summaryrefslogtreecommitdiffstats
path: root/meta/recipes-core/systemd
diff options
context:
space:
mode:
authorMing Liu <ming.liu@windriver.com>2013-07-18 10:04:22 +0800
committerRichard Purdie <richard.purdie@linuxfoundation.org>2013-07-24 11:35:33 +0100
commit784d7b77294ae8066ff0ac91f7fc90f9795d2bd7 (patch)
tree1a101aca6397782d00d0cfd9b2860d243bb3a5c3 /meta/recipes-core/systemd
parent7af92f8fa3a12fc8fcb22dbd12f87d89768b2d39 (diff)
downloadpoky-784d7b77294ae8066ff0ac91f7fc90f9795d2bd7.tar.gz
libpam: add a new 'nullok_secure' option support to pam_unix
Debian patch to add a new 'nullok_secure' option to pam_unix, which accepts users with null passwords only when the applicant is connected from a tty listed in /etc/securetty. The original pam_unix.so was configured with nullok_secure in meta/recipes-extended/pam/libpam/pam.d/common-auth, but no such code exists actually. The patch set comes from: http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/054_pam_security_abstract_securetty_handling http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/055_pam_unix_nullok_secure (From OE-Core rev: 10cdd66fe800cffe3f2cbf5c95550b4f7902a311) Signed-off-by: Ming Liu <ming.liu@windriver.com> Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-core/systemd')
0 files changed, 0 insertions, 0 deletions