On Thu, Dec 17, 2009 at 01:09:56PM -0500, Stephen Gallagher wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 12/16/2009 08:31 AM, Sumit Bose wrote:
On Wed, Dec 16, 2009 at 02:03:44PM +0100, Sumit Bose wrote:
On Wed, Dec 16, 2009 at 01:04:01PM +0100, Sumit Bose wrote:
Hi,
this
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 12/18/2009 09:21 AM, Stephen Gallagher wrote:
On 12/18/2009 07:45 AM, Sumit Bose wrote:
fixed version attached.
Ack.
Pushed to master and 1-0-0.
- --
Stephen Gallagher
RHCE 804006346421761
Delivering value year after year.
Red Hat
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 12/16/2009 08:31 AM, Sumit Bose wrote:
On Wed, Dec 16, 2009 at 02:03:44PM +0100, Sumit Bose wrote:
On Wed, Dec 16, 2009 at 01:04:01PM +0100, Sumit Bose wrote:
Hi,
this patch should fix #326 Missing checks in PAM_PRELIM_CHECK
Currently we
Hi,
this patch should fix #326 Missing checks in PAM_PRELIM_CHECK
Currently we collect old and new password in pam_sss and send them
together to the sssd to change to password. But it is expected that
during the first call to pam_sm_chauthtok, when PAM_PRELIM_CHECK is set,
the old password is
On Wed, 2009-12-16 at 13:04 +0100, Sumit Bose wrote:
--- a/server/providers/proxy.c
+++ b/server/providers/proxy.c
@@ -137,6 +137,7 @@ static void proxy_pam_handler(struct be_req *req)
{
struct proxy_auth_ctx);
break;
case
On Wed, Dec 16, 2009 at 01:04:01PM +0100, Sumit Bose wrote:
Hi,
this patch should fix #326 Missing checks in PAM_PRELIM_CHECK
Currently we collect old and new password in pam_sss and send them
together to the sssd to change to password. But it is expected that
during the first call to