From 165521a9b9b931e281ed8ab2929f78c187f15c6b Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Wed, 27 Jun 2012 12:42:31 +1000 Subject: s4-dsdb: Remove hooks for non-directory password handling This was an interesting hack, and the local_password module still exists, but until it has a use case and a test case, remove the bypass of password_hash. Andrew Bartlett --- source4/dsdb/samdb/ldb_modules/password_hash.c | 12 ------------ 1 file changed, 12 deletions(-) (limited to 'source4/dsdb/samdb') diff --git a/source4/dsdb/samdb/ldb_modules/password_hash.c b/source4/dsdb/samdb/ldb_modules/password_hash.c index c22a0b2713..620de755d8 100644 --- a/source4/dsdb/samdb/ldb_modules/password_hash.c +++ b/source4/dsdb/samdb/ldb_modules/password_hash.c @@ -2760,12 +2760,6 @@ static int password_hash_add(struct ldb_module *module, struct ldb_request *req) return ldb_next_request(module, req); } - /* If the caller is manipulating the local passwords directly, let them pass */ - if (ldb_dn_compare_base(ldb_dn_new(req, ldb, LOCAL_BASE), - req->op.add.message->dn) == 0) { - return ldb_next_request(module, req); - } - bypass = ldb_request_get_control(req, DSDB_CONTROL_BYPASS_PASSWORD_HASH_OID); if (bypass != NULL) { @@ -2959,12 +2953,6 @@ static int password_hash_modify(struct ldb_module *module, struct ldb_request *r return ldb_next_request(module, req); } - /* If the caller is manipulating the local passwords directly, let them pass */ - if (ldb_dn_compare_base(ldb_dn_new(req, ldb, LOCAL_BASE), - req->op.mod.message->dn) == 0) { - return ldb_next_request(module, req); - } - bypass = ldb_request_get_control(req, DSDB_CONTROL_BYPASS_PASSWORD_HASH_OID); if (bypass != NULL) { -- cgit