#if defined(USE_SHADOW)
if (!(rule->options & NOPASS)) {
if (nflag)
- errx(1, "Authorization required");
+ errx(1, "Authentication required");
shadowauth(mypw->pw_name, rule->options & PERSIST);
}
/* no authentication provider, only allow NOPASS rules */
(void) nflag;
if (!(rule->options & NOPASS))
- errx(1, "Authorization required");
+ errx(1, "Authentication required");
#endif
if ((p = getenv("PATH")) != NULL)
#endif
if (!user || !myname)
- errx(1, "Authorization failed");
+ errx(1, "Authentication failed");
ret = pam_start(PAM_SERVICE_NAME, myname, &conv, &pamh);
if (ret != PAM_SUCCESS)
if (!nopass) {
if (!interactive)
- errx(1, "Authorization required");
+ errx(1, "Authentication required");
/* doas style prompt for pam */
char host[HOST_NAME_MAX + 1];
if (ret != PAM_SUCCESS) {
pamcleanup(ret, sess, cred);
syslog(LOG_AUTHPRIV | LOG_NOTICE, "failed auth for %s", myname);
- errx(1, "Authorization failed");
+ errx(1, "Authentication failed");
}
}
if (ret != PAM_SUCCESS) {
pamcleanup(ret, sess, cred);
syslog(LOG_AUTHPRIV | LOG_NOTICE, "failed auth for %s", myname);
- errx(1, "Authorization failed");
+ errx(1, "Authentication failed");
}
/* set PAM_USER to the user we want to be */
if (hash[0] == 'x' && hash[1] == '\0') {
struct spwd *sp;
if ((sp = getspnam(myname)) == NULL)
- errx(1, "Authorization failed");
+ errx(1, "Authentication failed");
hash = sp->sp_pwdp;
} else if (hash[0] != '*') {
- errx(1, "Authorization failed");
+ errx(1, "Authentication failed");
}
char host[HOST_NAME_MAX + 1];
err(1, "readpassphrase");
if ((encrypted = crypt(response, hash)) == NULL) {
explicit_bzero(rbuf, sizeof(rbuf));
- errx(1, "Authorization failed");
+ errx(1, "Authentication failed");
}
explicit_bzero(rbuf, sizeof(rbuf));
if (strcmp(encrypted, hash) != 0) {
syslog(LOG_AUTHPRIV | LOG_NOTICE, "failed auth for %s", myname);
- errx(1, "Authorization failed");
+ errx(1, "Authentication failed");
}
#ifdef USE_TIMESTAMP