summaryrefslogtreecommitdiff
path: root/source4
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2012-06-27 12:42:31 +1000
committerAndrew Bartlett <abartlet@samba.org>2012-06-27 11:29:17 +0200
commit165521a9b9b931e281ed8ab2929f78c187f15c6b (patch)
tree9b17a9956c1ab53109b33015e2f32fbc5af143c3 /source4
parent4f587ffa553e4ad6d33bb8880eb03be48421f73c (diff)
downloadsamba-165521a9b9b931e281ed8ab2929f78c187f15c6b.tar.gz
samba-165521a9b9b931e281ed8ab2929f78c187f15c6b.tar.bz2
samba-165521a9b9b931e281ed8ab2929f78c187f15c6b.zip
s4-dsdb: Remove hooks for non-directory password handling
This was an interesting hack, and the local_password module still exists, but until it has a use case and a test case, remove the bypass of password_hash. Andrew Bartlett
Diffstat (limited to 'source4')
-rw-r--r--source4/dsdb/samdb/ldb_modules/password_hash.c12
1 files changed, 0 insertions, 12 deletions
diff --git a/source4/dsdb/samdb/ldb_modules/password_hash.c b/source4/dsdb/samdb/ldb_modules/password_hash.c
index c22a0b2713..620de755d8 100644
--- a/source4/dsdb/samdb/ldb_modules/password_hash.c
+++ b/source4/dsdb/samdb/ldb_modules/password_hash.c
@@ -2760,12 +2760,6 @@ static int password_hash_add(struct ldb_module *module, struct ldb_request *req)
return ldb_next_request(module, req);
}
- /* If the caller is manipulating the local passwords directly, let them pass */
- if (ldb_dn_compare_base(ldb_dn_new(req, ldb, LOCAL_BASE),
- req->op.add.message->dn) == 0) {
- return ldb_next_request(module, req);
- }
-
bypass = ldb_request_get_control(req,
DSDB_CONTROL_BYPASS_PASSWORD_HASH_OID);
if (bypass != NULL) {
@@ -2959,12 +2953,6 @@ static int password_hash_modify(struct ldb_module *module, struct ldb_request *r
return ldb_next_request(module, req);
}
- /* If the caller is manipulating the local passwords directly, let them pass */
- if (ldb_dn_compare_base(ldb_dn_new(req, ldb, LOCAL_BASE),
- req->op.mod.message->dn) == 0) {
- return ldb_next_request(module, req);
- }
-
bypass = ldb_request_get_control(req,
DSDB_CONTROL_BYPASS_PASSWORD_HASH_OID);
if (bypass != NULL) {