diff options
author | Ming Liu <ming.liu@windriver.com> | 2013-07-18 10:04:22 +0800 |
---|---|---|
committer | Saul Wold <sgw@linux.intel.com> | 2013-07-22 09:44:10 -0700 |
commit | 10cdd66fe800cffe3f2cbf5c95550b4f7902a311 (patch) | |
tree | 2a035aae2a67b5478e55ea9ccec3913383aaa605 /meta/files/deploydir_readme.txt | |
parent | 1ace2bdd8d6d950038fb6d9b83f6eceba276f588 (diff) | |
download | openembedded-core-10cdd66fe800cffe3f2cbf5c95550b4f7902a311.tar.gz openembedded-core-10cdd66fe800cffe3f2cbf5c95550b4f7902a311.tar.bz2 openembedded-core-10cdd66fe800cffe3f2cbf5c95550b4f7902a311.zip |
libpam: add a new 'nullok_secure' option support to pam_unix
Debian patch to add a new 'nullok_secure' option to pam_unix, which
accepts users with null passwords only when the applicant is connected
from a tty listed in /etc/securetty.
The original pam_unix.so was configured with nullok_secure in
meta/recipes-extended/pam/libpam/pam.d/common-auth, but no such code
exists actually.
The patch set comes from:
http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/054_pam_security_abstract_securetty_handling
http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/055_pam_unix_nullok_secure
Signed-off-by: Ming Liu <ming.liu@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Diffstat (limited to 'meta/files/deploydir_readme.txt')
0 files changed, 0 insertions, 0 deletions