diff options
author | ivan <ivan> | 2010-01-26 10:05:10 +0000 |
---|---|---|
committer | ivan <ivan> | 2010-01-26 10:05:10 +0000 |
commit | 4fa8fb20efd9e32b290cc661ae4a58feae449069 (patch) | |
tree | 322eac211a6e7d7666edeb7cbc01ba7fb6f0dcd1 /FS | |
parent | 94ff34b75e749aec4d71522e68e1fc31d9058c88 (diff) |
more fallout from default pw encryption: fix error reporting when entering a bad password
Diffstat (limited to 'FS')
-rw-r--r-- | FS/FS/svc_acct.pm | 13 |
1 files changed, 7 insertions, 6 deletions
diff --git a/FS/FS/svc_acct.pm b/FS/FS/svc_acct.pm index ca33aa858..f965e8dff 100644 --- a/FS/FS/svc_acct.pm +++ b/FS/FS/svc_acct.pm @@ -1333,11 +1333,14 @@ is >0), one will be generated randomly. sub set_password { my( $self, $pass ) = ( shift, shift ); + warn "[$me] set_password (to $pass) called on $self: ". Dumper($self) + if $DEBUG; + my $failure = gettext('illegal_password'). " $passwordmin-$passwordmax ". FS::Msgcat::_gettext('illegal_password_characters'). ": ". $pass; - my ($encoding, $encryption); + my( $encoding, $encryption ) = ('', ''); if ( $self->_password_encoding ) { $encoding = $self->_password_encoding; @@ -1357,7 +1360,7 @@ sub set_password { $self->_password_encoding($encoding); } - if( $encoding eq 'legacy' ) { + if ( $encoding eq 'legacy' ) { # The legacy behavior from check(): # If the password is blank, randomize it and set encoding to 'plain'. @@ -1374,14 +1377,12 @@ sub set_password { $pass = $1.$3; $self->_password_encoding('crypt'); # Various disabled crypt passwords - } elsif ( $pass eq '*' or - $pass eq '!' or - $pass eq '!!' ) { + } elsif ( $pass eq '*' || $pass eq '!' || $pass eq '!!' ) { $self->_password_encoding('crypt'); } else { return $failure; } - } + } $self->_password($pass); return; |