summaryrefslogtreecommitdiffstats
path: root/source/installer/dropbear/dropbear_emptypass.patch
diff options
context:
space:
mode:
author Patrick J Volkerding <volkerdi@slackware.com>2009-08-26 10:00:38 -0500
committer Eric Hameleers <alien@slackware.com>2018-05-31 22:41:17 +0200
commit5a12e7c134274dba706667107d10d231517d3e05 (patch)
tree55718d5acb710fde798d9f38d0bbaf594ed4b296 /source/installer/dropbear/dropbear_emptypass.patch
downloadcurrent-slackware-13.0.tar.gz
current-slackware-13.0.tar.xz
Slackware 13.0slackware-13.0
Wed Aug 26 10:00:38 CDT 2009 Slackware 13.0 x86_64 is released as stable! Thanks to everyone who helped make this release possible -- see the RELEASE_NOTES for the credits. The ISOs are off to the replicator. This time it will be a 6 CD-ROM 32-bit set and a dual-sided 32-bit/64-bit x86/x86_64 DVD. We're taking pre-orders now at store.slackware.com. Please consider picking up a copy to help support the project. Once again, thanks to the entire Slackware community for all the help testing and fixing things and offering suggestions during this development cycle. As always, have fun and enjoy! -P.
Diffstat (limited to 'source/installer/dropbear/dropbear_emptypass.patch')
-rw-r--r--source/installer/dropbear/dropbear_emptypass.patch51
1 files changed, 51 insertions, 0 deletions
diff --git a/source/installer/dropbear/dropbear_emptypass.patch b/source/installer/dropbear/dropbear_emptypass.patch
new file mode 100644
index 000000000..995b4d5c5
--- /dev/null
+++ b/source/installer/dropbear/dropbear_emptypass.patch
@@ -0,0 +1,51 @@
+diff -uarN dropbear-0.50.orig/options.h dropbear-0.50/options.h
+--- dropbear-0.50.orig/options.h 2007-08-08 17:39:37.000000000 +0200
++++ dropbear-0.50/options.h 2008-02-01 00:22:07.000000000 +0100
+@@ -148,6 +148,9 @@
+ * SSH_ASKPASS instead. Comment out this var to remove this functionality.*/
+ #define DROPBEAR_PASSWORD_ENV "DROPBEAR_PASSWORD"
+
++/* disable server empty password check because root has no password on EZX */
++#define DISABLE_SVR_EMPTY_PASSWD_CHECK
++
+ /* Define this (as well as ENABLE_CLI_PASSWORD_AUTH) to allow the use of
+ * a helper program for the ssh client. The helper program should be
+ * specified in the SSH_ASKPASS environment variable, and dbclient
+diff -uarN dropbear-0.50.orig/svr-auth.c dropbear-0.50/svr-auth.c
+--- dropbear-0.50.orig/svr-auth.c 2007-08-08 17:39:37.000000000 +0200
++++ dropbear-0.50/svr-auth.c 2008-02-01 00:22:07.000000000 +0100
+@@ -236,6 +236,7 @@
+ return DROPBEAR_FAILURE;
+ }
+
++#ifndef DISABLE_SVR_EMPTY_PASSWD_CHECK
+ /* check for an empty password */
+ if (ses.authstate.pw->pw_passwd[0] == '\0') {
+ TRACE(("leave checkusername: empty pword"))
+@@ -244,6 +245,7 @@
+ send_msg_userauth_failure(0, 1);
+ return DROPBEAR_FAILURE;
+ }
++#endif
+
+ TRACE(("shell is %s", ses.authstate.pw->pw_shell))
+
+diff -uarN dropbear-0.50.orig/svr-authpasswd.c dropbear-0.50/svr-authpasswd.c
+--- dropbear-0.50.orig/svr-authpasswd.c 2007-08-08 17:39:37.000000000 +0200
++++ dropbear-0.50/svr-authpasswd.c 2008-02-01 00:23:00.000000000 +0100
+@@ -60,6 +60,7 @@
+ passwdcrypt = DEBUG_HACKCRYPT;
+ #endif
+
++#ifndef DISABLE_SVR_EMPTY_PASSWD_CHECK
+ /* check for empty password - need to do this again here
+ * since the shadow password may differ to that tested
+ * in auth.c */
+@@ -69,6 +70,7 @@
+ send_msg_userauth_failure(0, 1);
+ return;
+ }
++#endif
+
+ /* check if client wants to change password */
+ changepw = buf_getbool(ses.payload);