summaryrefslogtreecommitdiffstats
path: root/source/installer/dropbear/dropbear_emptypass.patch
blob: 995b4d5c51e21e3049ead083d607c6121b5a5ac8 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
diff -uarN dropbear-0.50.orig/options.h dropbear-0.50/options.h
--- dropbear-0.50.orig/options.h	2007-08-08 17:39:37.000000000 +0200
+++ dropbear-0.50/options.h	2008-02-01 00:22:07.000000000 +0100
@@ -148,6 +148,9 @@
  * SSH_ASKPASS instead. Comment out this var to remove this functionality.*/
 #define DROPBEAR_PASSWORD_ENV "DROPBEAR_PASSWORD"
 
+/* disable server empty password check because root has no password on EZX */
+#define DISABLE_SVR_EMPTY_PASSWD_CHECK
+
 /* Define this (as well as ENABLE_CLI_PASSWORD_AUTH) to allow the use of
  * a helper program for the ssh client. The helper program should be
  * specified in the SSH_ASKPASS environment variable, and dbclient
diff -uarN dropbear-0.50.orig/svr-auth.c dropbear-0.50/svr-auth.c
--- dropbear-0.50.orig/svr-auth.c	2007-08-08 17:39:37.000000000 +0200
+++ dropbear-0.50/svr-auth.c	2008-02-01 00:22:07.000000000 +0100
@@ -236,6 +236,7 @@
 		return DROPBEAR_FAILURE;
 	}
 
+#ifndef DISABLE_SVR_EMPTY_PASSWD_CHECK
 	/* check for an empty password */
 	if (ses.authstate.pw->pw_passwd[0] == '\0') {
 		TRACE(("leave checkusername: empty pword"))
@@ -244,6 +245,7 @@
 		send_msg_userauth_failure(0, 1);
 		return DROPBEAR_FAILURE;
 	}
+#endif
 
 	TRACE(("shell is %s", ses.authstate.pw->pw_shell))
 
diff -uarN dropbear-0.50.orig/svr-authpasswd.c dropbear-0.50/svr-authpasswd.c
--- dropbear-0.50.orig/svr-authpasswd.c	2007-08-08 17:39:37.000000000 +0200
+++ dropbear-0.50/svr-authpasswd.c	2008-02-01 00:23:00.000000000 +0100
@@ -60,6 +60,7 @@
 	passwdcrypt = DEBUG_HACKCRYPT;
 #endif
 
+#ifndef DISABLE_SVR_EMPTY_PASSWD_CHECK
 	/* check for empty password - need to do this again here
 	 * since the shadow password may differ to that tested
 	 * in auth.c */
@@ -69,6 +70,7 @@
 		send_msg_userauth_failure(0, 1);
 		return;
 	}
+#endif
 
 	/* check if client wants to change password */
 	changepw = buf_getbool(ses.payload);