summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorUlrich Müller <ulm@gentoo.org>2012-01-17 08:44:20 +0000
committerUlrich Müller <ulm@gentoo.org>2013-02-15 11:58:08 +0100
commitba0e647fae328593d1d4c12c91b9a819fc11241e (patch)
tree9f5505110720225239ca8a991c26f3ebfff82323 /patchsets
parentUpdated skeyinfo.c and skey.3 from newer NetBSD version, which is (diff)
downloadulm-ba0e647fae328593d1d4c12c91b9a819fc11241e.tar.gz
ulm-ba0e647fae328593d1d4c12c91b9a819fc11241e.tar.bz2
ulm-ba0e647fae328593d1d4c12c91b9a819fc11241e.zip
Fix typos in documentation (PAM_AUTH_ERR not PAM_AUTHERR).
Diffstat (limited to 'patchsets')
-rw-r--r--patchsets/pam_skey/1.1.5/01_all_gentoo.patch4
-rw-r--r--patchsets/pam_skey/1.1.5/02_all_require_skey.patch8
2 files changed, 6 insertions, 6 deletions
diff --git a/patchsets/pam_skey/1.1.5/01_all_gentoo.patch b/patchsets/pam_skey/1.1.5/01_all_gentoo.patch
index d9562c8..df0b5f9 100644
--- a/patchsets/pam_skey/1.1.5/01_all_gentoo.patch
+++ b/patchsets/pam_skey/1.1.5/01_all_gentoo.patch
@@ -161,10 +161,10 @@
+ 5a. If an empty response is given, request the S/Key response again,
+ this time with input echoed.
+ 5b. If the response is a valid S/Key response, return PAM_SUCCESS.
-+ Otherwise, return PAM_AUTHERR.
++ Otherwise, return PAM_AUTH_ERR.
+6. If the response is a valid S/Key response, return PAM_SUCCESS.
+7. Otherwise, if no_default_skey is enabled (the user specifically
-+ requested "s/key" authentication), return PAM_AUTHERR.
++ requested "s/key" authentication), return PAM_AUTH_ERR.
+8. Otherwise, store the response as the authentication token and
+ return PAM_IGNORE.
+
diff --git a/patchsets/pam_skey/1.1.5/02_all_require_skey.patch b/patchsets/pam_skey/1.1.5/02_all_require_skey.patch
index 9e51362..c43029a 100644
--- a/patchsets/pam_skey/1.1.5/02_all_require_skey.patch
+++ b/patchsets/pam_skey/1.1.5/02_all_require_skey.patch
@@ -49,7 +49,7 @@ the module doesn't change.
return PAM_SUCCESS.
3a. If the token is invalid and use_first_pass is enabled, return
- PAM_IGNORE.
-+ PAM_IGNORE (or PAM_AUTHERR if require_skey is set).
++ PAM_IGNORE (or PAM_AUTH_ERR if require_skey is set).
4. If no_default_skey is enabled, issue a "Password: " prompt.
4a. If the response is anything besides "s/key" (case insensitive),
store it as the authentication token and return PAM_IGNORE.
@@ -63,13 +63,13 @@ the module doesn't change.
5a. If an empty response is given, request the S/Key response again,
this time with input echoed.
5b. If the response is a valid S/Key response, return PAM_SUCCESS.
- Otherwise, return PAM_AUTHERR.
+ Otherwise, return PAM_AUTH_ERR.
6. If the response is a valid S/Key response, return PAM_SUCCESS.
-7. Otherwise, if no_default_skey is enabled (the user specifically
-- requested "s/key" authentication), return PAM_AUTHERR.
+- requested "s/key" authentication), return PAM_AUTH_ERR.
+7. Otherwise, if no_default_skey is enabled (and the user specifically
+ requested "s/key" authentication), or if require_skey is enabled,
-+ return PAM_AUTHERR.
++ return PAM_AUTH_ERR.
8. Otherwise, store the response as the authentication token and
return PAM_IGNORE.