[Pkg-shadow-commits] r3228 - in upstream/trunk: . src

Nicolas FRANÇOIS nekral-guest at alioth.debian.org
Sat Aug 21 19:55:49 UTC 2010


Author: nekral-guest
Date: 2010-08-21 19:55:46 +0000 (Sat, 21 Aug 2010)
New Revision: 3228

Modified:
   upstream/trunk/ChangeLog
   upstream/trunk/src/passwd.c
Log:
	* src/passwd.c: Fix a const issue.
	* src/passwd.c: Avoid multi-statements lines.


Modified: upstream/trunk/ChangeLog
===================================================================
--- upstream/trunk/ChangeLog	2010-08-21 19:22:32 UTC (rev 3227)
+++ upstream/trunk/ChangeLog	2010-08-21 19:55:46 UTC (rev 3228)
@@ -1,5 +1,10 @@
 2010-08-21  Nicolas François  <nicolas.francois at centraliens.net>
 
+	* src/passwd.c: Fix a const issue.
+	* src/passwd.c: Avoid multi-statements lines.
+
+2010-08-21  Nicolas François  <nicolas.francois at centraliens.net>
+
 	* libmisc/copydir.c, lib/prototypes.h: Caller can choose not to
 	copy the extended attributes (the SELinux context is hence reset)
 	* src/usermod.c: Copy the extended attributes.

Modified: upstream/trunk/src/passwd.c
===================================================================
--- upstream/trunk/src/passwd.c	2010-08-21 19:22:32 UTC (rev 3227)
+++ upstream/trunk/src/passwd.c	2010-08-21 19:55:46 UTC (rev 3228)
@@ -221,7 +221,7 @@
 	int i;			/* Counter for retries */
 	int warned;
 	int pass_max_len = -1;
-	char *method;
+	const char *method;
 
 #ifdef HAVE_LIBCRACK_HIST
 	int HistUpdate (const char *, const char *);
@@ -261,7 +261,8 @@
 	 * for strength, unless it is the root user. This provides an escape
 	 * for initial login passwords.
 	 */
-	if ((method = getdef_str ("ENCRYPT_METHOD")) == NULL) {
+	method = getdef_str ("ENCRYPT_METHOD");
+	if (NULL == method) {
 		if (!getdef_bool ("MD5_CRYPT_ENAB")) {
 			pass_max_len = getdef_num ("PASS_MAX_LEN", 8);
 		}




More information about the Pkg-shadow-commits mailing list