summaryrefslogtreecommitdiff
path: root/auth-passwd.c
diff options
context:
space:
mode:
authormouring <mouring>2002-05-10 02:40:15 +0000
committermouring <mouring>2002-05-10 02:40:15 +0000
commit9e5b1381f9357439fc61c7eec4bf7f847f38e28d (patch)
tree5d9c91b01e046dd12c10e0258a3e10555671cf18 /auth-passwd.c
parent5712abd3068f86d8ddec85f32da614b59bdbff21 (diff)
downloadopenssh-9e5b1381f9357439fc61c7eec4bf7f847f38e28d.tar.gz
- (bal) Back all the way out of auth-passwd.c changes. Breaks too many
things that don't set pw->pw_passwd.
Diffstat (limited to 'auth-passwd.c')
-rw-r--r--auth-passwd.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/auth-passwd.c b/auth-passwd.c
index 348ab9dd..58c11364 100644
--- a/auth-passwd.c
+++ b/auth-passwd.c
@@ -36,7 +36,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: auth-passwd.c,v 1.25 2002/05/06 23:00:59 mouring Exp $");
+RCSID("$OpenBSD: auth-passwd.c,v 1.24 2002/03/04 12:43:06 markus Exp $");
#include "packet.h"
#include "log.h"
@@ -89,16 +89,16 @@ extern ServerOptions options;
int
auth_password(Authctxt *authctxt, const char *password)
{
- struct passwd * pw = authctxt->pw;
#if defined(USE_PAM)
- if (*pw->pw_passwd == '\0' && options.permit_empty_passwd == 0)
+ if (*password == '\0' && options.permit_empty_passwd == 0)
return 0;
return auth_pam_password(authctxt, password);
#elif defined(HAVE_OSF_SIA)
- if (*pw->pw_passwd == '\0' && options.permit_empty_passwd == 0)
+ if (*password == '\0' && options.permit_empty_passwd == 0)
return 0;
return auth_sia_password(authctxt, password);
#else
+ struct passwd * pw = authctxt->pw;
char *encrypted_password;
char *pw_password;
char *salt;
@@ -131,7 +131,7 @@ auth_password(Authctxt *authctxt, const char *password)
*/
if (!is_winnt)
#endif
- if (*pw->pw_passwd == '\0' && options.permit_empty_passwd == 0)
+ if (*password == '\0' && options.permit_empty_passwd == 0)
return 0;
#ifdef KRB5
if (options.kerberos_authentication == 1) {