diff options
author | Andrew Bartlett <abartlet@samba.org> | 2002-11-24 08:38:53 +0000 |
---|---|---|
committer | Andrew Bartlett <abartlet@samba.org> | 2002-11-24 08:38:53 +0000 |
commit | 0b2028e6ce0f2da8c94c80db0d237f1036de8d90 (patch) | |
tree | b84886585712b7656b258a13c57c438ce2fa52c5 | |
parent | 94596400e346bcd702e0e184e2ced076e9a106b2 (diff) | |
download | samba-0b2028e6ce0f2da8c94c80db0d237f1036de8d90.tar.gz samba-0b2028e6ce0f2da8c94c80db0d237f1036de8d90.tar.bz2 samba-0b2028e6ce0f2da8c94c80db0d237f1036de8d90.zip |
Remove silly ideas about taking the LM or NT hash as a password in pam_smbpass.
Andrew Bartlett
(This used to be commit ce1464fb1c4c00de22b0e65c3199bc2eacea4d65)
-rw-r--r-- | source3/pam_smbpass/support.c | 19 |
1 files changed, 0 insertions, 19 deletions
diff --git a/source3/pam_smbpass/support.c b/source3/pam_smbpass/support.c index a55dcb0272..11de306d13 100644 --- a/source3/pam_smbpass/support.c +++ b/source3/pam_smbpass/support.c @@ -355,25 +355,6 @@ int _smb_verify_password( pam_handle_t * pamh, SAM_ACCOUNT *sampass, strncpy( data_name, FAIL_PREFIX, sizeof(FAIL_PREFIX) ); strncpy( data_name + sizeof(FAIL_PREFIX) - 1, name, strlen( name ) + 1 ); - /* First we check whether we've been given the password in already - encrypted form. */ - if (strlen( p ) == 16 || (strlen( p ) == 32 - && pdb_gethexpwd( p, (char *) hash_pass ))) { - - if (!memcmp( hash_pass, pdb_get_lanman_passwd(sampass), 16 ) - || (pdb_get_nt_passwd(sampass) - && !memcmp( hash_pass, pdb_get_nt_passwd(sampass), 16 ))) - { - retval = PAM_SUCCESS; - if (data_name) { /* reset failures */ - pam_set_data( pamh, data_name, NULL, _cleanup_failures ); - } - _pam_delete( data_name ); - memset( hash_pass, '\0', 16 ); - return retval; - } - } - /* * The password we were given wasn't an encrypted password, or it * didn't match the one we have. We encrypt the password now and try |