summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorPavel Březina <pbrezina@redhat.com>2013-01-14 10:29:09 +0100
committerJakub Hrozek <jhrozek@redhat.com>2013-01-14 11:32:42 +0100
commit9c6e14c0d39f36085f11114e1f3155ee120558d5 (patch)
tree20b09f99062a7e89a3cb5d6c314d057ac05d084e /src
parent64af76e2bef2565caa9738f675c108a4b3789237 (diff)
downloadsssd-9c6e14c0d39f36085f11114e1f3155ee120558d5.tar.gz
sssd-9c6e14c0d39f36085f11114e1f3155ee120558d5.tar.bz2
sssd-9c6e14c0d39f36085f11114e1f3155ee120558d5.zip
Fix LDAP authentication - invalid password length
sss_authtok_get_password() already returns length without terminating zero. This broke authentication over LDAP because we removed the last password character.
Diffstat (limited to 'src')
-rw-r--r--src/providers/ldap/sdap_async_connection.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/providers/ldap/sdap_async_connection.c b/src/providers/ldap/sdap_async_connection.c
index da50f4ad..20f282e3 100644
--- a/src/providers/ldap/sdap_async_connection.c
+++ b/src/providers/ldap/sdap_async_connection.c
@@ -1129,7 +1129,7 @@ struct tevent_req *sdap_auth_send(TALLOC_CTX *memctx,
return tevent_req_post(req, ev);
}
pw.bv_val = discard_const(password);
- pw.bv_len = pwlen - 1;
+ pw.bv_len = pwlen;
state->is_sasl = false;
subreq = simple_bind_send(state, ev, sh, user_dn, &pw);