summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorhaiqing <haiqing.bai@windriver.com>2020-06-15 11:05:57 +0800
committerAnuj Mittal <anuj.mittal@intel.com>2020-06-29 13:51:38 +0800
commitf5b90eeed7366432b39c7cd8c6ee8c23e2d4abe8 (patch)
tree80529fc4ec28e983d9e6b711a027838bde58fb81
parentd449e6b536c197b6723dab1d61e989706c14f19c (diff)
downloadopenembedded-core-contrib-f5b90eeed7366432b39c7cd8c6ee8c23e2d4abe8.tar.gz
openembedded-core-contrib-f5b90eeed7366432b39c7cd8c6ee8c23e2d4abe8.tar.bz2
openembedded-core-contrib-f5b90eeed7366432b39c7cd8c6ee8c23e2d4abe8.zip
libpam: Remove option 'obscure' from common-password
libpam does not support 'obscure' checks to password, there are the same checks in pam_cracklib module. And this fix can remove the below error message while updating password with 'passwd': pam_unix(passwd:chauthtok):unrecognized option[obscure] Signed-off-by: Haiqing Bai <Haiqing.Bai@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit ea761dbac90be77797308666fe1586b05e3df824) Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
-rw-r--r--meta/recipes-extended/pam/libpam/pam.d/common-password5
1 files changed, 1 insertions, 4 deletions
diff --git a/meta/recipes-extended/pam/libpam/pam.d/common-password b/meta/recipes-extended/pam/libpam/pam.d/common-password
index 3896057328..52478dae77 100644
--- a/meta/recipes-extended/pam/libpam/pam.d/common-password
+++ b/meta/recipes-extended/pam/libpam/pam.d/common-password
@@ -10,13 +10,10 @@
# The "sha512" option enables salted SHA512 passwords. Without this option,
# the default is Unix crypt. Prior releases used the option "md5".
#
-# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
-# login.defs.
-#
# See the pam_unix manpage for other options.
# here are the per-package modules (the "Primary" block)
-password [success=1 default=ignore] pam_unix.so obscure sha512
+password [success=1 default=ignore] pam_unix.so sha512
# here's the fallback if no module succeeds
password requisite pam_deny.so
# prime the stack with a positive return value if there isn't one already;