diff options
author | Andrew Bartlett <abartlet@samba.org> | 2012-06-27 12:42:31 +1000 |
---|---|---|
committer | Andrew Bartlett <abartlet@samba.org> | 2012-06-27 11:29:17 +0200 |
commit | 165521a9b9b931e281ed8ab2929f78c187f15c6b (patch) | |
tree | 9b17a9956c1ab53109b33015e2f32fbc5af143c3 /source4/dsdb | |
parent | 4f587ffa553e4ad6d33bb8880eb03be48421f73c (diff) | |
download | samba-165521a9b9b931e281ed8ab2929f78c187f15c6b.tar.gz samba-165521a9b9b931e281ed8ab2929f78c187f15c6b.tar.bz2 samba-165521a9b9b931e281ed8ab2929f78c187f15c6b.zip |
s4-dsdb: Remove hooks for non-directory password handling
This was an interesting hack, and the local_password module still exists, but
until it has a use case and a test case, remove the bypass of password_hash.
Andrew Bartlett
Diffstat (limited to 'source4/dsdb')
-rw-r--r-- | source4/dsdb/samdb/ldb_modules/password_hash.c | 12 |
1 files changed, 0 insertions, 12 deletions
diff --git a/source4/dsdb/samdb/ldb_modules/password_hash.c b/source4/dsdb/samdb/ldb_modules/password_hash.c index c22a0b2713..620de755d8 100644 --- a/source4/dsdb/samdb/ldb_modules/password_hash.c +++ b/source4/dsdb/samdb/ldb_modules/password_hash.c @@ -2760,12 +2760,6 @@ static int password_hash_add(struct ldb_module *module, struct ldb_request *req) return ldb_next_request(module, req); } - /* If the caller is manipulating the local passwords directly, let them pass */ - if (ldb_dn_compare_base(ldb_dn_new(req, ldb, LOCAL_BASE), - req->op.add.message->dn) == 0) { - return ldb_next_request(module, req); - } - bypass = ldb_request_get_control(req, DSDB_CONTROL_BYPASS_PASSWORD_HASH_OID); if (bypass != NULL) { @@ -2959,12 +2953,6 @@ static int password_hash_modify(struct ldb_module *module, struct ldb_request *r return ldb_next_request(module, req); } - /* If the caller is manipulating the local passwords directly, let them pass */ - if (ldb_dn_compare_base(ldb_dn_new(req, ldb, LOCAL_BASE), - req->op.mod.message->dn) == 0) { - return ldb_next_request(module, req); - } - bypass = ldb_request_get_control(req, DSDB_CONTROL_BYPASS_PASSWORD_HASH_OID); if (bypass != NULL) { |