packages: pam/pam-cracklib-enforce.patch, pam/pam.spec - updated to 1.1.1
baggins
baggins at pld-linux.org
Thu Apr 29 12:28:02 CEST 2010
Author: baggins Date: Thu Apr 29 10:28:02 2010 GMT
Module: packages Tag: HEAD
---- Log message:
- updated to 1.1.1
---- Files affected:
packages/pam:
pam-cracklib-enforce.patch (1.4 -> 1.5) , pam.spec (1.301 -> 1.302)
---- Diffs:
================================================================
Index: packages/pam/pam-cracklib-enforce.patch
diff -u packages/pam/pam-cracklib-enforce.patch:1.4 packages/pam/pam-cracklib-enforce.patch:1.5
--- packages/pam/pam-cracklib-enforce.patch:1.4 Mon Sep 7 13:41:46 2009
+++ packages/pam/pam-cracklib-enforce.patch Thu Apr 29 12:27:56 2010
@@ -100,13 +100,14 @@
options.cracklib_dictpath = CRACKLIB_DICTS;
ctrl = _pam_parse(pamh, &options, argc, argv);
-@@ -613,11 +628,26 @@
+@@ -613,12 +628,31 @@
if (ctrl & PAM_DEBUG_ARG)
pam_syslog(pamh,LOG_DEBUG,"bad password: %s",crack_msg);
pam_error (pamh, _("BAD PASSWORD: %s"), crack_msg);
- if (getuid() || (flags & PAM_CHANGE_EXPIRED_AUTHTOK))
+ if (flags & PAM_CHANGE_EXPIRED_AUTHTOK)
{
+ pam_set_item (pamh, PAM_AUTHTOK, NULL);
retval = PAM_AUTHTOK_ERR;
continue;
}
@@ -115,11 +116,15 @@
+ retval = PAM_SUCCESS;
+ break;
+ case ENFORCE_USERS:
-+ if (getuid()) retval = PAM_AUTHTOK_ERR;
++ if (getuid()) {
++ pam_set_item (pamh, PAM_AUTHTOK, NULL);
++ retval = PAM_AUTHTOK_ERR;
++ }
+ else retval = PAM_SUCCESS;
+ break;
+ case ENFORCE_ALL:
+ default:
++ pam_set_item (pamh, PAM_AUTHTOK, NULL);
+ retval = PAM_AUTHTOK_ERR;
+ break;
+ }
@@ -128,13 +133,14 @@
}
/* check it for strength too... */
-@@ -624,11 +650,26 @@
+@@ -624,12 +650,31 @@
retval = _pam_unix_approve_pass (pamh, ctrl, &options,
oldtoken, newtoken);
if (retval != PAM_SUCCESS) {
- if (getuid() || (flags & PAM_CHANGE_EXPIRED_AUTHTOK))
+ if (flags & PAM_CHANGE_EXPIRED_AUTHTOK)
{
+ pam_set_item(pamh, PAM_AUTHTOK, NULL);
retval = PAM_AUTHTOK_ERR;
continue;
}
@@ -143,11 +149,15 @@
+ retval = PAM_SUCCESS;
+ break;
+ case ENFORCE_USERS:
-+ if (getuid()) retval = PAM_AUTHTOK_ERR;
++ if (getuid()) {
++ pam_set_item(pamh, PAM_AUTHTOK, NULL);
++ retval = PAM_AUTHTOK_ERR;
++ }
+ else retval = PAM_SUCCESS;
+ break;
+ case ENFORCE_ALL:
+ default:
++ pam_set_item(pamh, PAM_AUTHTOK, NULL);
+ retval = PAM_AUTHTOK_ERR;
+ break;
+ }
================================================================
Index: packages/pam/pam.spec
diff -u packages/pam/pam.spec:1.301 packages/pam/pam.spec:1.302
--- packages/pam/pam.spec:1.301 Thu Mar 18 09:36:32 2010
+++ packages/pam/pam.spec Thu Apr 29 12:27:56 2010
@@ -20,15 +20,15 @@
Summary(tr.UTF-8): Modüler, artımsal doğrulama birimleri
Summary(uk.UTF-8): Інструмент, що забезпечує аутентифікацію для програм
Name: pam
-Version: 1.1.0
-Release: 4
+Version: 1.1.1
+Release: 0.1
Epoch: 1
License: GPL or BSD
Group: Base
Source0: http://ftp.kernel.org/pub/linux/libs/pam/library/Linux-PAM-%{version}.tar.bz2
-# Source0-md5: 9cda791c827dfcd9f2888caf0a64cc4a
+# Source0-md5: 9b3d952b173d5b9836cbc7e8de108bee
Source1: http://ftp.kernel.org/pub/linux/libs/pam/library/Linux-PAM-%{version}.tar.bz2.sign
-# Source1-md5: eedcd01bf8e722be4e6c8e16b5f1dce5
+# Source1-md5: 2c722d4b722cf87816ce231f67194a06
Source2: ftp://ftp.pld-linux.org/software/pam/%{name}-pld-%{pam_pld_version}.tar.gz
# Source2-md5: 982169260efd9bdd9a74323c3f232e6f
Source3: other.pamd
@@ -531,6 +531,9 @@
All persons listed below can be reached at <cvs_login>@pld-linux.org
$Log$
+Revision 1.302 2010/04/29 10:27:56 baggins
+- updated to 1.1.1
+
Revision 1.301 2010/03/18 08:36:32 jajcus
- audit bcond fix
================================================================
---- CVS-web:
http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/pam/pam-cracklib-enforce.patch?r1=1.4&r2=1.5&f=u
http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/pam/pam.spec?r1=1.301&r2=1.302&f=u
More information about the pld-cvs-commit
mailing list