diff options
author | Andrew Bartlett <abartlet@samba.org> | 2014-01-22 15:54:15 +1300 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2014-04-15 10:13:12 +0200 |
commit | 6e8eb605454d663643738bc3bf797035022e3a20 (patch) | |
tree | 73524e60c20b6b050e2f32cce49a8c9c13438f2f | |
parent | e731655f09d7b4bb87cac33738a5f286d453610e (diff) | |
download | samba-6e8eb605454d663643738bc3bf797035022e3a20.tar.gz samba-6e8eb605454d663643738bc3bf797035022e3a20.tar.xz samba-6e8eb605454d663643738bc3bf797035022e3a20.zip |
auth: Remove linux_bigcrypt support from pass_check.c
This is dead code, and probably has been for quite some time.
Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Andreas Schneider <asn@samba.org>
-rw-r--r-- | source3/auth/pass_check.c | 32 | ||||
-rw-r--r-- | source4/auth/ntlm/auth_unix.c | 8 |
2 files changed, 0 insertions, 40 deletions
diff --git a/source3/auth/pass_check.c b/source3/auth/pass_check.c index a5e03202b8..2941bc07f8 100644 --- a/source3/auth/pass_check.c +++ b/source3/auth/pass_check.c @@ -67,30 +67,6 @@ static const char *set_this_crypted(const char *newcrypted) -#ifdef LINUX_BIGCRYPT -/**************************************************************************** -an enhanced crypt for Linux to handle password longer than 8 characters -****************************************************************************/ -static int linux_bigcrypt(char *password, char *salt1, char *crypted) -{ -#define LINUX_PASSWORD_SEG_CHARS 8 - char salt[3]; - int i; - - StrnCpy(salt, salt1, 2); - crypted += 2; - - for (i = strlen(password); i > 0; i -= LINUX_PASSWORD_SEG_CHARS) { - char *p = crypt(password, salt) + 2; - if (strncmp(p, crypted, LINUX_PASSWORD_SEG_CHARS) != 0) - return (0); - password += LINUX_PASSWORD_SEG_CHARS; - crypted += strlen(p); - } - - return (1); -} -#endif @@ -119,14 +95,6 @@ static NTSTATUS password_check(const char *user, const char *password, const voi #endif /* ULTRIX_AUTH */ -#ifdef LINUX_BIGCRYPT - ret = (linux_bigcrypt(password, get_this_salt(), get_this_crypted())); - if (ret) { - return NT_STATUS_OK; - } else { - return NT_STATUS_WRONG_PASSWORD; - } -#endif /* LINUX_BIGCRYPT */ #if defined(HAVE_BIGCRYPT) && defined(HAVE_CRYPT) && defined(USE_BOTH_CRYPT_CALLS) diff --git a/source4/auth/ntlm/auth_unix.c b/source4/auth/ntlm/auth_unix.c index 169e9abf8b..d1f62858ea 100644 --- a/source4/auth/ntlm/auth_unix.c +++ b/source4/auth/ntlm/auth_unix.c @@ -542,14 +542,6 @@ static NTSTATUS password_check(const char *username, const char *password, #endif /* ULTRIX_AUTH */ -#ifdef LINUX_BIGCRYPT - ret = (linux_bigcrypt(password, salt, crypted)); - if (ret) { - return NT_STATUS_OK; - } else { - return NT_STATUS_WRONG_PASSWORD; - } -#endif /* LINUX_BIGCRYPT */ #if defined(HAVE_BIGCRYPT) && defined(HAVE_CRYPT) && defined(USE_BOTH_CRYPT_CALLS) |