diff options
| author | Andrey A. Chernov <ache@FreeBSD.org> | 1997-04-27 21:48:55 +0000 |
|---|---|---|
| committer | Andrey A. Chernov <ache@FreeBSD.org> | 1997-04-27 21:48:55 +0000 |
| commit | a4ef9c1d42cb7bffc3d26576e987e81840642097 (patch) | |
| tree | ef926019be3cc1f638d93218e1c9fdbe991ddf77 /ftp/wu-ftpd/files/patch-ad | |
| parent | Upgrade to 3.5 beta 1 (diff) | |
Upgrade to beta-13
Notes
Notes:
svn path=/head/; revision=6339
Diffstat (limited to 'ftp/wu-ftpd/files/patch-ad')
| -rw-r--r-- | ftp/wu-ftpd/files/patch-ad | 58 |
1 files changed, 0 insertions, 58 deletions
diff --git a/ftp/wu-ftpd/files/patch-ad b/ftp/wu-ftpd/files/patch-ad deleted file mode 100644 index c94318c267f6..000000000000 --- a/ftp/wu-ftpd/files/patch-ad +++ /dev/null @@ -1,58 +0,0 @@ -*** src/ftpd.c.bak Mon Jan 20 08:05:11 1997 ---- src/ftpd.c Thu Jan 30 17:46:16 1997 -*************** -*** 235,246 **** - int logging = 0; - int log_commands = 0; - -- #ifdef SKEY /* H* add-on. Not as elegant as Wietse's */ -- #include "skey.h" /* logdaemon package, but does the job. */ -- struct skey skey_blk; -- char chbuff[80]; -- #endif -- - #ifdef SECUREOSF - #define SecureWare - #include <prot.h> ---- 235,240 ---- -*************** -*** 1201,1212 **** - acl_setfunctions(); - - #ifdef SKEY -! /* 0 means we found the user and the skeykeys file is open for update. */ -! if (skeychallenge (&skey_blk, name, chbuff) == 0) -! reply (331, "[%s] required for %s.", chbuff, name); -! else -! #endif - reply(331, "Password required for %s.", name); - askpasswd = 1; - /* Delay before reading passwd after first failed attempt to slow down - * passwd-guessing programs. */ ---- 1195,1205 ---- - acl_setfunctions(); - - #ifdef SKEY -! pwok = skeyaccess(name, NULL, remotehost, remoteaddr); -! reply(331, "%s", skey_challenge(name, pw, pwok)); -! #else - reply(331, "Password required for %s.", name); -+ #endif - askpasswd = 1; - /* Delay before reading passwd after first failed attempt to slow down - * passwd-guessing programs. */ -*************** -*** 1378,1389 **** - xpasswd = crypt(passwd, salt); - #endif - #endif -- #endif -- #ifdef SKEY -- /* comment the next line if you REALLY want to allow replayable passwds. */ -- strcpy (xpasswd, "wrongo:spazmoid"); /* disable regular passwds */ -- if (skeyverify (&skey_blk, passwd) == 0) -- strcpy (xpasswd, pw->pw_passwd); /* do it the sleazy way */ - #endif - #ifdef ULTRIX_AUTH - if ((numfails = ultrix_check_pass(passwd, xpasswd)) < 0) { ---- 1371,1376 ---- |
