diff options
author | Scott Garman <scott.a.garman@intel.com> | 2010-11-23 16:41:49 -0800 |
---|---|---|
committer | Saul Wold <Saul.Wold@intel.com> | 2010-11-24 13:25:21 -0800 |
commit | 698cef8322e5a5f18e50ce62f6c9d1f1f846677a (patch) | |
tree | 9dfffcc2c17311c670b8c1c3baff51991965415a /meta/recipes-extended/pam/libpam/pam.d/common-password | |
parent | c144f1693c51f915a80effe5920ceb4142e3b2e7 (diff) | |
download | poky-698cef8322e5a5f18e50ce62f6c9d1f1f846677a.tar.gz |
libpam: upgrade to version 1.1.3
* Removed obsolete crossbinary patch
* Added source checksums
* Added LIC_FILES_CHKSUM and SUMMARY entries
Signed-off-by: Scott Garman <scott.a.garman@intel.com>
Diffstat (limited to 'meta/recipes-extended/pam/libpam/pam.d/common-password')
-rw-r--r-- | meta/recipes-extended/pam/libpam/pam.d/common-password | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/meta/recipes-extended/pam/libpam/pam.d/common-password b/meta/recipes-extended/pam/libpam/pam.d/common-password new file mode 100644 index 0000000000..3896057328 --- /dev/null +++ b/meta/recipes-extended/pam/libpam/pam.d/common-password | |||
@@ -0,0 +1,26 @@ | |||
1 | # | ||
2 | # /etc/pam.d/common-password - password-related modules common to all services | ||
3 | # | ||
4 | # This file is included from other service-specific PAM config files, | ||
5 | # and should contain a list of modules that define the services to be | ||
6 | # used to change user passwords. The default is pam_unix. | ||
7 | |||
8 | # Explanation of pam_unix options: | ||
9 | # | ||
10 | # The "sha512" option enables salted SHA512 passwords. Without this option, | ||
11 | # the default is Unix crypt. Prior releases used the option "md5". | ||
12 | # | ||
13 | # The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in | ||
14 | # login.defs. | ||
15 | # | ||
16 | # See the pam_unix manpage for other options. | ||
17 | |||
18 | # here are the per-package modules (the "Primary" block) | ||
19 | password [success=1 default=ignore] pam_unix.so obscure sha512 | ||
20 | # here's the fallback if no module succeeds | ||
21 | password requisite pam_deny.so | ||
22 | # prime the stack with a positive return value if there isn't one already; | ||
23 | # this avoids us returning an error just because nothing sets a success code | ||
24 | # since the modules above will each just jump around | ||
25 | password required pam_permit.so | ||
26 | # and here are more per-package modules (the "Additional" block) | ||