From ce173531cb1170071b7229ea61773b3e147b398c Mon Sep 17 00:00:00 2001 From: des Date: Sat, 6 Apr 2002 19:30:04 +0000 Subject: Aggressive cleanup of warnings + authtok-related code in preparation for PAMifying passwd(1). Sponsored by: DARPA, NAI Labs. --- lib/libpam/modules/pam_radius/pam_radius.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'lib/libpam/modules/pam_radius/pam_radius.c') diff --git a/lib/libpam/modules/pam_radius/pam_radius.c b/lib/libpam/modules/pam_radius/pam_radius.c index 4e19f82..56eaff4 100644 --- a/lib/libpam/modules/pam_radius/pam_radius.c +++ b/lib/libpam/modules/pam_radius/pam_radius.c @@ -1,7 +1,7 @@ /*- * Copyright 1998 Juniper Networks, Inc. * All rights reserved. - * Copyright (c) 2001 Networks Associates Technology, Inc. + * Copyright (c) 2001,2002 Networks Associates Technology, Inc. * All rights reserved. * * Portions of this software were developed for the FreeBSD Project by @@ -63,7 +63,7 @@ static struct opttab other_options[] = { }; #define MAX_CHALLENGE_MSGS 10 -#define PASSWORD_PROMPT "RADIUS password:" +#define PASSWORD_PROMPT "RADIUS Password:" static int build_access_request(struct rad_handle *, const char *, const char *, const void *, size_t); @@ -237,7 +237,7 @@ pam_sm_authenticate(pam_handle_t *pamh, int flags __unused, int argc, const char PAM_LOG("Got user: %s", user); - retval = pam_get_authtok(pamh, &pass, PASSWORD_PROMPT); + retval = pam_get_authtok(pamh, PAM_AUTHTOK, &pass, PASSWORD_PROMPT); if (retval != PAM_SUCCESS) PAM_RETURN(retval); -- cgit v1.1