diff options
Diffstat (limited to 'debian/patches-applied/021_nis_cleanup')
-rw-r--r-- | debian/patches-applied/021_nis_cleanup | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/debian/patches-applied/021_nis_cleanup b/debian/patches-applied/021_nis_cleanup index f3345052..86e80927 100644 --- a/debian/patches-applied/021_nis_cleanup +++ b/debian/patches-applied/021_nis_cleanup @@ -3,11 +3,11 @@ Patch from Philippe Troin <phil@fifi.org> Originally this included a bunch of changes to locking, but the more recent code pulled from Linux_pam CVS seems to fix that issue. -Index: Linux-PAM/modules/pam_unix/pam_unix_passwd.c +Index: pam.deb/modules/pam_unix/pam_unix_passwd.c =================================================================== ---- Linux-PAM/modules/pam_unix/pam_unix_passwd.c.orig -+++ Linux-PAM/modules/pam_unix/pam_unix_passwd.c -@@ -1107,7 +1107,7 @@ +--- pam.deb.orig/modules/pam_unix/pam_unix_passwd.c ++++ pam.deb/modules/pam_unix/pam_unix_passwd.c +@@ -588,7 +588,7 @@ if (_unix_blankpasswd(pamh, ctrl, user)) { return PAM_SUCCESS; @@ -16,7 +16,7 @@ Index: Linux-PAM/modules/pam_unix/pam_unix_passwd.c /* instruct user what is happening */ if (asprintf(&Announce, _("Changing password for %s."), user) < 0) { -@@ -1120,7 +1120,9 @@ +@@ -601,7 +601,9 @@ set(UNIX__OLD_PASSWD, lctrl); retval = _unix_read_password(pamh, lctrl ,Announce @@ -27,7 +27,7 @@ Index: Linux-PAM/modules/pam_unix/pam_unix_passwd.c ,NULL ,_UNIX_OLD_AUTHTOK ,&pass_old); -@@ -1131,9 +1133,12 @@ +@@ -612,9 +614,12 @@ "password - (old) token not obtained"); return retval; } |