libpam: add a new 'nullok_secure' option support to pam_unix
authorMing Liu <ming.liu@windriver.com>
Thu, 18 Jul 2013 02:04:22 +0000 (10:04 +0800)
committerRichard Purdie <richard.purdie@linuxfoundation.org>
Wed, 24 Jul 2013 10:35:33 +0000 (11:35 +0100)
commit8aa97192cf4ed18ede257e307ec1d81defbcfaf6
tree5f50a75106f0598eafb70cc7caa44c90b3dc1400
parent3126a1585a8229be60ba15a0b9add3154d3a659a
libpam: add a new 'nullok_secure' option support to pam_unix

Debian patch to add a new 'nullok_secure' option to pam_unix, which
accepts users with null passwords only when the applicant is connected
from a tty listed in /etc/securetty.

The original pam_unix.so was configured with nullok_secure in
meta/recipes-extended/pam/libpam/pam.d/common-auth, but no such code
exists actually.

The patch set comes from:
http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/054_pam_security_abstract_securetty_handling
http://patch-tracker.debian.org/patch/series/view/pam/1.1.3-7.1/055_pam_unix_nullok_secure

(From OE-Core rev: 10cdd66fe800cffe3f2cbf5c95550b4f7902a311)

Signed-off-by: Ming Liu <ming.liu@windriver.com>
Signed-off-by: Saul Wold <sgw@linux.intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
meta/recipes-extended/pam/libpam/pam-security-abstract-securetty-handling.patch [new file with mode: 0644]
meta/recipes-extended/pam/libpam/pam-unix-nullok-secure.patch [new file with mode: 0644]
meta/recipes-extended/pam/libpam_1.1.6.bb