summaryrefslogtreecommitdiff
path: root/debian/patches-applied/026_pam_unix_passwd_unknown_user
diff options
context:
space:
mode:
Diffstat (limited to 'debian/patches-applied/026_pam_unix_passwd_unknown_user')
-rw-r--r--debian/patches-applied/026_pam_unix_passwd_unknown_user12
1 files changed, 6 insertions, 6 deletions
diff --git a/debian/patches-applied/026_pam_unix_passwd_unknown_user b/debian/patches-applied/026_pam_unix_passwd_unknown_user
index 1b1aade2..99ac3f62 100644
--- a/debian/patches-applied/026_pam_unix_passwd_unknown_user
+++ b/debian/patches-applied/026_pam_unix_passwd_unknown_user
@@ -1,11 +1,11 @@
Description: distinguish between password manipulation failure and missing user.
Author: Martin Schwenke <martin@meltin.net>
-Index: pam.deb/modules/pam_unix/passverify.c
+Index: pam/modules/pam_unix/passverify.c
===================================================================
---- pam.deb.orig/modules/pam_unix/passverify.c
-+++ pam.deb/modules/pam_unix/passverify.c
-@@ -719,7 +719,7 @@
+--- pam.orig/modules/pam_unix/passverify.c
++++ pam/modules/pam_unix/passverify.c
+@@ -749,7 +749,7 @@
struct passwd *tmpent = NULL;
struct stat st;
FILE *pwfile, *opwfile;
@@ -14,7 +14,7 @@ Index: pam.deb/modules/pam_unix/passverify.c
int oldmask;
#ifdef WITH_SELINUX
security_context_t prev_context=NULL;
-@@ -790,6 +790,7 @@
+@@ -820,6 +820,7 @@
tmpent->pw_passwd = assigned_passwd.charp;
err = 0;
@@ -22,7 +22,7 @@ Index: pam.deb/modules/pam_unix/passverify.c
}
if (putpwent(tmpent, pwfile)) {
D(("error writing entry to password file: %m"));
-@@ -832,7 +833,7 @@
+@@ -862,7 +863,7 @@
return PAM_SUCCESS;
} else {
unlink(PW_TMPFILE);