View | Details | Raw Unified | Return to bug 44602 | Differences between
and this patch

Collapse All | Expand All

(-)a/auth.c (-2 / +2 lines)
 Lines 238-246   maybe_retrieve_password(struct pam_args *args, int authtok, const char **pass) Link Here 
238
    if (!try && !use && !force)
238
    if (!try && !use && !force)
239
        return PAM_SUCCESS;
239
        return PAM_SUCCESS;
240
    status = pam_get_item(args->pamh, authtok, (PAM_CONST void **) pass);
240
    status = pam_get_item(args->pamh, authtok, (PAM_CONST void **) pass);
241
    if (*pass != NULL && **pass == '\0') {
241
    if (*pass != NULL && (**pass == '\0' || strlen(*pass) > 512)) {
242
        if (use || force) {
242
        if (use || force) {
243
            putil_debug(args, "rejecting empty password");
243
            putil_debug(args, "rejecting empty or too long password");
244
            return PAM_AUTH_ERR;
244
            return PAM_AUTH_ERR;
245
        }
245
        }
246
        *pass = NULL;
246
        *pass = NULL;

Return to bug 44602