From 067affee9267fa0d1c21835182ba639ba33e820f Mon Sep 17 00:00:00 2001 From: "Andrew G. Morgan" Date: Tue, 9 Jul 2002 04:44:18 +0000 Subject: Relevant BUGIDs: 521314 Purpose of commit: bugfix Commit summary: --------------- bigcrypt does not match crypt when password length is too long. This led to a pam_unix problem when the module had not set the password in bigcrypt mode, but was trying to compare with bigcrypt output. The fix is to use the stored password as a guide to how much of the encrypted password to compare against. --- modules/pam_unix/pam_unix_passwd.c | 2 ++ 1 file changed, 2 insertions(+) (limited to 'modules/pam_unix/pam_unix_passwd.c') diff --git a/modules/pam_unix/pam_unix_passwd.c b/modules/pam_unix/pam_unix_passwd.c index fcfe187e..6b51a6b2 100644 --- a/modules/pam_unix/pam_unix_passwd.c +++ b/modules/pam_unix/pam_unix_passwd.c @@ -965,6 +965,8 @@ PAM_EXTERN int pam_sm_chauthtok(pam_handle_t * pamh, int flags, /* * to avoid using the _extensions_ of the bigcrypt() * function we truncate the newly entered password + * [Problems that followed from this are fixed as per + * Bug 521314.] */ char *temp = malloc(9); -- cgit v1.2.3