diff options
-rw-r--r-- | changelog | 3 | ||||
-rw-r--r-- | local/unix_chkpwd.8 | 17 | ||||
-rwxr-xr-x | rules | 2 |
3 files changed, 2 insertions, 20 deletions
@@ -68,8 +68,9 @@ pam (0.99.7.1-2) UNRELEASED; urgency=low - kill off references to unused variables - make binary-arch also depend on the install target, and streamline the rules + * Drop debian/local/unix_chkpwd.8 in favor of the upstream manpage. - -- Steve Langasek <vorlon@debian.org> Sun, 19 Aug 2007 22:42:40 -0700 + -- Steve Langasek <vorlon@debian.org> Sun, 19 Aug 2007 23:02:46 -0700 pam (0.79-4) unstable; urgency=medium diff --git a/local/unix_chkpwd.8 b/local/unix_chkpwd.8 deleted file mode 100644 index 04c4c171..00000000 --- a/local/unix_chkpwd.8 +++ /dev/null @@ -1,17 +0,0 @@ -.TH UNIX_CHKPWD 8 "4 Jun 1999" "Linux-PAM 0.69" "Linux-PAM Manual" -.SH NAME -\fBunix_chkpwd\fR \- check the password of the invoking user -.SH SYNOPSIS -<not invoked manually> -.SH DESCRIPTION -A helper binary for the pam_unix module, unix_chkpwd, is provided to check -the user's password when it is stored in a read protected database, such as -shadow'd passwords. This binary is very simple and will only check the password -of the user invoking it. It is called transparently on behalf of the user by -the authenticating component of the pam_unix module. In this way it is possible -for applications like -.B xlock -to work work without being setuid root. -.SH USAGE -This program is not intended to be called directly by users and will log to syslog -if it is called improperly (i.e., by someone trying to exploit it). @@ -102,8 +102,6 @@ binary-arch: install module_check dh_testroot -a mkdir -p debian/tmp/etc/pam.d - $(ie) -D $(BUILD_TREE)/modules/pam_tally/pam_tally $(d)/tmp/usr/sbin/pam_tally - $(i) $(dl)/unix_chkpwd.8 $(d)/libpam-modules/usr/share/man/man8 mkdir -p debian/tmp/usr/lib mv debian/tmp/lib/*.a debian/tmp/usr/lib dh_movefiles -plibpam0g-dev -plibpam-cracklib -plibpam0g |