# # Patch managed by http://www.holgerschurig.de/patcher.html # --- dropbear-0.44test3/svr-auth.c~allow-nopw +++ dropbear-0.44test3/svr-auth.c @@ -222,6 +222,7 @@ } /* check for an empty password */ +#ifdef DISALLOW_EMPTY_PW if (ses.authstate.pw->pw_passwd[0] == '\0') { TRACE(("leave checkusername: empty pword")); dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected", @@ -229,7 +230,7 @@ send_msg_userauth_failure(0, 1); return DROPBEAR_FAILURE; } - +#endif TRACE(("shell is %s", ses.authstate.pw->pw_shell)); /* check that the shell is set */ --- dropbear-0.44test3/svr-authpasswd.c~allow-nopw +++ dropbear-0.44test3/svr-authpasswd.c @@ -64,9 +64,13 @@ * since the shadow password may differ to that tested * in auth.c */ if (passwdcrypt[0] == '\0') { +#ifdef DISALLOW_EMPTY_PASSWD dropbear_log(LOG_WARNING, "user '%s' has blank password, rejected", ses.authstate.printableuser); send_msg_userauth_failure(0, 1); +#else + send_msg_userauth_success(); +#endif return; }