diff options
author | des <des@FreeBSD.org> | 2002-04-16 22:25:21 +0000 |
---|---|---|
committer | des <des@FreeBSD.org> | 2002-04-16 22:25:21 +0000 |
commit | 8c0e4ba23b69b7da2954602a9b21b8d75892fcb3 (patch) | |
tree | 1988c28db065df050b1bb7efd9c0985ad43a0932 /contrib/pam_modules | |
parent | 6b6956a9f080a01615ac7ee961565200b3f64bb6 (diff) | |
download | FreeBSD-src-8c0e4ba23b69b7da2954602a9b21b8d75892fcb3.zip FreeBSD-src-8c0e4ba23b69b7da2954602a9b21b8d75892fcb3.tar.gz |
Vendor import of pam_passwdqc v0.5.
Diffstat (limited to 'contrib/pam_modules')
-rw-r--r-- | contrib/pam_modules/pam_passwdqc/pam_passwdqc.c | 18 | ||||
-rw-r--r-- | contrib/pam_modules/pam_passwdqc/pam_passwdqc.spec | 8 |
2 files changed, 15 insertions, 11 deletions
diff --git a/contrib/pam_modules/pam_passwdqc/pam_passwdqc.c b/contrib/pam_modules/pam_passwdqc/pam_passwdqc.c index d3d0ccc..7c39731 100644 --- a/contrib/pam_modules/pam_passwdqc/pam_passwdqc.c +++ b/contrib/pam_modules/pam_passwdqc/pam_passwdqc.c @@ -410,12 +410,12 @@ PAM_EXTERN int pam_sm_chauthtok(pam_handle_t *pamh, int flags, if (status != PAM_SUCCESS) return status; if (!newpass || (check_max(¶ms, pamh, newpass) && enforce)) - return PAM_AUTHTOK_RECOVERY_ERR; + return PAM_AUTHTOK_ERR; reason = _passwdqc_check(¶ms.qc, newpass, oldpass, pw); if (reason) { say(pamh, PAM_ERROR_MSG, MESSAGE_WEAKPASS, reason); if (enforce) - status = PAM_AUTHTOK_RECOVERY_ERR; + status = PAM_AUTHTOK_ERR; } return status; } @@ -469,12 +469,12 @@ retry: if (randomonly) { say(pamh, PAM_ERROR_MSG, getuid() != 0 ? MESSAGE_MISCONFIGURED : MESSAGE_RANDOMFAILED); - return PAM_AUTHTOK_RECOVERY_ERR; + return PAM_AUTHTOK_ERR; } status = converse(pamh, PAM_PROMPT_ECHO_OFF, PROMPT_NEWPASS1, &resp); if (status == PAM_SUCCESS && (!resp || !resp->resp)) - status = PAM_AUTHTOK_RECOVERY_ERR; + status = PAM_AUTHTOK_ERR; if (status != PAM_SUCCESS) { if (randompass) _pam_overwrite(randompass); @@ -487,11 +487,11 @@ retry: if (!newpass) { if (randompass) _pam_overwrite(randompass); - return PAM_AUTHTOK_RECOVERY_ERR; + return PAM_AUTHTOK_ERR; } if (check_max(¶ms, pamh, newpass) && enforce) { - status = PAM_AUTHTOK_RECOVERY_ERR; + status = PAM_AUTHTOK_ERR; retry_wanted = 1; } @@ -505,7 +505,7 @@ retry: else say(pamh, PAM_ERROR_MSG, MESSAGE_WEAKPASS, reason); if (enforce) { - status = PAM_AUTHTOK_RECOVERY_ERR; + status = PAM_AUTHTOK_ERR; retry_wanted = 1; } } @@ -519,13 +519,13 @@ retry: status = say(pamh, PAM_ERROR_MSG, MESSAGE_MISTYPED); if (status == PAM_SUCCESS) { - status = PAM_AUTHTOK_RECOVERY_ERR; + status = PAM_AUTHTOK_ERR; retry_wanted = 1; } } _pam_drop_reply(resp, 1); } else - status = PAM_AUTHTOK_RECOVERY_ERR; + status = PAM_AUTHTOK_ERR; } if (status == PAM_SUCCESS) diff --git a/contrib/pam_modules/pam_passwdqc/pam_passwdqc.spec b/contrib/pam_modules/pam_passwdqc/pam_passwdqc.spec index 30b5cb1..437db6f 100644 --- a/contrib/pam_modules/pam_passwdqc/pam_passwdqc.spec +++ b/contrib/pam_modules/pam_passwdqc/pam_passwdqc.spec @@ -1,8 +1,8 @@ -# $Id: pam_passwdqc.spec,v 1.9 2002/02/06 22:36:40 mci Exp $ +# $Id: pam_passwdqc.spec,v 1.11 2002/04/16 16:56:52 solar Exp $ Summary: Pluggable password "quality check". Name: pam_passwdqc -Version: 0.4 +Version: 0.5 Release: owl1 License: relaxed BSD and (L)GPL-compatible Group: System Environment/Base @@ -35,6 +35,10 @@ rm -rf $RPM_BUILD_ROOT /lib/security/pam_passwdqc.so %changelog +* Tue Apr 16 2002 Solar Designer <solar@owl.openwall.com> +- 0.5: preliminary OpenPAM (FreeBSD-current) support in the code and related +code cleanups (thanks to Dag-Erling Smorgrav). + * Thu Feb 07 2002 Michail Litvak <mci@owl.openwall.com> - Enforce our new spec file conventions. |