if ((known_good->vp_length != password->vb_length) ||
(fr_digest_cmp(known_good->vp_octets, password->vb_octets, known_good->vp_length) != 0)) {
REDEBUG("Cleartext password does not match \"known good\" password");
+ if (!DEBUG_ENABLED3) RETURN_UNLANG_REJECT;
REDEBUG3("Password : %pV", password);
REDEBUG3("Expected : %pV", &known_good->data);
RETURN_UNLANG_REJECT;
if (fr_digest_cmp(digest, known_good->vp_octets, known_good->vp_length) != 0) {
REDEBUG("MD5 digest does not match \"known good\" digest");
+ if (!DEBUG_ENABLED3) RETURN_UNLANG_REJECT;
REDEBUG3("Password : %pV", password);
REDEBUG3("Calculated : %pH", fr_box_octets(digest, MD5_DIGEST_LENGTH));
REDEBUG3("Expected : %pH", fr_box_octets(known_good->vp_octets, MD5_DIGEST_LENGTH));
*/
if (fr_digest_cmp(digest, known_good->vp_octets, MD5_DIGEST_LENGTH) != 0) {
REDEBUG("SMD5 digest does not match \"known good\" digest");
+ if (!DEBUG_ENABLED3) RETURN_UNLANG_REJECT;
REDEBUG3("Password : %pV", password);
REDEBUG3("Calculated : %pH", fr_box_octets(digest, MD5_DIGEST_LENGTH));
REDEBUG3("Expected : %pH", fr_box_octets(known_good->vp_octets, MD5_DIGEST_LENGTH));
if (fr_digest_cmp(digest, known_good->vp_octets, known_good->vp_length) != 0) {
REDEBUG("SHA1 digest does not match \"known good\" digest");
+ if (!DEBUG_ENABLED3) RETURN_UNLANG_REJECT;
REDEBUG3("Password : %pV", password);
REDEBUG3("Calculated : %pH", fr_box_octets(digest, SHA1_DIGEST_LENGTH));
REDEBUG3("Expected : %pH", fr_box_octets(known_good->vp_octets, SHA1_DIGEST_LENGTH));
if (fr_digest_cmp(digest, known_good->vp_octets, SHA1_DIGEST_LENGTH) != 0) {
REDEBUG("SSHA digest does not match \"known good\" digest");
+ if (!DEBUG_ENABLED3) RETURN_UNLANG_REJECT;
REDEBUG3("Password : %pV", password);
REDEBUG3("Salt : %pH", fr_box_octets(known_good->vp_octets + SHA1_DIGEST_LENGTH,
known_good->vp_length - SHA1_DIGEST_LENGTH));
if (fr_digest_cmp(digest, known_good->vp_octets, known_good->vp_length) != 0) {
REDEBUG("%s digest does not match \"known good\" digest", name);
+ if (!DEBUG_ENABLED3) RETURN_UNLANG_REJECT;
REDEBUG3("Password : %pV", password);
REDEBUG3("Calculated : %pH", fr_box_octets(digest, digest_len));
REDEBUG3("Expected : %pH", &known_good->data);
*/
if (fr_digest_cmp(digest, known_good->vp_octets, (size_t)digest_len) != 0) {
REDEBUG("%s digest does not match \"known good\" digest", name);
+ if (!DEBUG_ENABLED3) RETURN_UNLANG_REJECT;
REDEBUG3("Password : %pV", password);
REDEBUG3("Salt : %pH",
fr_box_octets(known_good->vp_octets + digest_len, known_good->vp_length - digest_len));
if (fr_digest_cmp(digest, hash, (size_t)digest_len) != 0) {
REDEBUG("PBKDF2 digest does not match \"known good\" digest");
+ if (!DEBUG_ENABLED3) RETURN_UNLANG_REJECT;
REDEBUG3("Salt : %pH", fr_box_octets(salt, salt_len));
REDEBUG3("Calculated : %pH", fr_box_octets(digest, digest_len));
REDEBUG3("Expected : %pH", fr_box_octets(hash, slen));
if (fr_digest_cmp(digest, pbkdf2_buf.hash, (size_t)digest_len) != 0) {
REDEBUG("PBKDF2_SHA256 digest does not match \"known good\" digest");
+ if (!DEBUG_ENABLED3) RETURN_UNLANG_REJECT;
REDEBUG3("Salt : %pH", fr_box_octets(pbkdf2_buf.salt, PBKDF2_SHA256_LEGACY_SALT_LENGTH));
REDEBUG3("Calculated : %pH", fr_box_octets(digest, digest_len));
REDEBUG3("Expected : %pH", fr_box_octets(pbkdf2_buf.hash, PBKDF2_SHA256_LEGACY_HASH_LENGTH));
if (fr_digest_cmp(digest, known_good->vp_octets, known_good->vp_length) != 0) {
REDEBUG("NT digest does not match \"known good\" digest");
+ if (!DEBUG_ENABLED3) RETURN_UNLANG_REJECT;
REDEBUG3("Calculated : %pH", fr_box_octets(digest, sizeof(digest)));
REDEBUG3("Expected : %pH", &known_good->data);
RETURN_UNLANG_REJECT;