From 1c7d6584a7811b7785ae5c1e378f14b5ba0971cf Mon Sep 17 00:00:00 2001 From: takeshi_hoshina Date: Mon, 2 Nov 2020 11:07:33 +0900 Subject: basesystem-jj recipes --- external/poky/meta/recipes-extended/pam/libpam/pam.d/common-password | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) (limited to 'external/poky/meta/recipes-extended/pam/libpam/pam.d/common-password') diff --git a/external/poky/meta/recipes-extended/pam/libpam/pam.d/common-password b/external/poky/meta/recipes-extended/pam/libpam/pam.d/common-password index 38960573..52478dae 100644 --- a/external/poky/meta/recipes-extended/pam/libpam/pam.d/common-password +++ b/external/poky/meta/recipes-extended/pam/libpam/pam.d/common-password @@ -10,13 +10,10 @@ # The "sha512" option enables salted SHA512 passwords. Without this option, # the default is Unix crypt. Prior releases used the option "md5". # -# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in -# login.defs. -# # See the pam_unix manpage for other options. # here are the per-package modules (the "Primary" block) -password [success=1 default=ignore] pam_unix.so obscure sha512 +password [success=1 default=ignore] pam_unix.so sha512 # here's the fallback if no module succeeds password requisite pam_deny.so # prime the stack with a positive return value if there isn't one already; -- cgit 1.2.3-korg