Blame SOURCES/pam-1.1.5-unix-no-fallback.patch

c22a38
diff -up Linux-PAM-1.1.5/modules/pam_unix/pam_unix.8.xml.no-fallback Linux-PAM-1.1.5/modules/pam_unix/pam_unix.8.xml
c22a38
--- Linux-PAM-1.1.5/modules/pam_unix/pam_unix.8.xml.no-fallback	2011-06-21 11:04:56.000000000 +0200
c22a38
+++ Linux-PAM-1.1.5/modules/pam_unix/pam_unix.8.xml	2012-05-09 11:54:34.442036404 +0200
c22a38
@@ -265,11 +265,10 @@
c22a38
         <listitem>
c22a38
           <para>
c22a38
             When a user changes their password next,
c22a38
-            encrypt it with the SHA256 algorithm. If the
c22a38
-            SHA256 algorithm is not known to the <citerefentry>
c22a38
+            encrypt it with the SHA256 algorithm. The
c22a38
+            SHA256 algorithm must be supported by the <citerefentry>
c22a38
 	    <refentrytitle>crypt</refentrytitle><manvolnum>3</manvolnum>
c22a38
-            </citerefentry> function,
c22a38
-            fall back to MD5.
c22a38
+            </citerefentry> function.
c22a38
           </para>
c22a38
         </listitem>
c22a38
       </varlistentry>
c22a38
@@ -280,11 +279,10 @@
c22a38
         <listitem>
c22a38
           <para>
c22a38
             When a user changes their password next,
c22a38
-            encrypt it with the SHA512 algorithm. If the
c22a38
-            SHA512 algorithm is not known to the <citerefentry>
c22a38
+            encrypt it with the SHA512 algorithm. The
c22a38
+            SHA512 algorithm must be supported by the <citerefentry>
c22a38
 	    <refentrytitle>crypt</refentrytitle><manvolnum>3</manvolnum>
c22a38
-            </citerefentry> function,
c22a38
-            fall back to MD5.
c22a38
+            </citerefentry> function.
c22a38
           </para>
c22a38
         </listitem>
c22a38
       </varlistentry>
c22a38
@@ -295,11 +293,10 @@
c22a38
         <listitem>
c22a38
           <para>
c22a38
             When a user changes their password next,
c22a38
-            encrypt it with the blowfish algorithm. If the
c22a38
-            blowfish algorithm is not known to the <citerefentry>
c22a38
+            encrypt it with the blowfish algorithm. The
c22a38
+            blowfish algorithm must be supported by the <citerefentry>
c22a38
 	    <refentrytitle>crypt</refentrytitle><manvolnum>3</manvolnum>
c22a38
-            </citerefentry> function,
c22a38
-            fall back to MD5.
c22a38
+            </citerefentry> function.
c22a38
           </para>
c22a38
         </listitem>
c22a38
       </varlistentry>
c22a38
diff -up Linux-PAM-1.1.5/modules/pam_unix/passverify.c.no-fallback Linux-PAM-1.1.5/modules/pam_unix/passverify.c
c22a38
--- Linux-PAM-1.1.5/modules/pam_unix/passverify.c.no-fallback	2012-05-09 11:48:12.409632377 +0200
c22a38
+++ Linux-PAM-1.1.5/modules/pam_unix/passverify.c	2012-05-09 11:48:36.953172291 +0200
c22a38
@@ -427,15 +427,14 @@ PAMH_ARG_DECL(char * create_password_has
c22a38
 	if (!sp || strncmp(algoid, sp, strlen(algoid)) != 0) {
c22a38
 		/* libxcrypt/libc doesn't know the algorithm, use MD5 */
c22a38
 		pam_syslog(pamh, LOG_ERR,
c22a38
-			   "Algo %s not supported by the crypto backend, "
c22a38
-			   "falling back to MD5\n",
c22a38
+			   "Algo %s not supported by the crypto backend.\n",
c22a38
 			   on(UNIX_BLOWFISH_PASS, ctrl) ? "blowfish" :
c22a38
 			   on(UNIX_SHA256_PASS, ctrl) ? "sha256" :
c22a38
 			   on(UNIX_SHA512_PASS, ctrl) ? "sha512" : algoid);
c22a38
 		if(sp) {
c22a38
 		   memset(sp, '\0', strlen(sp));
c22a38
 		}
c22a38
-		return crypt_md5_wrapper(password);
c22a38
+		return NULL;
c22a38
 	}
c22a38
 
c22a38
 	return x_strdup(sp);