summaryrefslogtreecommitdiff
path: root/source3/auth/pampass.c
diff options
context:
space:
mode:
authorJeremy Allison <jra@samba.org>2005-12-16 01:41:12 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 11:05:51 -0500
commit10b5609a1458d156938302a5a26c11913c340476 (patch)
treea685463981ae47099626603cb7a487deda9db4a9 /source3/auth/pampass.c
parent76796e212c0f1dc7587be138daac9c4ef093db4b (diff)
downloadsamba-10b5609a1458d156938302a5a26c11913c340476.tar.gz
samba-10b5609a1458d156938302a5a26c11913c340476.tar.bz2
samba-10b5609a1458d156938302a5a26c11913c340476.zip
r12279: unix_mask_match has been broken for *ever*... (How).
Ensure it returns a BOOL. Jerry (and anyone else) please check this, I think all uses are now correct but could do with another set of eyes. Essential for 3.0.21 release. Jeremy. (This used to be commit 0c7b8a7637e760fcb6629092f36b610b8c71f5c9)
Diffstat (limited to 'source3/auth/pampass.c')
-rw-r--r--source3/auth/pampass.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/source3/auth/pampass.c b/source3/auth/pampass.c
index 18d83ee364..26b45c5ff8 100644
--- a/source3/auth/pampass.c
+++ b/source3/auth/pampass.c
@@ -310,7 +310,7 @@ static int smb_pam_passchange_conv(int num_msg,
DEBUG(10,("smb_pam_passchange_conv: PAM_PROMPT_ECHO_ON: trying to match |%s| to |%s|\n",
t->prompt, current_prompt ));
- if (unix_wild_match(t->prompt, current_prompt) == 0) {
+ if (unix_wild_match(t->prompt, current_prompt)) {
fstrcpy(current_reply, t->reply);
DEBUG(10,("smb_pam_passchange_conv: PAM_PROMPT_ECHO_ON: We sent: %s\n", current_reply));
pwd_sub(current_reply, udp->PAM_username, udp->PAM_password, udp->PAM_newpassword);
@@ -341,7 +341,7 @@ static int smb_pam_passchange_conv(int num_msg,
DEBUG(10,("smb_pam_passchange_conv: PAM_PROMPT_ECHO_OFF: trying to match |%s| to |%s|\n",
t->prompt, current_prompt ));
- if (unix_wild_match(t->prompt, current_prompt) == 0) {
+ if (unix_wild_match(t->prompt, current_prompt)) {
fstrcpy(current_reply, t->reply);
DEBUG(10,("smb_pam_passchange_conv: PAM_PROMPT_ECHO_OFF: We sent: %s\n", current_reply));
pwd_sub(current_reply, udp->PAM_username, udp->PAM_password, udp->PAM_newpassword);