version 1.6, 2021/03/25 21:15:22 |
version 1.9, 2021/04/02 12:19:39 |
Line 2163 readfile (int nolock) |
|
Line 2163 readfile (int nolock) |
|
b = n; |
b = n; |
|
|
/* pw field */ |
/* pw field */ |
|
/* OpenBSD's implementation stores the password in hashed form. |
|
* crypt_checkpass takes care of validating the hashing so we |
|
* don't have to ensure the password field has a valid length */ |
|
|
while (*b != ':') |
while (*b != ':') |
{ |
{ |
users[f_num]->password[(b - n)] = *b; |
users[f_num]->password[(b - n)] = *b; |
b++; |
b++; |
|
#if !defined(__OpenBSD__) |
if ((b - n) >= DGL_PASSWDLEN) { |
if ((b - n) >= DGL_PASSWDLEN) { |
debug_write("passwd field too long"); |
debug_write("passwd field too long"); |
graceful_exit (102); |
graceful_exit (102); |
} |
} |
|
#endif |
} |
} |
|
|
/* advance to next field */ |
/* advance to next field */ |