From e8f5cd4ad89acb19a5be34ea24ab56857528a59c Mon Sep 17 00:00:00 2001 From: Tomas Mraz Date: Thu, 1 Feb 2007 21:54:58 +0000 Subject: Relevant BUGIDs: Purpose of commit: bugfix Commit summary: --------------- 2007-02-01 Tomas Mraz * xtests/tst-pam_unix3.c: Fix typos in comments. * modules/pam_unix/support.c (_unix_verify_password): Explicitly disallow '!' in the beginning of password hash. Treat only 13 bytes password hash specifically. (Suggested by Solar Designer.) Fix a warning and test for allocation failure. * modules/pam_unix/unix_chkpwd.c (_unix_verify_password): Likewise. --- xtests/tst-pam_unix3.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'xtests/tst-pam_unix3.c') diff --git a/xtests/tst-pam_unix3.c b/xtests/tst-pam_unix3.c index cb3c7c59..bd5ffca4 100644 --- a/xtests/tst-pam_unix3.c +++ b/xtests/tst-pam_unix3.c @@ -70,7 +70,7 @@ fake_conv (int num_msg, const struct pam_message **msgm UNUSED, for (count = 0; count < num_msg; ++count) { reply[count].resp_retcode = 0; - /* first call get a password, second one a too long one */ + /* first call get a password, second one a too short one */ if (in_test == 1) reply[count].resp = strdup ("pamunix01"); else if (in_test == 2) @@ -122,7 +122,7 @@ main(int argc, char *argv[]) return 1; } - /* Try two, second input is too long */ + /* Try two, second input is too short */ in_test = 2; retval = pam_authenticate (pamh, 0); if (retval != PAM_AUTH_ERR) -- cgit v1.2.3