4520e72ebf
is unencrypted. This defeats the nullok check, because it means a non-null passphrase will successfully unlock the key. To address this, try at first to load the key without a passphrase. If this succeeds and the user provided a non-empty passphrase *or* nullok is false, reject the key. MFC after: 1 week Noticed by: Guy Helmer <guy.helmer@palisadesystems.com> |
||
---|---|---|
.. | ||
pam_chroot | ||
pam_deny | ||
pam_echo | ||
pam_exec | ||
pam_ftpusers | ||
pam_group | ||
pam_guest | ||
pam_krb5 | ||
pam_ksu | ||
pam_lastlog | ||
pam_login_access | ||
pam_nologin | ||
pam_opie | ||
pam_opieaccess | ||
pam_passwdqc | ||
pam_permit | ||
pam_radius | ||
pam_rhosts | ||
pam_rootok | ||
pam_securetty | ||
pam_self | ||
pam_ssh | ||
pam_tacplus | ||
pam_unix | ||
Makefile | ||
Makefile.inc | ||
modules.inc |