aboutsummaryrefslogtreecommitdiffstats
path: root/ftp/proftpd/files/patch-ae
diff options
context:
space:
mode:
Diffstat (limited to 'ftp/proftpd/files/patch-ae')
-rw-r--r--ftp/proftpd/files/patch-ae61
1 files changed, 29 insertions, 32 deletions
diff --git a/ftp/proftpd/files/patch-ae b/ftp/proftpd/files/patch-ae
index 5fac82747d06..eb59e14d9b3f 100644
--- a/ftp/proftpd/files/patch-ae
+++ b/ftp/proftpd/files/patch-ae
@@ -1,6 +1,6 @@
---- modules/mod_auth.c.orig Mon Jan 3 13:28:39 2000
-+++ modules/mod_auth.c Thu Jan 27 23:17:19 2000
-@@ -70,7 +70,7 @@
+--- modules/mod_auth.c.orig Fri Jul 28 10:51:59 2000
++++ modules/mod_auth.c Fri Jul 28 10:52:17 2000
+@@ -72,7 +72,7 @@
"closing control connection.",
TimeoutLogin);
@@ -9,7 +9,7 @@
(void*) 0, NULL);
/* should never be reached */
-@@ -559,7 +559,7 @@
+@@ -608,7 +608,7 @@
c = _auth_resolve_user(p,&user,&ourname,&anonname);
if(!user) {
@@ -18,7 +18,7 @@
origuser);
goto auth_failure;
}
-@@ -568,7 +568,7 @@
+@@ -617,7 +617,7 @@
aclp = login_check_limits(main_server->conf,FALSE,TRUE,&i);
if((pw = auth_getpwnam(p,user)) == NULL) {
@@ -27,7 +27,7 @@
goto auth_failure;
}
-@@ -629,14 +629,14 @@
+@@ -678,14 +678,14 @@
}
if(!login_check_limits(c->subset,FALSE,TRUE,&i) || (!aclp && !i) ){
@@ -44,16 +44,16 @@
origuser);
goto auth_failure;
}
-@@ -650,7 +650,7 @@
- /* if 'AuthUsingAlias' set and logging in under an alias then auth using that alias */
- if (origuser && strcasecmp(user,origuser) && get_param_int(c->subset,"AuthUsingAlias",FALSE) == 1) {
+@@ -702,7 +702,7 @@
+ if(c && origuser && strcasecmp(user,origuser) &&
+ get_param_int(c->subset,"AuthUsingAlias",FALSE) == 1) {
user_name = origuser;
-- log_auth(LOG_NOTICE,"ANON AUTH: User %s, Auth Alias %s",user,user_name);
-+ log_auth(LOG_INFO,"ANON AUTH: User %s, Auth Alias %s",user,user_name);
+- log_auth(LOG_NOTICE, "ANON AUTH: User %s, Auth Alias %s",
++ log_auth(LOG_INFO, "ANON AUTH: User %s, Auth Alias %s",
+ user, user_name);
}
-
- if(c)
-@@ -677,22 +677,22 @@
+
+@@ -730,22 +730,22 @@
switch(authcode) {
case AUTH_NOPWD:
@@ -80,7 +80,7 @@
user);
goto auth_failure;
-@@ -715,12 +715,12 @@
+@@ -768,12 +768,12 @@
auth_setgrent(p);
if(!_auth_check_shell((c ? c->subset : main_server->conf),pw->pw_shell)) {
@@ -95,7 +95,7 @@
user, FTPUSERS_PATH);
goto auth_failure;
}
-@@ -792,7 +792,7 @@
+@@ -845,7 +845,7 @@
if(!login_check_limits((c ? c->subset : main_server->conf),FALSE,TRUE,&i))
{
@@ -104,19 +104,16 @@
origuser);
goto auth_failure;
}
-@@ -807,9 +807,9 @@
+@@ -860,7 +860,7 @@
+ if(c && c->subset)
resolve_anonymous_dirs(c->subset);
- if(c)
-- log_auth(LOG_NOTICE, "ANON %s: Login successful.", origuser);
-+ log_auth(LOG_INFO, "ANON %s: Login successful.", origuser);
- else
-- log_auth(LOG_NOTICE,"USER %s: Login successful.", origuser);
-+ log_auth(LOG_INFO,"USER %s: Login successful.", origuser);
+- log_auth(LOG_NOTICE, "%s %s: Login successful.",
++ log_auth(LOG_INFO, "%s %s: Login successful.",
+ (c != NULL) ? "ANON" : "USER",
+ origuser);
- /* Write the login to wtmp. This must be done here because we won't
- * have access after we give up root. This can result in falsified
-@@ -1073,7 +1073,7 @@
+@@ -1172,7 +1172,7 @@
if(failnopwprompt) {
if(!user) {
@@ -125,7 +122,7 @@
origuser);
send_response(R_530,"Login incorrect.");
end_login(0);
-@@ -1090,7 +1090,7 @@
+@@ -1189,7 +1189,7 @@
if(c) {
if(!login_check_limits(c->subset,FALSE,TRUE,&i) || (!aclp && !i) ) {
@@ -134,7 +131,7 @@
origuser);
send_response(R_530,"Login incorrect.");
end_login(0);
-@@ -1098,7 +1098,7 @@
+@@ -1197,7 +1197,7 @@
}
if(!c && !aclp) {
@@ -143,7 +140,7 @@
send_response(R_530,"Login incorrect.");
end_login(0);
}
-@@ -1169,7 +1169,7 @@
+@@ -1269,7 +1269,7 @@
"Too many users in your class, "
"please try again later.");
@@ -152,7 +149,7 @@
session.class->name);
end_login(0);
-@@ -1202,7 +1202,7 @@
+@@ -1304,7 +1304,7 @@
send_response(R_530,"%s",
sreplace(cmd->tmp_pool,maxstr,"%m",maxn,NULL));
@@ -161,7 +158,7 @@
max);
end_login(0);
-@@ -1226,7 +1226,7 @@
+@@ -1330,7 +1330,7 @@
if(cur >= max) {
send_response(R_530, "%s",
sreplace(cmd->tmp_pool, maxstr, "%m", maxn, NULL));
@@ -170,7 +167,7 @@
end_login(0);
}
-@@ -1301,7 +1301,7 @@
+@@ -1411,7 +1411,7 @@
if(++auth_tries >= max) {
send_response(R_530,"Login incorrect");