^^ for the record. This *is* bad unless they came up with their own hashing algorithm. (and if that's the case, why not open the algorithm up to see if it passes muster).
Or they could be storing passwords rather than 1-way hashing them (encrypted or not, this is bad)
Or they could be doing several comparisons. This opens the door to timing attacks.