before 2012-08-10 04:48:58 +00:00
insecure.c
keycrunch.c
lock.c
login.c
logwtmp.c
lookup.c
Makefile.in Clean up hardcoded ar(1) flags in the tree to use the global ARFLAGS in 2012-12-06 01:31:25 +00:00
md4c.c
md5c.c
newseed.c
open.c
parsechallenge.c
passcheck.c
passwd.c
randomchallenge.c
readpass.c
readrec.c
unlock.c
verify.c
version.c
writerec.c