pass_check.c could receive encrypted password: printing it out as a %s
authorLuke Leighton <lkcl@samba.org>
Mon, 8 Mar 1999 18:43:50 +0000 (18:43 +0000)
committerLuke Leighton <lkcl@samba.org>
Mon, 8 Mar 1999 18:43:50 +0000 (18:43 +0000)
results in garbage.  with no password length argument doing dump_data(
100, password, strlen(password)) is the next best alternative.

source/auth/pass_check.c
source/passdb/pass_check.c

index d847407bbb4c6272a7de8ed6c06dc4630f7e3c8e..f07f0e1abb66f2eb4487f0a3ae0411058d66c267 100644 (file)
@@ -758,7 +758,8 @@ BOOL pass_check(char *user,char *password, int pwlen, struct passwd *pwd,
        if (password) password[pwlen] = 0;
 
 #if DEBUG_PASSWORD
-       DEBUG(100,("checking user=[%s] pass=[%s]\n",user,password));
+       DEBUG(100,("checking user=[%s] pass=",user));
+       dump_data(100, password, strlen(password));
 #endif
 
        if (!password) {
index d847407bbb4c6272a7de8ed6c06dc4630f7e3c8e..f07f0e1abb66f2eb4487f0a3ae0411058d66c267 100644 (file)
@@ -758,7 +758,8 @@ BOOL pass_check(char *user,char *password, int pwlen, struct passwd *pwd,
        if (password) password[pwlen] = 0;
 
 #if DEBUG_PASSWORD
-       DEBUG(100,("checking user=[%s] pass=[%s]\n",user,password));
+       DEBUG(100,("checking user=[%s] pass=",user));
+       dump_data(100, password, strlen(password));
 #endif
 
        if (!password) {