summaryrefslogtreecommitdiff
path: root/auth-passwd.c
diff options
context:
space:
mode:
authormouring <mouring>2002-05-06 23:06:08 +0000
committermouring <mouring>2002-05-06 23:06:08 +0000
commitd06207f6526271623823d7e898ad42b7db08d846 (patch)
tree147d804d8632428e0ed23f0cfebe2f7076ab2ee7 /auth-passwd.c
parent51e3470cca0fb851f7159e165425c14c1f907966 (diff)
downloadopenssh-d06207f6526271623823d7e898ad42b7db08d846.tar.gz
- (bal) Fixed auth-passwd.c to resolve PermitEmptyPassword issue
Diffstat (limited to 'auth-passwd.c')
-rw-r--r--auth-passwd.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/auth-passwd.c b/auth-passwd.c
index 58c11364..896f1c26 100644
--- a/auth-passwd.c
+++ b/auth-passwd.c
@@ -36,7 +36,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: auth-passwd.c,v 1.24 2002/03/04 12:43:06 markus Exp $");
+RCSID("$OpenBSD: auth-passwd.c,v 1.25 2002/05/06 23:00:59 mouring Exp $");
#include "packet.h"
#include "log.h"
@@ -90,11 +90,11 @@ int
auth_password(Authctxt *authctxt, const char *password)
{
#if defined(USE_PAM)
- if (*password == '\0' && options.permit_empty_passwd == 0)
+ if (*pw->pw_passwd == '\0' && options.permit_empty_passwd == 0)
return 0;
return auth_pam_password(authctxt, password);
#elif defined(HAVE_OSF_SIA)
- if (*password == '\0' && options.permit_empty_passwd == 0)
+ if (*pw->pw_passwd == '\0' && options.permit_empty_passwd == 0)
return 0;
return auth_sia_password(authctxt, password);
#else
@@ -131,7 +131,7 @@ auth_password(Authctxt *authctxt, const char *password)
*/
if (!is_winnt)
#endif
- if (*password == '\0' && options.permit_empty_passwd == 0)
+ if (*pw->pw_passwd == '\0' && options.permit_empty_passwd == 0)
return 0;
#ifdef KRB5
if (options.kerberos_authentication == 1) {