| /OK3568_Linux_fs/kernel/drivers/target/iscsi/ |
| H A D | iscsi_target_nego.c | 169 struct iscsi_login *login) in iscsi_target_check_login_request() argument 175 login_req = (struct iscsi_login_req *) login->req; in iscsi_target_check_login_request() 201 if (req_csg != login->current_stage) { in iscsi_target_check_login_request() 203 " from %d to %d, login failed.\n", login->current_stage, in iscsi_target_check_login_request() 221 if ((login_req->max_version != login->version_max) || in iscsi_target_check_login_request() 222 (login_req->min_version != login->version_min)) { in iscsi_target_check_login_request() 231 if (memcmp(login_req->isid, login->isid, 6) != 0) { in iscsi_target_check_login_request() 239 if (login_req->itt != login->init_task_tag) { in iscsi_target_check_login_request() 260 struct iscsi_login *login) in iscsi_target_check_first_request() argument 265 login->first_request = 0; in iscsi_target_check_first_request() [all …]
|
| H A D | iscsi_target_login.c | 40 struct iscsi_login *login; in iscsi_login_init_conn() local 42 login = kzalloc(sizeof(struct iscsi_login), GFP_KERNEL); in iscsi_login_init_conn() 43 if (!login) { in iscsi_login_init_conn() 47 conn->login = login; in iscsi_login_init_conn() 48 login->conn = conn; in iscsi_login_init_conn() 49 login->first_request = 1; in iscsi_login_init_conn() 51 login->req_buf = kzalloc(MAX_KEY_VALUE_PAIRS, GFP_KERNEL); in iscsi_login_init_conn() 52 if (!login->req_buf) { in iscsi_login_init_conn() 57 login->rsp_buf = kzalloc(MAX_KEY_VALUE_PAIRS, GFP_KERNEL); in iscsi_login_init_conn() 58 if (!login->rsp_buf) { in iscsi_login_init_conn() [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/files/pam.d/ |
| H A D | login | 2 # The PAM configuration file for the Shadow `login' service 6 # (Replaces the `FAIL_DELAY' setting from login.defs) 11 # Outputs an issue file prior to each login prompt (Replaces the 12 # ISSUE_FILE option from login.defs). Uncomment for use 16 # (Replaces the `CONSOLE' setting from login.defs) 26 # (Replaces the `NOLOGINS_FILE' option from login.defs) 42 # (Replaces the `CONSOLE_GROUPS' option in login.defs) 47 # (Replaces the `PORTTIME_CHECKS_ENAB' option from login.defs 53 # (Replaces /etc/login.access file) 57 # (Replaces the use of /etc/limits in old login) [all …]
|
| H A D | su | 14 # (Replaces the `SU_WHEEL_ONLY' option from login.defs) 27 # (Replaces the `PORTTIME_CHECKS_ENAB' option from login.defs 40 # in /etc/login.defs to make sure that removing a user 42 # See comments in /etc/login.defs 49 # (Replaces the use of /etc/limits in old login)
|
| /OK3568_Linux_fs/kernel/drivers/target/sbp/ |
| H A D | sbp_target.c | 97 struct sbp_login_descriptor *login, *found = NULL; in sbp_login_find_by_lun() local 100 list_for_each_entry(login, &session->login_list, link) { in sbp_login_find_by_lun() 101 if (login->login_lun == unpacked_lun) in sbp_login_find_by_lun() 102 found = login; in sbp_login_find_by_lun() 116 struct sbp_login_descriptor *login; in sbp_login_count_all_by_lun() local 124 list_for_each_entry(login, &sess->login_list, link) { in sbp_login_count_all_by_lun() 125 if (login->login_lun != unpacked_lun) in sbp_login_count_all_by_lun() 128 if (!exclusive || login->exclusive) in sbp_login_count_all_by_lun() 143 struct sbp_login_descriptor *login, *found = NULL; in sbp_login_find_by_id() local 150 list_for_each_entry(login, &sess->login_list, link) { in sbp_login_find_by_id() [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-shells/tcsh/tcsh/ |
| H A D | 0002-Add-debian-csh-scripts.patch | 9 csh.login | 8 ++++++++ 13 create mode 100644 csh.login 37 diff --git a/csh.login b/csh.login 41 +++ b/csh.login 43 +# /etc/csh.login: system-wide .login file for csh(1) and tcsh(1) 46 +if (-e /etc/csh/login.d && `/bin/ls /etc/csh/login.d` != "") then 47 + foreach FILE (`/bin/ls /etc/csh/login.d/*`)
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/ |
| H A D | shadow.inc | 42 file://pam.d/login \ 102 sed -i 's/#CREATE_HOME/CREATE_HOME/g' ${D}${sysconfdir}/login.defs 107 sed -i 's/MAIL_DIR/#MAIL_DIR/g' ${D}${sysconfdir}/login.defs 108 sed -i 's/#MAIL_FILE/MAIL_FILE/g' ${D}${sysconfdir}/login.defs 111 sed -i 's/MAIL_CHECK_ENAB/#MAIL_CHECK_ENAB/g' ${D}${sysconfdir}/login.defs 115 sed -i 's:^SU_NAME:#SU_NAME:g' ${D}${sysconfdir}/login.defs 118 sed -i 's/^#ENCRYPT_METHOD.*$/ENCRYPT_METHOD SHA512/' ${D}${sysconfdir}/login.defs 135 sed -i -f ${WORKDIR}/login_defs_pam.sed ${D}${sysconfdir}/login.defs 147 mv ${D}${bindir}/login ${D}${base_bindir}/login 165 ${base_bindir}/login.shadow \ [all …]
|
| H A D | shadow-sysroot_4.6.bb | 6 LIC_FILES_CHKSUM = "file://login.defs_shadow-sysroot;md5=25e2f2de4dfc8f966ac5cdfce45cd7d5" 12 # The sole purpose of this recipe is to provide the /etc/login.defs 15 SRC_URI = "file://login.defs_shadow-sysroot" 21 install -p -m 644 ${S}/login.defs_shadow-sysroot ${D}${sysconfdir}/login.defs 28 # and this has another copy of /etc/login.defs already provided by shadow
|
| /OK3568_Linux_fs/buildroot/support/testing/tests/toolchain/ |
| H A D | test_external.py | 69 self.emulator.login() 95 self.emulator.login() 134 self.emulator.login() 166 self.emulator.login() 192 self.emulator.login() 219 self.emulator.login() 244 self.emulator.login()
|
| /OK3568_Linux_fs/buildroot/support/testing/tests/package/ |
| H A D | test_python.py | 14 def login(self): member in TestPythonBase 19 self.emulator.login() 49 self.login() 63 self.login() 119 self.login()
|
| H A D | test_lua.py | 13 def login(self): member in TestLuaBase 18 self.emulator.login() 44 self.login() 56 self.login()
|
| H A D | test_rust.py | 14 def login(self): member in TestRustBase 19 self.emulator.login() 75 self.login() 97 self.login()
|
| H A D | test_luvi.py | 18 def login(self): member in TestLuvi 23 self.emulator.login() 36 self.login()
|
| H A D | test_openjdk.py | 27 def login(self): member in TestOpenJdk 34 self.emulator.login() 37 self.login()
|
| H A D | test_glxinfo.py | 44 def login(self): member in TestGlxinfo 52 self.emulator.login() 55 self.login()
|
| H A D | test_perl.py | 13 def login(self): member in TestPerlBase 18 self.emulator.login() 63 self.login()
|
| H A D | test_bmap_tools.py | 33 def login(self): member in TestBmapTools 40 self.emulator.login() 43 self.login()
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-webserver/recipes-webadmin/webmin/files/ |
| H A D | setup.sh | 32 if [ "$login" = "webmin" ]; then 89 echo "$login:$crypt:0" > $ufile 92 $perl -e 'print "$ARGV[0]:",crypt($ARGV[1], "\$1\$XXXXXXXX"),":0\n"' "$login" "$password" > $ufile 94 $perl -e 'print "$ARGV[0]:",crypt($ARGV[1], "XX"),":0\n"' "$login" "$password" > $ufile 134 echo "$login: $allmods" >> $afile 136 echo "$login: $defaultmods" >> $afile 142 if [ "$login" != "root" -a "$login" != "admin" ]; then
|
| /OK3568_Linux_fs/kernel/drivers/target/iscsi/cxgbit/ |
| H A D | cxgbit_target.c | 637 if (conn->login->leading_connection) { in cxgbit_set_iso_npdu() 684 if (conn->login->leading_connection) { in cxgbit_seq_pdu_inorder() 730 if (conn->login->leading_connection) { in cxgbit_set_params() 774 cxgbit_put_login_tx(struct iscsi_conn *conn, struct iscsi_login *login, in cxgbit_put_login_tx() argument 785 skb_store_bits(skb, 0, login->rsp, ISCSI_HDR_LEN); in cxgbit_put_login_tx() 786 skb_store_bits(skb, ISCSI_HDR_LEN, login->rsp_buf, length); in cxgbit_put_login_tx() 792 if (login->login_complete) { in cxgbit_put_login_tx() 804 if ((!login->login_complete) && (!login->login_failed)) in cxgbit_put_login_tx() 1325 struct iscsi_login *login = conn->login; in cxgbit_rx_login_pdu() local 1329 login_req = (struct iscsi_login_req *)login->req; in cxgbit_rx_login_pdu() [all …]
|
| /OK3568_Linux_fs/buildroot/docs/manual/ |
| H A D | makeusers-syntax.txt | 19 - +username+ is the desired user name (aka login name) for the user. 31 then login is disabled. If prefixed with +=+, then it is interpreted 33 +!=+, then the password will be crypt-encoded (using MD5) and login 34 will be disabled. If set to +*+, then login is not allowed. If set to 65 - +username+ (aka login name) is: +foo+ 69 - clear-text +password+ is: +blabla+, will be crypt(3)-encoded, and login is disabled. 81 - +username+ (aka login name) is: +test+
|
| /OK3568_Linux_fs/buildroot/support/testing/tests/fs/ |
| H A D | test_oci.py | 28 def login(self): member in TestOci 38 self.emulator.login() 48 self.login()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/files/ |
| H A D | login.defs_shadow-sysroot | 2 # /etc/login.defs - Configuration control definitions for the shadow package. 4 # $Id: login.defs 3038 2009-07-23 20:41:35Z nekral-guest $ 8 # Delay in seconds before being allowed another attempt after a login failure 15 # Enable logging and display of /var/log/faillog login failure info. 20 # Enable display of unknown usernames when login failures are recorded. 30 # Enable logging and display of /var/log/lastlog login time info. 35 # Enable checking and display of mailbox status upon login. 79 # be displayed upon login. 85 # If defined, this file will be output before each login prompt. 96 # If defined, login failures will be logged here in a utmp format. [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/mingetty/ |
| H A D | mingetty_1.08.bb | 4 …Linux text console, asks for a login name and then tranfers over to login directory. Is extended t…
|
| /OK3568_Linux_fs/buildroot/package/android-tools/ |
| H A D | 0016-adbd-Support-requiring-login-for-adb-shell.patch | 4 Subject: [PATCH 16/20] adbd: Support requiring login for adb shell 6 Run /usr/bin/adbd-auth for "adb shell auth" to login. 26 + "login with \"adb shell auth\" to continue.\r\n");
|
| /OK3568_Linux_fs/buildroot/package/python-flask-login/ |
| H A D | Config.in | 2 bool "python-flask-login" 8 https://github.com/maxcountryman/flask-login
|