diff options
Diffstat (limited to 'dropbear/dropbear-0.42/allow-nopw.patch')
-rw-r--r-- | dropbear/dropbear-0.42/allow-nopw.patch | 39 |
1 files changed, 0 insertions, 39 deletions
diff --git a/dropbear/dropbear-0.42/allow-nopw.patch b/dropbear/dropbear-0.42/allow-nopw.patch deleted file mode 100644 index cc916a8242..0000000000 --- a/dropbear/dropbear-0.42/allow-nopw.patch +++ /dev/null @@ -1,39 +0,0 @@ - -# -# Patch managed by http://www.mn-logistik.de/unsupported/pxa250/patcher -# - ---- dropbear-0.41/auth.c~allow-nopw -+++ dropbear-0.41/auth.c -@@ -225,6 +225,7 @@ - } - - /* check for an empty password */ -+#ifdef DISALLOW_EMPTY_PW - if (ses.authstate.pw->pw_passwd[0] == '\0') { - TRACE(("leave checkusername: empty pword")); - dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected", -@@ -232,6 +233,7 @@ - send_msg_userauth_failure(0, 1); - return DROPBEAR_FAILURE; - } -+#endif - - TRACE(("shell is %s", ses.authstate.pw->pw_shell)); - ---- dropbear-0.41/authpasswd.c~allow-nopw -+++ dropbear-0.41/authpasswd.c -@@ -65,9 +65,13 @@ - * since the shadow password may differ to that tested - * in auth.c */ - if (passwdcrypt[0] == '\0') { -+#ifdef DISALLOW_EMPTY_PASSWD - dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected", - ses.authstate.printableuser); - send_msg_userauth_failure(0, 1); -+#else -+ send_msg_userauth_success(); -+#endif - return; - } - |