summaryrefslogtreecommitdiff
path: root/source3
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2002-11-24 08:38:53 +0000
committerAndrew Bartlett <abartlet@samba.org>2002-11-24 08:38:53 +0000
commit0b2028e6ce0f2da8c94c80db0d237f1036de8d90 (patch)
treeb84886585712b7656b258a13c57c438ce2fa52c5 /source3
parent94596400e346bcd702e0e184e2ced076e9a106b2 (diff)
downloadsamba-0b2028e6ce0f2da8c94c80db0d237f1036de8d90.tar.gz
samba-0b2028e6ce0f2da8c94c80db0d237f1036de8d90.tar.bz2
samba-0b2028e6ce0f2da8c94c80db0d237f1036de8d90.zip
Remove silly ideas about taking the LM or NT hash as a password in pam_smbpass.
Andrew Bartlett (This used to be commit ce1464fb1c4c00de22b0e65c3199bc2eacea4d65)
Diffstat (limited to 'source3')
-rw-r--r--source3/pam_smbpass/support.c19
1 files changed, 0 insertions, 19 deletions
diff --git a/source3/pam_smbpass/support.c b/source3/pam_smbpass/support.c
index a55dcb0272..11de306d13 100644
--- a/source3/pam_smbpass/support.c
+++ b/source3/pam_smbpass/support.c
@@ -355,25 +355,6 @@ int _smb_verify_password( pam_handle_t * pamh, SAM_ACCOUNT *sampass,
strncpy( data_name, FAIL_PREFIX, sizeof(FAIL_PREFIX) );
strncpy( data_name + sizeof(FAIL_PREFIX) - 1, name, strlen( name ) + 1 );
- /* First we check whether we've been given the password in already
- encrypted form. */
- if (strlen( p ) == 16 || (strlen( p ) == 32
- && pdb_gethexpwd( p, (char *) hash_pass ))) {
-
- if (!memcmp( hash_pass, pdb_get_lanman_passwd(sampass), 16 )
- || (pdb_get_nt_passwd(sampass)
- && !memcmp( hash_pass, pdb_get_nt_passwd(sampass), 16 )))
- {
- retval = PAM_SUCCESS;
- if (data_name) { /* reset failures */
- pam_set_data( pamh, data_name, NULL, _cleanup_failures );
- }
- _pam_delete( data_name );
- memset( hash_pass, '\0', 16 );
- return retval;
- }
- }
-
/*
* The password we were given wasn't an encrypted password, or it
* didn't match the one we have. We encrypt the password now and try