diff options
Diffstat (limited to 'package/utils/busybox/patches/520-loginutils-handle-crypt-failures.patch')
-rw-r--r-- | package/utils/busybox/patches/520-loginutils-handle-crypt-failures.patch | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/package/utils/busybox/patches/520-loginutils-handle-crypt-failures.patch b/package/utils/busybox/patches/520-loginutils-handle-crypt-failures.patch index d44375426f..91340d46e6 100644 --- a/package/utils/busybox/patches/520-loginutils-handle-crypt-failures.patch +++ b/package/utils/busybox/patches/520-loginutils-handle-crypt-failures.patch @@ -1,6 +1,6 @@ --- a/loginutils/chpasswd.c +++ b/loginutils/chpasswd.c -@@ -97,6 +97,11 @@ int chpasswd_main(int argc UNUSED_PARAM, +@@ -89,6 +89,11 @@ int chpasswd_main(int argc UNUSED_PARAM, crypt_make_pw_salt(salt, algo); free_me = pass = pw_encrypt(pass, salt, 0); @@ -14,7 +14,7 @@ /* This is rather complex: if user is not found in /etc/shadow, --- a/loginutils/cryptpw.c +++ b/loginutils/cryptpw.c -@@ -95,7 +95,7 @@ int cryptpw_main(int argc UNUSED_PARAM, +@@ -87,7 +87,7 @@ int cryptpw_main(int argc UNUSED_PARAM, /* Supports: cryptpw -m sha256 PASS 'rounds=999999999$SALT' */ char salt[MAX_PW_SALT_LEN + sizeof("rounds=999999999$")]; char *salt_ptr; @@ -23,7 +23,7 @@ const char *opt_m, *opt_S; int fd; -@@ -140,8 +140,12 @@ int cryptpw_main(int argc UNUSED_PARAM, +@@ -132,8 +132,12 @@ int cryptpw_main(int argc UNUSED_PARAM, /* may still be NULL on EOF/error */ } |