diff options
author | Dmitry V. Levin <ldv@altlinux.org> | 2021-09-03 08:00:00 +0000 |
---|---|---|
committer | Dmitry V. Levin <ldv@altlinux.org> | 2021-09-03 08:00:00 +0000 |
commit | 40f7d85f3736d058c26de1dafa4fed46de7d75ef (patch) | |
tree | a0f392301c747315b22a6d64f5279442134c35aa | |
parent | 49e3ffcbe267691dfbf24c91417aa296e7412146 (diff) | |
download | pam-40f7d85f3736d058c26de1dafa4fed46de7d75ef.tar.gz pam-40f7d85f3736d058c26de1dafa4fed46de7d75ef.tar.bz2 pam-40f7d85f3736d058c26de1dafa4fed46de7d75ef.zip |
Fix a typo found using codespell tool
* modules/pam_pwhistory/pam_pwhistory.c: Replace "crypted password" with
"hashed password" in comment.
* modules/pam_unix/passverify.c (create_password_hash): Rename "crypted"
local variable to "hashed".
-rw-r--r-- | modules/pam_pwhistory/pam_pwhistory.c | 2 | ||||
-rw-r--r-- | modules/pam_unix/passverify.c | 6 |
2 files changed, 4 insertions, 4 deletions
diff --git a/modules/pam_pwhistory/pam_pwhistory.c b/modules/pam_pwhistory/pam_pwhistory.c index a16365f8..ce2c21f5 100644 --- a/modules/pam_pwhistory/pam_pwhistory.c +++ b/modules/pam_pwhistory/pam_pwhistory.c @@ -282,7 +282,7 @@ run_check_helper(pam_handle_t *pamh, const char *user, return retval; } -/* This module saves the current crypted password in /etc/security/opasswd +/* This module saves the current hashed password in /etc/security/opasswd and then compares the new password with all entries in this file. */ int diff --git a/modules/pam_unix/passverify.c b/modules/pam_unix/passverify.c index fd81051d..f2474a5b 100644 --- a/modules/pam_unix/passverify.c +++ b/modules/pam_unix/passverify.c @@ -447,7 +447,7 @@ PAMH_ARG_DECL(char * create_password_hash, algoid = "$6$"; } else { /* must be crypt/bigcrypt */ char tmppass[9]; - char *crypted; + char *hashed; crypt_make_salt(salt, 2); if (off(UNIX_BIGCRYPT, ctrl) && strlen(password) > 8) { @@ -455,10 +455,10 @@ PAMH_ARG_DECL(char * create_password_hash, tmppass[sizeof(tmppass)-1] = '\0'; password = tmppass; } - crypted = bigcrypt(password, salt); + hashed = bigcrypt(password, salt); memset(tmppass, '\0', sizeof(tmppass)); password = NULL; - return crypted; + return hashed; } #if defined(CRYPT_GENSALT_IMPLEMENTS_AUTO_ENTROPY) && CRYPT_GENSALT_IMPLEMENTS_AUTO_ENTROPY |