SOURCES: pam-cracklib-enforce.patch - up to 0.99.8.1
baggins
baggins at pld-linux.org
Fri Sep 14 17:51:38 CEST 2007
Author: baggins Date: Fri Sep 14 15:51:38 2007 GMT
Module: SOURCES Tag: HEAD
---- Log message:
- up to 0.99.8.1
---- Files affected:
SOURCES:
pam-cracklib-enforce.patch (1.1 -> 1.2)
---- Diffs:
================================================================
Index: SOURCES/pam-cracklib-enforce.patch
diff -u SOURCES/pam-cracklib-enforce.patch:1.1 SOURCES/pam-cracklib-enforce.patch:1.2
--- SOURCES/pam-cracklib-enforce.patch:1.1 Mon Feb 5 00:20:32 2007
+++ SOURCES/pam-cracklib-enforce.patch Fri Sep 14 17:51:33 2007
@@ -17,14 +17,16 @@
diff -urN Linux-PAM-0.99.7.1.orig/modules/pam_cracklib/pam_cracklib.8 Linux-PAM-0.99.7.1/modules/pam_cracklib/pam_cracklib.8
--- Linux-PAM-0.99.7.1.orig/modules/pam_cracklib/pam_cracklib.8 2006-08-24 12:04:29.000000000 +0200
+++ Linux-PAM-0.99.7.1/modules/pam_cracklib/pam_cracklib.8 2007-02-04 19:59:32.105794691 +0100
-@@ -167,6 +198,10 @@
- .TP 3n
- \fBdictpath=\fR\fB\fI/path/to/dict\fR\fR
+@@ -167,6 +198,12 @@
+ .RS 4
Path to the cracklib dictionaries.
-+.TP 3n
+ .RE
++.PP
+\fBenforce=[\fR\fB\fInone\fR\fR\fB|\fR\fB\fIusers\fR\fR\fB|\fR\fB\fIall\fR\fR\fB]\fR
++.RS 4
+The module can be configured to warn of weak passwords only, but not actually enforce strong passwords. The default,
+\fInone\fR, setting will enforce strong passwords for non\-root users only.
++.RE
.SH "MODULE SERVICES PROVIDED"
.PP
Only he
@@ -56,7 +58,7 @@
--- Linux-PAM-0.99.7.1.orig/modules/pam_cracklib/pam_cracklib.c 2006-11-07 12:00:24.000000000 +0100
+++ Linux-PAM-0.99.7.1/modules/pam_cracklib/pam_cracklib.c 2007-02-04 19:59:27.217516126 +0100
@@ -93,6 +93,7 @@
- int oth_credit;
+ int min_class;
int use_authtok;
int try_first_pass;
+ int enforce;
@@ -124,14 +126,14 @@
/* check it for strength too... */
D(("for strength"));
@@ -624,10 +650,21 @@
- retval = _pam_unix_approve_pass(pamh,ctrl,&options,
- oldtoken,token1);
- if (retval != PAM_SUCCESS) {
-- if (getuid() || (flags & PAM_CHANGE_EXPIRED_AUTHTOK))
-+ if (flags & PAM_CHANGE_EXPIRED_AUTHTOK)
- retval = PAM_AUTHTOK_ERR;
-- else
-- retval = PAM_SUCCESS;
+ retval = _pam_unix_approve_pass (pamh, ctrl, &options,
+ oldtoken, token1);
+ if (retval != PAM_SUCCESS) {
+- if (getuid() || (flags & PAM_CHANGE_EXPIRED_AUTHTOK))
++ if (flags & PAM_CHANGE_EXPIRED_AUTHTOK)
+ retval = PAM_AUTHTOK_ERR;
+- else
+- retval = PAM_SUCCESS;
+ else switch (options.enforce) {
+ case ENFORCE_NONE:
+ retval = PAM_SUCCESS;
@@ -145,6 +147,6 @@
+ retval = PAM_AUTHTOK_ERR;
+ break;
+ }
- }
}
}
+ }
================================================================
---- CVS-web:
http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/SOURCES/pam-cracklib-enforce.patch?r1=1.1&r2=1.2&f=u
More information about the pld-cvs-commit
mailing list