summaryrefslogtreecommitdiff
path: root/ftp/wu-ftpd+ipv6/files/patch-ad
diff options
context:
space:
mode:
authorAndrey A. Chernov <ache@FreeBSD.org>1997-04-27 21:48:55 +0000
committerAndrey A. Chernov <ache@FreeBSD.org>1997-04-27 21:48:55 +0000
commita4ef9c1d42cb7bffc3d26576e987e81840642097 (patch)
treeef926019be3cc1f638d93218e1c9fdbe991ddf77 /ftp/wu-ftpd+ipv6/files/patch-ad
parentUpgrade to 3.5 beta 1 (diff)
Upgrade to beta-13
Notes
Notes: svn path=/head/; revision=6339
Diffstat (limited to 'ftp/wu-ftpd+ipv6/files/patch-ad')
-rw-r--r--ftp/wu-ftpd+ipv6/files/patch-ad58
1 files changed, 0 insertions, 58 deletions
diff --git a/ftp/wu-ftpd+ipv6/files/patch-ad b/ftp/wu-ftpd+ipv6/files/patch-ad
deleted file mode 100644
index c94318c267f6..000000000000
--- a/ftp/wu-ftpd+ipv6/files/patch-ad
+++ /dev/null
@@ -1,58 +0,0 @@
-*** src/ftpd.c.bak Mon Jan 20 08:05:11 1997
---- src/ftpd.c Thu Jan 30 17:46:16 1997
-***************
-*** 235,246 ****
- int logging = 0;
- int log_commands = 0;
-
-- #ifdef SKEY /* H* add-on. Not as elegant as Wietse's */
-- #include "skey.h" /* logdaemon package, but does the job. */
-- struct skey skey_blk;
-- char chbuff[80];
-- #endif
--
- #ifdef SECUREOSF
- #define SecureWare
- #include <prot.h>
---- 235,240 ----
-***************
-*** 1201,1212 ****
- acl_setfunctions();
-
- #ifdef SKEY
-! /* 0 means we found the user and the skeykeys file is open for update. */
-! if (skeychallenge (&skey_blk, name, chbuff) == 0)
-! reply (331, "[%s] required for %s.", chbuff, name);
-! else
-! #endif
- reply(331, "Password required for %s.", name);
- askpasswd = 1;
- /* Delay before reading passwd after first failed attempt to slow down
- * passwd-guessing programs. */
---- 1195,1205 ----
- acl_setfunctions();
-
- #ifdef SKEY
-! pwok = skeyaccess(name, NULL, remotehost, remoteaddr);
-! reply(331, "%s", skey_challenge(name, pw, pwok));
-! #else
- reply(331, "Password required for %s.", name);
-+ #endif
- askpasswd = 1;
- /* Delay before reading passwd after first failed attempt to slow down
- * passwd-guessing programs. */
-***************
-*** 1378,1389 ****
- xpasswd = crypt(passwd, salt);
- #endif
- #endif
-- #endif
-- #ifdef SKEY
-- /* comment the next line if you REALLY want to allow replayable passwds. */
-- strcpy (xpasswd, "wrongo:spazmoid"); /* disable regular passwds */
-- if (skeyverify (&skey_blk, passwd) == 0)
-- strcpy (xpasswd, pw->pw_passwd); /* do it the sleazy way */
- #endif
- #ifdef ULTRIX_AUTH
- if ((numfails = ultrix_check_pass(passwd, xpasswd)) < 0) {
---- 1371,1376 ----