aboutsummaryrefslogtreecommitdiff
path: root/debian/patches/regular_crypt
diff options
context:
space:
mode:
authorTimo Weingärtner <timo@tiwe.de>2013-05-28 19:28:27 +0200
committerTimo Weingärtner <timo@tiwe.de>2013-05-29 01:15:44 +0200
commit181e4c06c36c05a87b3eda05834085e30328479b (patch)
treeb922d5e63957001bf1dcdcf9505e89c991db92d0 /debian/patches/regular_crypt
parentc7344fa5ca42b3203ce7fc2ff8cb93b42bf78123 (diff)
downloadlibpam-pwdfile-181e4c06c36c05a87b3eda05834085e30328479b.tar.gz
drop stuff in debian/ not needed anymore
patches Makefile README.Debian source.lintian-overrides Git-Dch: Full
Diffstat (limited to 'debian/patches/regular_crypt')
-rw-r--r--debian/patches/regular_crypt22
1 files changed, 0 insertions, 22 deletions
diff --git a/debian/patches/regular_crypt b/debian/patches/regular_crypt
deleted file mode 100644
index 9895e33..0000000
--- a/debian/patches/regular_crypt
+++ /dev/null
@@ -1,22 +0,0 @@
-Description: Use libc's crypt in the regular way
- * That should support newer crypt types.
- * We do the check before the weird stuff but keep it to not break setups
- using broken md5 hashing or bigcrypt.
- * CRYPTED_BCPWD_LEN as an upper limit seems to be ok by now.
-Author: Timo Weingärtner <timo@tiwe.de>
-Forwarded: no
-Last-Update: 2012-06-20
-
---- libpam-pwdfile-0.99.orig/pam_pwdfile.c
-+++ libpam-pwdfile-0.99/pam_pwdfile.c
-@@ -348,6 +348,10 @@ PAM_EXTERN int pam_sm_authenticate(pam_h
-
- temp_result = 0;
-
-+ if (strcmp(crypt(password, stored_crypted_password), stored_crypted_password) == 0) {
-+ D(_pam_log(LOG_ERR,"password matched using the systems crypt()"));
-+ temp_result = 1;
-+ }
- /* Extract the salt and set the passwd length, depending on MD5 or DES */
- if (strncmp(stored_crypted_password, "$1$", 3) == 0) {
- D(_pam_log(LOG_ERR,"password hash type is 'md5'"));