# HG changeset patch # User Tomas Kuthan # Date 1474368880 25200 # Node ID f6f7269f85a922f3641024a263ae1d97de39dc8d # Parent 31ef2580c45d6f4d8693ed3e16c6c169bc98dbdb 24597931 PAM_BUGFIX by-passes fake password for timing attack avoidance diff -r 31ef2580c45d -r f6f7269f85a9 components/openssh/patches/015-pam_conversation_fix.patch --- a/components/openssh/patches/015-pam_conversation_fix.patch Tue Sep 20 03:54:40 2016 -0700 +++ b/components/openssh/patches/015-pam_conversation_fix.patch Tue Sep 20 03:54:40 2016 -0700 @@ -61,7 +61,7 @@ sshpam_password = fake = fake_password(password); +#ifdef PAM_BUGFIX -+ sshpam_err = pam_set_item(sshpam_handle, PAM_AUTHTOK, password); ++ sshpam_err = pam_set_item(sshpam_handle, PAM_AUTHTOK, sshpam_password); + if (sshpam_err != PAM_SUCCESS) { + debug("PAM: %s: failed to set PAM_AUTHTOK: %s", __func__, + pam_strerror(sshpam_handle, sshpam_err));