aboutsummaryrefslogtreecommitdiffstats
path: root/ftp/wu-ftpd/files/patch-ad
diff options
context:
space:
mode:
Diffstat (limited to 'ftp/wu-ftpd/files/patch-ad')
-rw-r--r--ftp/wu-ftpd/files/patch-ad58
1 files changed, 0 insertions, 58 deletions
diff --git a/ftp/wu-ftpd/files/patch-ad b/ftp/wu-ftpd/files/patch-ad
deleted file mode 100644
index c94318c267f..00000000000
--- a/ftp/wu-ftpd/files/patch-ad
+++ /dev/null
@@ -1,58 +0,0 @@
-*** src/ftpd.c.bak Mon Jan 20 08:05:11 1997
---- src/ftpd.c Thu Jan 30 17:46:16 1997
-***************
-*** 235,246 ****
- int logging = 0;
- int log_commands = 0;
-
-- #ifdef SKEY /* H* add-on. Not as elegant as Wietse's */
-- #include "skey.h" /* logdaemon package, but does the job. */
-- struct skey skey_blk;
-- char chbuff[80];
-- #endif
--
- #ifdef SECUREOSF
- #define SecureWare
- #include <prot.h>
---- 235,240 ----
-***************
-*** 1201,1212 ****
- acl_setfunctions();
-
- #ifdef SKEY
-! /* 0 means we found the user and the skeykeys file is open for update. */
-! if (skeychallenge (&skey_blk, name, chbuff) == 0)
-! reply (331, "[%s] required for %s.", chbuff, name);
-! else
-! #endif
- reply(331, "Password required for %s.", name);
- askpasswd = 1;
- /* Delay before reading passwd after first failed attempt to slow down
- * passwd-guessing programs. */
---- 1195,1205 ----
- acl_setfunctions();
-
- #ifdef SKEY
-! pwok = skeyaccess(name, NULL, remotehost, remoteaddr);
-! reply(331, "%s", skey_challenge(name, pw, pwok));
-! #else
- reply(331, "Password required for %s.", name);
-+ #endif
- askpasswd = 1;
- /* Delay before reading passwd after first failed attempt to slow down
- * passwd-guessing programs. */
-***************
-*** 1378,1389 ****
- xpasswd = crypt(passwd, salt);
- #endif
- #endif
-- #endif
-- #ifdef SKEY
-- /* comment the next line if you REALLY want to allow replayable passwds. */
-- strcpy (xpasswd, "wrongo:spazmoid"); /* disable regular passwds */
-- if (skeyverify (&skey_blk, passwd) == 0)
-- strcpy (xpasswd, pw->pw_passwd); /* do it the sleazy way */
- #endif
- #ifdef ULTRIX_AUTH
- if ((numfails = ultrix_check_pass(passwd, xpasswd)) < 0) {
---- 1371,1376 ----