diff options
author | Ulrich Müller <ulm@gentoo.org> | 2012-01-17 08:44:20 +0000 |
---|---|---|
committer | Ulrich Müller <ulm@gentoo.org> | 2013-02-15 11:58:08 +0100 |
commit | ba0e647fae328593d1d4c12c91b9a819fc11241e (patch) | |
tree | 9f5505110720225239ca8a991c26f3ebfff82323 | |
parent | Updated skeyinfo.c and skey.3 from newer NetBSD version, which is (diff) | |
download | ulm-ba0e647fae328593d1d4c12c91b9a819fc11241e.tar.gz ulm-ba0e647fae328593d1d4c12c91b9a819fc11241e.tar.bz2 ulm-ba0e647fae328593d1d4c12c91b9a819fc11241e.zip |
Fix typos in documentation (PAM_AUTH_ERR not PAM_AUTHERR).
-rw-r--r-- | patchsets/pam_skey/1.1.5/01_all_gentoo.patch | 4 | ||||
-rw-r--r-- | patchsets/pam_skey/1.1.5/02_all_require_skey.patch | 8 |
2 files changed, 6 insertions, 6 deletions
diff --git a/patchsets/pam_skey/1.1.5/01_all_gentoo.patch b/patchsets/pam_skey/1.1.5/01_all_gentoo.patch index d9562c8..df0b5f9 100644 --- a/patchsets/pam_skey/1.1.5/01_all_gentoo.patch +++ b/patchsets/pam_skey/1.1.5/01_all_gentoo.patch @@ -161,10 +161,10 @@ + 5a. If an empty response is given, request the S/Key response again, + this time with input echoed. + 5b. If the response is a valid S/Key response, return PAM_SUCCESS. -+ Otherwise, return PAM_AUTHERR. ++ Otherwise, return PAM_AUTH_ERR. +6. If the response is a valid S/Key response, return PAM_SUCCESS. +7. Otherwise, if no_default_skey is enabled (the user specifically -+ requested "s/key" authentication), return PAM_AUTHERR. ++ requested "s/key" authentication), return PAM_AUTH_ERR. +8. Otherwise, store the response as the authentication token and + return PAM_IGNORE. + diff --git a/patchsets/pam_skey/1.1.5/02_all_require_skey.patch b/patchsets/pam_skey/1.1.5/02_all_require_skey.patch index 9e51362..c43029a 100644 --- a/patchsets/pam_skey/1.1.5/02_all_require_skey.patch +++ b/patchsets/pam_skey/1.1.5/02_all_require_skey.patch @@ -49,7 +49,7 @@ the module doesn't change. return PAM_SUCCESS. 3a. If the token is invalid and use_first_pass is enabled, return - PAM_IGNORE. -+ PAM_IGNORE (or PAM_AUTHERR if require_skey is set). ++ PAM_IGNORE (or PAM_AUTH_ERR if require_skey is set). 4. If no_default_skey is enabled, issue a "Password: " prompt. 4a. If the response is anything besides "s/key" (case insensitive), store it as the authentication token and return PAM_IGNORE. @@ -63,13 +63,13 @@ the module doesn't change. 5a. If an empty response is given, request the S/Key response again, this time with input echoed. 5b. If the response is a valid S/Key response, return PAM_SUCCESS. - Otherwise, return PAM_AUTHERR. + Otherwise, return PAM_AUTH_ERR. 6. If the response is a valid S/Key response, return PAM_SUCCESS. -7. Otherwise, if no_default_skey is enabled (the user specifically -- requested "s/key" authentication), return PAM_AUTHERR. +- requested "s/key" authentication), return PAM_AUTH_ERR. +7. Otherwise, if no_default_skey is enabled (and the user specifically + requested "s/key" authentication), or if require_skey is enabled, -+ return PAM_AUTHERR. ++ return PAM_AUTH_ERR. 8. Otherwise, store the response as the authentication token and return PAM_IGNORE. |