]> code.ossystems Code Review - openembedded-core.git/commitdiff
libpam: Remove option 'obscure' from common-password
authorhaiqing <haiqing.bai@windriver.com>
Mon, 15 Jun 2020 03:05:57 +0000 (11:05 +0800)
committerSteve Sakoman <steve@sakoman.com>
Thu, 18 Jun 2020 16:23:00 +0000 (06:23 -1000)
libpam does not support 'obscure' checks to password,
there are the same checks in pam_cracklib module.
And this fix can remove the below error message while
updating password with 'passwd':
pam_unix(passwd:chauthtok):unrecognized option[obscure]

Signed-off-by: Haiqing Bai <Haiqing.Bai@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit ea761dbac90be77797308666fe1586b05e3df824)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-extended/pam/libpam/pam.d/common-password

index 3896057328db897b2695785dc973789385c4fb89..52478dae7706f9c5155b3f50e8478aae875e84bd 100644 (file)
 # The "sha512" option enables salted SHA512 passwords.  Without this option,
 # the default is Unix crypt.  Prior releases used the option "md5".
 #
-# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
-# login.defs.
-#
 # See the pam_unix manpage for other options.
 
 # here are the per-package modules (the "Primary" block)
-password       [success=1 default=ignore]      pam_unix.so obscure sha512
+password       [success=1 default=ignore]      pam_unix.so sha512
 # here's the fallback if no module succeeds
 password       requisite                       pam_deny.so
 # prime the stack with a positive return value if there isn't one already;