Blame SOURCES/sudo-1.8.6p3-authinterrupt.patch

523624
diff -up sudo-1.8.6p3/plugins/sudoers/auth/pam.c.authinterrupt sudo-1.8.6p3/plugins/sudoers/auth/pam.c
523624
--- sudo-1.8.6p3/plugins/sudoers/auth/pam.c.authinterrupt	2014-05-22 13:46:31.204706184 +0200
523624
+++ sudo-1.8.6p3/plugins/sudoers/auth/pam.c	2014-05-22 13:47:06.729830043 +0200
523624
@@ -167,13 +167,13 @@ sudo_pam_verify(struct passwd *pw, char
523624
 	    /* FALLTHROUGH */
523624
 	case PAM_AUTH_ERR:
523624
 	case PAM_AUTHINFO_UNAVAIL:
523624
+	case PAM_PERM_DENIED:
523624
 	    if (getpass_error) {
523624
 		/* error or ^C from tgetpass() */
523624
 		debug_return_int(AUTH_INTR);
523624
 	    }
523624
 	    /* FALLTHROUGH */
523624
 	case PAM_MAXTRIES:
523624
-	case PAM_PERM_DENIED:
523624
 	    debug_return_int(AUTH_FAILURE);
523624
 	default:
523624
 	    if ((s = pam_strerror(pamh, *pam_status)))
523624
@@ -343,6 +343,7 @@ converse(int num_msg, PAM_CONST struct p
523624
 		if (pass == NULL) {
523624
 		    /* Error (or ^C) reading password, don't try again. */
523624
 		    getpass_error = 1;
523624
+		    ret = PAM_CONV_ERR;
523624
 #if (defined(__darwin__) || defined(__APPLE__)) && !defined(OPENPAM_VERSION)
523624
 		    pass = "";
523624
 #else