From 0c1e9795ad93a2f801db37d8e71a1b9d7d074ce8 Mon Sep 17 00:00:00 2001 From: "Andrew G. Morgan" Date: Mon, 12 Nov 2001 05:04:52 +0000 Subject: [PATCH] Relevant BUGIDs: 460717 Purpose of commit: bugfix Commit summary: --------------- it seems there was a slight problem with md5 compatibility with respect to bigendian non-md5 hash support. --- CHANGELOG | 3 +++ modules/pam_pwdb/pam_unix_md.-c | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/CHANGELOG b/CHANGELOG index d84253e5..413c56c1 100644 --- a/CHANGELOG +++ b/CHANGELOG @@ -49,6 +49,9 @@ bug report - outstanding bugs are listed here: 0.76: please submit patches for this section with actual code/doc patches! +* pam_pwdb: Solar Designer pointed out that there was a problem with + the compatibility support for md5 password hashing. (Bug 460717 - + agmorgan) * pam_issue: Nalin found segfaulting problems if the PAM_USER_PROMPT is unset, found some similar problems with assumptions about realloc. (Bug 476983 - agmorgan) diff --git a/modules/pam_pwdb/pam_unix_md.-c b/modules/pam_pwdb/pam_unix_md.-c index d9b2c51b..65476732 100644 --- a/modules/pam_pwdb/pam_unix_md.-c +++ b/modules/pam_pwdb/pam_unix_md.-c @@ -65,7 +65,7 @@ static char *_pam_md_compat(const char *key, const char *salt) x = x_strdup(e); /* put e in malloc()ed memory */ _pam_overwrite(e); /* clean up */ } else { - x = x_strdup("*"); + x = x_strdup(""); /* called from only one place so this is safe */ } return x; /* this must be deleted elsewhere */ -- 2.40.0