summaryrefslogtreecommitdiff
path: root/dropbear/dropbear-0.42/allow-nopw.patch
diff options
context:
space:
mode:
Diffstat (limited to 'dropbear/dropbear-0.42/allow-nopw.patch')
-rw-r--r--dropbear/dropbear-0.42/allow-nopw.patch39
1 files changed, 0 insertions, 39 deletions
diff --git a/dropbear/dropbear-0.42/allow-nopw.patch b/dropbear/dropbear-0.42/allow-nopw.patch
deleted file mode 100644
index cc916a8242..0000000000
--- a/dropbear/dropbear-0.42/allow-nopw.patch
+++ /dev/null
@@ -1,39 +0,0 @@
-
-#
-# Patch managed by http://www.mn-logistik.de/unsupported/pxa250/patcher
-#
-
---- dropbear-0.41/auth.c~allow-nopw
-+++ dropbear-0.41/auth.c
-@@ -225,6 +225,7 @@
- }
-
- /* check for an empty password */
-+#ifdef DISALLOW_EMPTY_PW
- if (ses.authstate.pw->pw_passwd[0] == '\0') {
- TRACE(("leave checkusername: empty pword"));
- dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected",
-@@ -232,6 +233,7 @@
- send_msg_userauth_failure(0, 1);
- return DROPBEAR_FAILURE;
- }
-+#endif
-
- TRACE(("shell is %s", ses.authstate.pw->pw_shell));
-
---- dropbear-0.41/authpasswd.c~allow-nopw
-+++ dropbear-0.41/authpasswd.c
-@@ -65,9 +65,13 @@
- * since the shadow password may differ to that tested
- * in auth.c */
- if (passwdcrypt[0] == '\0') {
-+#ifdef DISALLOW_EMPTY_PASSWD
- dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected",
- ses.authstate.printableuser);
- send_msg_userauth_failure(0, 1);
-+#else
-+ send_msg_userauth_success();
-+#endif
- return;
- }
-