summaryrefslogtreecommitdiff
path: root/meta/recipes-extended/pam/libpam/pam.d/common-password
diff options
context:
space:
mode:
authorScott Garman <scott.a.garman@intel.com>2010-11-23 16:41:49 -0800
committerSaul Wold <Saul.Wold@intel.com>2010-11-24 13:25:21 -0800
commit698cef8322e5a5f18e50ce62f6c9d1f1f846677a (patch)
tree9dfffcc2c17311c670b8c1c3baff51991965415a /meta/recipes-extended/pam/libpam/pam.d/common-password
parentc144f1693c51f915a80effe5920ceb4142e3b2e7 (diff)
downloadopenembedded-core-698cef8322e5a5f18e50ce62f6c9d1f1f846677a.tar.gz
openembedded-core-698cef8322e5a5f18e50ce62f6c9d1f1f846677a.tar.bz2
openembedded-core-698cef8322e5a5f18e50ce62f6c9d1f1f846677a.tar.xz
openembedded-core-698cef8322e5a5f18e50ce62f6c9d1f1f846677a.zip
libpam: upgrade to version 1.1.3
* Removed obsolete crossbinary patch * Added source checksums * Added LIC_FILES_CHKSUM and SUMMARY entries Signed-off-by: Scott Garman <scott.a.garman@intel.com>
Diffstat (limited to 'meta/recipes-extended/pam/libpam/pam.d/common-password')
-rw-r--r--meta/recipes-extended/pam/libpam/pam.d/common-password26
1 files changed, 26 insertions, 0 deletions
diff --git a/meta/recipes-extended/pam/libpam/pam.d/common-password b/meta/recipes-extended/pam/libpam/pam.d/common-password
new file mode 100644
index 000000000..389605732
--- /dev/null
+++ b/meta/recipes-extended/pam/libpam/pam.d/common-password
@@ -0,0 +1,26 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords. The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "sha512" option enables salted SHA512 passwords. Without this option,
+# the default is Unix crypt. Prior releases used the option "md5".
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# here are the per-package modules (the "Primary" block)
+password [success=1 default=ignore] pam_unix.so obscure sha512
+# here's the fallback if no module succeeds
+password requisite pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password required pam_permit.so
+# and here are more per-package modules (the "Additional" block)