mirror of
git://slackware.nl/current.git
synced 2025-01-14 08:01:11 +01:00
5a12e7c134
Wed Aug 26 10:00:38 CDT 2009 Slackware 13.0 x86_64 is released as stable! Thanks to everyone who helped make this release possible -- see the RELEASE_NOTES for the credits. The ISOs are off to the replicator. This time it will be a 6 CD-ROM 32-bit set and a dual-sided 32-bit/64-bit x86/x86_64 DVD. We're taking pre-orders now at store.slackware.com. Please consider picking up a copy to help support the project. Once again, thanks to the entire Slackware community for all the help testing and fixing things and offering suggestions during this development cycle. As always, have fun and enjoy! -P.
51 lines
1.8 KiB
Diff
51 lines
1.8 KiB
Diff
diff -uarN dropbear-0.50.orig/options.h dropbear-0.50/options.h
|
|
--- dropbear-0.50.orig/options.h 2007-08-08 17:39:37.000000000 +0200
|
|
+++ dropbear-0.50/options.h 2008-02-01 00:22:07.000000000 +0100
|
|
@@ -148,6 +148,9 @@
|
|
* SSH_ASKPASS instead. Comment out this var to remove this functionality.*/
|
|
#define DROPBEAR_PASSWORD_ENV "DROPBEAR_PASSWORD"
|
|
|
|
+/* disable server empty password check because root has no password on EZX */
|
|
+#define DISABLE_SVR_EMPTY_PASSWD_CHECK
|
|
+
|
|
/* Define this (as well as ENABLE_CLI_PASSWORD_AUTH) to allow the use of
|
|
* a helper program for the ssh client. The helper program should be
|
|
* specified in the SSH_ASKPASS environment variable, and dbclient
|
|
diff -uarN dropbear-0.50.orig/svr-auth.c dropbear-0.50/svr-auth.c
|
|
--- dropbear-0.50.orig/svr-auth.c 2007-08-08 17:39:37.000000000 +0200
|
|
+++ dropbear-0.50/svr-auth.c 2008-02-01 00:22:07.000000000 +0100
|
|
@@ -236,6 +236,7 @@
|
|
return DROPBEAR_FAILURE;
|
|
}
|
|
|
|
+#ifndef DISABLE_SVR_EMPTY_PASSWD_CHECK
|
|
/* check for an empty password */
|
|
if (ses.authstate.pw->pw_passwd[0] == '\0') {
|
|
TRACE(("leave checkusername: empty pword"))
|
|
@@ -244,6 +245,7 @@
|
|
send_msg_userauth_failure(0, 1);
|
|
return DROPBEAR_FAILURE;
|
|
}
|
|
+#endif
|
|
|
|
TRACE(("shell is %s", ses.authstate.pw->pw_shell))
|
|
|
|
diff -uarN dropbear-0.50.orig/svr-authpasswd.c dropbear-0.50/svr-authpasswd.c
|
|
--- dropbear-0.50.orig/svr-authpasswd.c 2007-08-08 17:39:37.000000000 +0200
|
|
+++ dropbear-0.50/svr-authpasswd.c 2008-02-01 00:23:00.000000000 +0100
|
|
@@ -60,6 +60,7 @@
|
|
passwdcrypt = DEBUG_HACKCRYPT;
|
|
#endif
|
|
|
|
+#ifndef DISABLE_SVR_EMPTY_PASSWD_CHECK
|
|
/* check for empty password - need to do this again here
|
|
* since the shadow password may differ to that tested
|
|
* in auth.c */
|
|
@@ -69,6 +70,7 @@
|
|
send_msg_userauth_failure(0, 1);
|
|
return;
|
|
}
|
|
+#endif
|
|
|
|
/* check if client wants to change password */
|
|
changepw = buf_getbool(ses.payload);
|