/* * This file is part of the UCB release of Plan 9. It is subject to the license * terms in the LICENSE file found in the top-level directory of this * distribution and at http://akaros.cs.berkeley.edu/files/Plan9License. No * part of the UCB release of Plan 9, including this file, may be copied, * modified, propagated, or distributed except according to the terms contained * in the LICENSE file. */ #include #include #include #define CHAR(x) *p++ = f->x #define SHORT(x) p[0] = f->x; p[1] = f->x>>8; p += 2 #define VLONG(q) p[0] = (q); p[1] = (q)>>8; p[2] = (q)>>16; p[3] = (q)>>24; p += 4 #define LONG(x) VLONG(f->x) #define STRING(x,n) memmove(p, f->x, n); p += n int convPR2M(Passwordreq *f, char *ap, char *key) { int n; uint8_t *p; p = (uint8_t*)ap; CHAR(num); STRING(old, ANAMELEN); STRING(new, ANAMELEN); CHAR(changesecret); STRING(secret, SECRETLEN); n = p - (uint8_t*)ap; if(key) encrypt(key, ap, n); return n; }