From 2713445e916325bad78a7f6b67eb264c503173d5 Mon Sep 17 00:00:00 2001 From: Matt Johnston Date: Wed, 9 May 2012 22:37:04 +0800 Subject: Return immediate success for blank passwords if allowed --- svr-authpasswd.c | 10 ---------- 1 file changed, 10 deletions(-) (limited to 'svr-authpasswd.c') diff --git a/svr-authpasswd.c b/svr-authpasswd.c index 54b4889..ceeb4d8 100644 --- a/svr-authpasswd.c +++ b/svr-authpasswd.c @@ -36,9 +36,6 @@ * appropriate */ void svr_auth_password() { -#ifdef HAVE_SHADOW_H - struct spwd *spasswd = NULL; -#endif char * passwdcrypt = NULL; /* the crypt from /etc/passwd or /etc/shadow */ char * testcrypt = NULL; /* crypt generated from the user's password sent */ unsigned char * password; @@ -48,13 +45,6 @@ void svr_auth_password() { unsigned int changepw; passwdcrypt = ses.authstate.pw_passwd; -#ifdef HAVE_SHADOW_H - /* get the shadow password if possible */ - spasswd = getspnam(ses.authstate.pw_name); - if (spasswd != NULL && spasswd->sp_pwdp != NULL) { - passwdcrypt = spasswd->sp_pwdp; - } -#endif #ifdef DEBUG_HACKCRYPT /* debugging crypt for non-root testing with shadows */ -- cgit v1.2.3