summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2014-01-22 15:54:15 +1300
committerAndreas Schneider <asn@cryptomilk.org>2014-04-15 10:13:12 +0200
commit6e8eb605454d663643738bc3bf797035022e3a20 (patch)
tree73524e60c20b6b050e2f32cce49a8c9c13438f2f
parente731655f09d7b4bb87cac33738a5f286d453610e (diff)
downloadsamba-6e8eb605454d663643738bc3bf797035022e3a20.tar.gz
samba-6e8eb605454d663643738bc3bf797035022e3a20.tar.xz
samba-6e8eb605454d663643738bc3bf797035022e3a20.zip
auth: Remove linux_bigcrypt support from pass_check.c
This is dead code, and probably has been for quite some time. Signed-off-by: Andrew Bartlett <abartlet@samba.org> Reviewed-by: Andreas Schneider <asn@samba.org>
-rw-r--r--source3/auth/pass_check.c32
-rw-r--r--source4/auth/ntlm/auth_unix.c8
2 files changed, 0 insertions, 40 deletions
diff --git a/source3/auth/pass_check.c b/source3/auth/pass_check.c
index a5e03202b8..2941bc07f8 100644
--- a/source3/auth/pass_check.c
+++ b/source3/auth/pass_check.c
@@ -67,30 +67,6 @@ static const char *set_this_crypted(const char *newcrypted)
-#ifdef LINUX_BIGCRYPT
-/****************************************************************************
-an enhanced crypt for Linux to handle password longer than 8 characters
-****************************************************************************/
-static int linux_bigcrypt(char *password, char *salt1, char *crypted)
-{
-#define LINUX_PASSWORD_SEG_CHARS 8
- char salt[3];
- int i;
-
- StrnCpy(salt, salt1, 2);
- crypted += 2;
-
- for (i = strlen(password); i > 0; i -= LINUX_PASSWORD_SEG_CHARS) {
- char *p = crypt(password, salt) + 2;
- if (strncmp(p, crypted, LINUX_PASSWORD_SEG_CHARS) != 0)
- return (0);
- password += LINUX_PASSWORD_SEG_CHARS;
- crypted += strlen(p);
- }
-
- return (1);
-}
-#endif
@@ -119,14 +95,6 @@ static NTSTATUS password_check(const char *user, const char *password, const voi
#endif /* ULTRIX_AUTH */
-#ifdef LINUX_BIGCRYPT
- ret = (linux_bigcrypt(password, get_this_salt(), get_this_crypted()));
- if (ret) {
- return NT_STATUS_OK;
- } else {
- return NT_STATUS_WRONG_PASSWORD;
- }
-#endif /* LINUX_BIGCRYPT */
#if defined(HAVE_BIGCRYPT) && defined(HAVE_CRYPT) && defined(USE_BOTH_CRYPT_CALLS)
diff --git a/source4/auth/ntlm/auth_unix.c b/source4/auth/ntlm/auth_unix.c
index 169e9abf8b..d1f62858ea 100644
--- a/source4/auth/ntlm/auth_unix.c
+++ b/source4/auth/ntlm/auth_unix.c
@@ -542,14 +542,6 @@ static NTSTATUS password_check(const char *username, const char *password,
#endif /* ULTRIX_AUTH */
-#ifdef LINUX_BIGCRYPT
- ret = (linux_bigcrypt(password, salt, crypted));
- if (ret) {
- return NT_STATUS_OK;
- } else {
- return NT_STATUS_WRONG_PASSWORD;
- }
-#endif /* LINUX_BIGCRYPT */
#if defined(HAVE_BIGCRYPT) && defined(HAVE_CRYPT) && defined(USE_BOTH_CRYPT_CALLS)