summaryrefslogtreecommitdiff
path: root/debian/patches-applied/007_modules_pam_unix
diff options
context:
space:
mode:
authorSteve Langasek <vorlon@debian.org>2010-09-01 10:39:54 -0700
committerSteve Langasek <vorlon@debian.org>2019-01-08 21:48:26 -0800
commit86b98ff3fabf34865ba1ce4aec1c4423858c94e1 (patch)
treecdb3188b1b515d5987a29231a43184f508e2c606 /debian/patches-applied/007_modules_pam_unix
parent2a567eedc4aba5dc3a717568f70eababc4f3ffa1 (diff)
further patch fixup to match upstream
Diffstat (limited to 'debian/patches-applied/007_modules_pam_unix')
-rw-r--r--debian/patches-applied/007_modules_pam_unix2
1 files changed, 1 insertions, 1 deletions
diff --git a/debian/patches-applied/007_modules_pam_unix b/debian/patches-applied/007_modules_pam_unix
index 5823c4d3..31b0c693 100644
--- a/debian/patches-applied/007_modules_pam_unix
+++ b/debian/patches-applied/007_modules_pam_unix
@@ -409,7 +409,7 @@ Index: pam.deb/modules/pam_unix/obscure.c
+ Example: "password$%^&*123". So check it again, this time
+ truncated to the maximum length. Idea from npasswd. --marekm */
+
-+ if (on(UNIX_HASH_MASK,ctrl))
++ if (!UNIX_DES_CRYPT(ctrl))
+ return NULL; /* unlimited password length */
+
+ if (oldlen <= 8 && newlen <= 8)