From 181e4c06c36c05a87b3eda05834085e30328479b Mon Sep 17 00:00:00 2001 From: Timo Weingärtner Date: Tue, 28 May 2013 19:28:27 +0200 Subject: drop stuff in debian/ not needed anymore patches Makefile README.Debian source.lintian-overrides Git-Dch: Full --- debian/patches/regular_crypt | 22 ---------------------- debian/patches/series | 2 -- debian/patches/visibility | 23 ----------------------- 3 files changed, 47 deletions(-) delete mode 100644 debian/patches/regular_crypt delete mode 100644 debian/patches/series delete mode 100644 debian/patches/visibility (limited to 'debian/patches') diff --git a/debian/patches/regular_crypt b/debian/patches/regular_crypt deleted file mode 100644 index 9895e33..0000000 --- a/debian/patches/regular_crypt +++ /dev/null @@ -1,22 +0,0 @@ -Description: Use libc's crypt in the regular way - * That should support newer crypt types. - * We do the check before the weird stuff but keep it to not break setups - using broken md5 hashing or bigcrypt. - * CRYPTED_BCPWD_LEN as an upper limit seems to be ok by now. -Author: Timo Weingärtner -Forwarded: no -Last-Update: 2012-06-20 - ---- libpam-pwdfile-0.99.orig/pam_pwdfile.c -+++ libpam-pwdfile-0.99/pam_pwdfile.c -@@ -348,6 +348,10 @@ PAM_EXTERN int pam_sm_authenticate(pam_h - - temp_result = 0; - -+ if (strcmp(crypt(password, stored_crypted_password), stored_crypted_password) == 0) { -+ D(_pam_log(LOG_ERR,"password matched using the systems crypt()")); -+ temp_result = 1; -+ } - /* Extract the salt and set the passwd length, depending on MD5 or DES */ - if (strncmp(stored_crypted_password, "$1$", 3) == 0) { - D(_pam_log(LOG_ERR,"password hash type is 'md5'")); diff --git a/debian/patches/series b/debian/patches/series deleted file mode 100644 index fb3fb12..0000000 --- a/debian/patches/series +++ /dev/null @@ -1,2 +0,0 @@ -visibility -regular_crypt diff --git a/debian/patches/visibility b/debian/patches/visibility deleted file mode 100644 index d121a1e..0000000 --- a/debian/patches/visibility +++ /dev/null @@ -1,23 +0,0 @@ -Description: Mark the pam_sm_* functions as __attribute__((visibility("default"))) -Author: Peter Palfrader -Bug-Debian: http://bugs.debian.org/499203 -Last-Update: 2012-06-20 - ---- libpam-pwdfile-0.99.orig/pam_pwdfile.c -+++ libpam-pwdfile-0.99/pam_pwdfile.c -@@ -222,6 +222,7 @@ - } - - /* expected hook for auth service */ -+__attribute__((visibility("default"))) - PAM_EXTERN int pam_sm_authenticate(pam_handle_t *pamh, int flags, - int argc, const char **argv) { - int retval, pcnt, pwdfilename_found; -@@ -408,6 +409,7 @@ - } - - /* another expected hook */ -+__attribute__((visibility("default"))) - PAM_EXTERN int pam_sm_setcred(pam_handle_t *pamh, int flags, - int argc, const char **argv) - { -- cgit v1.2.3