summaryrefslogtreecommitdiff
path: root/source/installer/dropbear/dropbear_emptypass.patch
diff options
context:
space:
mode:
Diffstat (limited to 'source/installer/dropbear/dropbear_emptypass.patch')
-rw-r--r--source/installer/dropbear/dropbear_emptypass.patch51
1 files changed, 51 insertions, 0 deletions
diff --git a/source/installer/dropbear/dropbear_emptypass.patch b/source/installer/dropbear/dropbear_emptypass.patch
new file mode 100644
index 00000000..995b4d5c
--- /dev/null
+++ b/source/installer/dropbear/dropbear_emptypass.patch
@@ -0,0 +1,51 @@
+diff -uarN dropbear-0.50.orig/options.h dropbear-0.50/options.h
+--- dropbear-0.50.orig/options.h 2007-08-08 17:39:37.000000000 +0200
++++ dropbear-0.50/options.h 2008-02-01 00:22:07.000000000 +0100
+@@ -148,6 +148,9 @@
+ * SSH_ASKPASS instead. Comment out this var to remove this functionality.*/
+ #define DROPBEAR_PASSWORD_ENV "DROPBEAR_PASSWORD"
+
++/* disable server empty password check because root has no password on EZX */
++#define DISABLE_SVR_EMPTY_PASSWD_CHECK
++
+ /* Define this (as well as ENABLE_CLI_PASSWORD_AUTH) to allow the use of
+ * a helper program for the ssh client. The helper program should be
+ * specified in the SSH_ASKPASS environment variable, and dbclient
+diff -uarN dropbear-0.50.orig/svr-auth.c dropbear-0.50/svr-auth.c
+--- dropbear-0.50.orig/svr-auth.c 2007-08-08 17:39:37.000000000 +0200
++++ dropbear-0.50/svr-auth.c 2008-02-01 00:22:07.000000000 +0100
+@@ -236,6 +236,7 @@
+ return DROPBEAR_FAILURE;
+ }
+
++#ifndef DISABLE_SVR_EMPTY_PASSWD_CHECK
+ /* check for an empty password */
+ if (ses.authstate.pw->pw_passwd[0] == '\0') {
+ TRACE(("leave checkusername: empty pword"))
+@@ -244,6 +245,7 @@
+ send_msg_userauth_failure(0, 1);
+ return DROPBEAR_FAILURE;
+ }
++#endif
+
+ TRACE(("shell is %s", ses.authstate.pw->pw_shell))
+
+diff -uarN dropbear-0.50.orig/svr-authpasswd.c dropbear-0.50/svr-authpasswd.c
+--- dropbear-0.50.orig/svr-authpasswd.c 2007-08-08 17:39:37.000000000 +0200
++++ dropbear-0.50/svr-authpasswd.c 2008-02-01 00:23:00.000000000 +0100
+@@ -60,6 +60,7 @@
+ passwdcrypt = DEBUG_HACKCRYPT;
+ #endif
+
++#ifndef DISABLE_SVR_EMPTY_PASSWD_CHECK
+ /* check for empty password - need to do this again here
+ * since the shadow password may differ to that tested
+ * in auth.c */
+@@ -69,6 +70,7 @@
+ send_msg_userauth_failure(0, 1);
+ return;
+ }
++#endif
+
+ /* check if client wants to change password */
+ changepw = buf_getbool(ses.payload);