freebsd-nq/lib/libpam/modules
Dag-Erling Smørgrav 4520e72ebf key_load_private() ignores the passphrase argument if the private key
is unencrypted.  This defeats the nullok check, because it means a
non-null passphrase will successfully unlock the key.

To address this, try at first to load the key without a passphrase.
If this succeeds and the user provided a non-empty passphrase *or*
nullok is false, reject the key.

MFC after:	1 week
Noticed by:	Guy Helmer <guy.helmer@palisadesystems.com>
2011-11-20 15:18:49 +00:00
..
pam_chroot
pam_deny
pam_echo %U was macroized in mdoc(7), escape. 2010-02-16 12:29:02 +00:00
pam_exec Build lib/ with WARNS=6 by default. 2010-01-02 09:58:07 +00:00
pam_ftpusers
pam_group Mention the name of the module in warning messages. 2011-03-12 11:26:37 +00:00
pam_guest
pam_krb5 Bump .Dd date. 2010-05-03 09:49:42 +00:00
pam_ksu
pam_lastlog Ensure pam_lastlog removes the /dev/ component of the TTY name. 2011-11-07 19:57:42 +00:00
pam_login_access
pam_nologin
pam_opie
pam_opieaccess
pam_passwdqc
pam_permit
pam_radius Build lib/ with WARNS=6 by default. 2010-01-02 09:58:07 +00:00
pam_rhosts
pam_rootok
pam_securetty
pam_self
pam_ssh key_load_private() ignores the passphrase argument if the private key 2011-11-20 15:18:49 +00:00
pam_tacplus
pam_unix Remove an unused variable from pam_unix. 2011-11-05 10:00:29 +00:00
Makefile
Makefile.inc Remove redundant WARNS?=6 overrides and inherit the WARNS setting from 2010-03-02 18:44:08 +00:00
modules.inc