Home
last modified time | relevance | path

Searched refs:pam (Results 1 – 25 of 230) sorted by relevance

12345678910

/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/files/
H A Dshadow-update-pam-conf.patch1 The system-auth in the configure files is from Fedora which put all the 4 pam type rules
11 diff -Nur shadow-4.1.4.3/etc/pam.d.orig/chage shadow-4.1.4.3/etc/pam.d/chage
12 --- shadow-4.1.4.3/etc/pam.d.orig/chage 2011-07-20 19:02:27.384844958 +0800
13 +++ shadow-4.1.4.3/etc/pam.d/chage 2011-07-20 19:03:08.964844958 +0800
20 diff -Nur shadow-4.1.4.3/etc/pam.d.orig/chgpasswd shadow-4.1.4.3/etc/pam.d/chgpasswd
21 --- shadow-4.1.4.3/etc/pam.d.orig/chgpasswd 2011-07-20 19:02:27.384844958 +0800
22 +++ shadow-4.1.4.3/etc/pam.d/chgpasswd 2011-07-20 19:03:26.544844958 +0800
29 diff -Nur shadow-4.1.4.3/etc/pam.d.orig/groupadd shadow-4.1.4.3/etc/pam.d/groupadd
30 --- shadow-4.1.4.3/etc/pam.d.orig/groupadd 2011-07-20 19:02:27.384844958 +0800
31 +++ shadow-4.1.4.3/etc/pam.d/groupadd 2011-07-20 19:04:08.124844958 +0800
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/
H A Dlibpam_1.5.2.bb4 HOMEPAGE = "https://fedorahosted.org/linux-pam/"
5 BUGTRACKER = "https://fedorahosted.org/linux-pam/newticket"
8 # /etc/pam.d comes from Debian libpam-runtime in 2009-11 (at that time
15 SRC_URI = "https://github.com/linux-pam/linux-pam/releases/download/v${PV}/Linux-PAM-${PV}.tar.xz \
17 file://pam.d/common-account \
18 file://pam.d/common-auth \
19 file://pam.d/common-password \
20 file://pam.d/common-session \
21 file://pam.d/common-session-noninteractive \
22 file://pam.d/other \
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/
H A Dshadow.inc16 ${@bb.utils.contains('PACKAGECONFIG', 'pam', '${PAM_SRC_URI}', '', d)} \
23 file://shadow-update-pam-conf.patch \
39 PAM_SRC_URI = "file://pam.d/chfn \
40 file://pam.d/chpasswd \
41 file://pam.d/chsh \
42 file://pam.d/login \
43 file://pam.d/newusers \
44 file://pam.d/passwd \
45 file://pam.d/su"
63 pam-plugin-faildelay \
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/sudo/
H A Dsudo_1.9.13p3.bb4 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \
9 PAM_SRC_URI = "file://sudo.pam"
13 DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"
14 RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-ke…
25 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--with-pam', '--without-pam', d)} \
33 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then
34 install -D -m 644 ${WORKDIR}/sudo.pam ${D}/${sysconfdir}/pam.d/sudo
35 if ${@bb.utils.contains('PACKAGECONFIG', 'pam-wheel', 'true', 'false', d)} ; then
36 echo 'auth required pam_wheel.so use_uid' >>${D}${sysconfdir}/pam.d/sudo
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/libpam/
H A D0001-run-xtests.sh-check-whether-files-exist.patch10 mv: cannot stat '/etc/security/opasswd-pam-xtests': No such file or directory
16 Upstream-Status: Backport [https://github.com/linux-pam/linux-pam/commit/e8e8ccfd57e0274b431bc5717b…
31 - cp /etc/security/$config /etc/security/$config-pam-xtests
33 + mv /etc/security/$config /etc/security/$config-pam-xtests
36 -mv /etc/security/opasswd /etc/security/opasswd-pam-xtests
38 + mv /etc/security/opasswd /etc/security/opasswd-pam-xtests
44 rm -f /etc/pam.d/$testname*
46 -mv /etc/security/access.conf-pam-xtests /etc/security/access.conf
47 -mv /etc/security/group.conf-pam-xtests /etc/security/group.conf
48 -mv /etc/security/time.conf-pam-xtests /etc/security/time.conf
[all …]
/OK3568_Linux_fs/buildroot/package/linux-pam/
H A Dlinux-pam.mk9 LINUX_PAM_SITE = https://github.com/linux-pam/linux-pam/releases/download/v$(LINUX_PAM_VERSION)
25 LINUX_PAM_CPE_ID_VENDOR = linux-pam
34 $(TARGET_DIR)/etc/pam.d/login
49 $(INSTALL) -m 0644 -D package/linux-pam/login.pam \
50 $(TARGET_DIR)/etc/pam.d/login
51 $(INSTALL) -m 0644 -D package/linux-pam/other.pam \
52 $(TARGET_DIR)/etc/pam.d/other
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-netkit/netkit-rsh/
H A Dnetkit-rsh_0.17.bb28 PAM_SRC_URI = "file://rexec.pam \
29 file://rlogin.pam \
30 file://rsh.pam \
32 SRC_URI += "${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)}"
40 PACKAGECONFIG:append = " ${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}"
41 PACKAGECONFIG[pam] = " , --without-pam, libpam, libpam"
49 if [ "${@bb.utils.filter('PACKAGECONFIG', 'pam', d)}" ]; then
71 if [ "${@bb.utils.filter('PACKAGECONFIG', 'pam', d)}" ]; then
72 install -d ${D}${sysconfdir}/pam.d
74 install -m 0644 ${WORKDIR}/rexec.pam ${D}/${sysconfdir}/pam.d/rexec
[all …]
/OK3568_Linux_fs/buildroot/package/weston/
H A D0088-libweston-Add-user-authentication-support-via-PAM.patch7 This requires a configuration file /etc/pam.d/weston.
17 pam/meson.build | 8 +++
18 pam/weston-remote-access | 3 +
21 create mode 100644 pam/meson.build
22 create mode 100644 pam/weston-remote-access
115 + struct pam_handle *pam;
120 + ret = pam_start("weston-remote-access", username, &conv, &pam);
126 + ret = pam_authenticate(pam, 0);
132 + ret = pam_acct_mgmt(pam, 0);
140 + ret = pam_end(pam, ret);
[all …]
/OK3568_Linux_fs/yocto/meta-rockchip/recipes-graphics/wayland/weston_11.0.1/
H A D0089-libweston-Add-user-authentication-support-via-PAM.patch7 This requires a configuration file /etc/pam.d/weston.
17 pam/meson.build | 8 +++
18 pam/weston-remote-access | 3 +
21 create mode 100644 pam/meson.build
22 create mode 100644 pam/weston-remote-access
115 + struct pam_handle *pam;
120 + ret = pam_start("weston-remote-access", username, &conv, &pam);
126 + ret = pam_authenticate(pam, 0);
132 + ret = pam_acct_mgmt(pam, 0);
140 + ret = pam_end(pam, ret);
[all …]
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/lxdm/
H A Dlxdm_0.5.3.bb7 … ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'file://lxdm-pam file://lxdm-pam-debug', '', d)} \
14 file://0003-check-whether-password-expired-with-pam.patch \
15 file://0004-lxdm.c-add-function-to-change-password-with-pam.patch \
44 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--with-pam', '--without-pam', d)} \
64 if ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'true', 'false', d)}; then
65 # ArchLinux version of pam config has the following advantages:
68 …/${@bb.utils.contains("DISTRO_TYPE", "debug", "lxdm-pam-debug", "lxdm-pam",d)} ${D}${sysconfdir}/p…
86 RDEPENDS:${PN} = "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-loginuid', '', d)} set…
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/at/
H A Dat_3.2.5.bb9 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"
17 RDEPENDS:${PN} = "${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_DEPS}', '', d)} \
20 PAM_DEPS = "libpam libpam-runtime pam-plugin-env pam-plugin-limits"
31 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \
36 PAM_SRC_URI = "file://pam.conf.patch \
37 file://configure-add-enable-pam.patch"
46 … ac_cv_header_security_pam_appl_h=${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', 'no', d)} "
72 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then
73 install -D -m 0644 ${WORKDIR}/${BP}/pam.conf ${D}${sysconfdir}/pam.d/atd
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/screen/
H A Dscreen_4.9.0.bb16 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"
20 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'file://screen.pam', '', d)} \
34 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--enable-pam', '--disable-pam', d)}"
38 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then
39 install -D -m 644 ${WORKDIR}/screen.pam ${D}/${sysconfdir}/pam.d/screen
/OK3568_Linux_fs/buildroot/package/python-pam/
H A DConfig.in1 comment "python-pam needs a toolchain w/ wchar, locale, dynamic library"
6 bool "python-pam"
8 depends on BR2_ENABLE_LOCALE # linux-pam
9 depends on BR2_USE_WCHAR # linux-pam
10 depends on BR2_USE_MMU # linux-pam
11 depends on !BR2_STATIC_LIBS # linux-pam
/OK3568_Linux_fs/kernel/mm/
H A Dhighmem.c421 struct page_address_map *pam; in page_address() local
423 list_for_each_entry(pam, &pas->lh, list) { in page_address()
424 if (pam->page == page) { in page_address()
425 ret = pam->virtual; in page_address()
446 struct page_address_map *pam; in set_page_address() local
452 pam = &page_address_maps[PKMAP_NR((unsigned long)virtual)]; in set_page_address()
453 pam->page = page; in set_page_address()
454 pam->virtual = virtual; in set_page_address()
457 list_add_tail(&pam->list, &pas->lh); in set_page_address()
461 list_for_each_entry(pam, &pas->lh, list) { in set_page_address()
[all …]
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/vlock/
H A Dvlock_2.2.3.bb24 # authentification method: either pam or shadow
25 PACKAGECONFIG ?= "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam', 'shadow', d)}"
26 PACKAGECONFIG[pam] = "--enable-pam,,libpam,"
51 if [ ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', '', d)} = yes ]; then
52 install -d -m 0755 ${D}/${sysconfdir}/pam.d
53 install -m 0644 ${WORKDIR}/vlock_pam ${D}${sysconfdir}/pam.d/vlock
/OK3568_Linux_fs/buildroot/package/nss-pam-ldapd/
H A Dnss-pam-ldapd.mk8 NSS_PAM_LDAPD_SITE = http://arthurdejong.org/nss-pam-ldapd
23 NSS_PAM_LDAPD_CONF_OPTS += --enable-pam
24 NSS_PAM_LDAPD_DEPENDENCIES += linux-pam
26 NSS_PAM_LDAPD_CONF_OPTS += --disable-pam
30 $(INSTALL) -m 644 -D package/nss-pam-ldapd/nslcd.service \
35 $(INSTALL) -m 755 -D package/nss-pam-ldapd/S45nslcd \
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/dropbear/
H A Ddropbear.inc20 DEPENDS += "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"
29 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \
34 PAM_SRC_URI = "file://0005-dropbear-enable-pam.patch \
39 pam-plugin-deny \
40 pam-plugin-permit \
41 pam-plugin-unix \
43 RDEPENDS:${PN} += "${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_PLUGINS}', '', d)}"
63 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--enable-pam', '--disable-pam', d)}"
101 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then
102 install -d ${D}${sysconfdir}/pam.d
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/libcgroup/
H A Dlibcgroup_2.0.2.bb22 PACKAGECONFIG = "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}"
23 PACKAGECONFIG[pam] = "--enable-pam-module-dir=${base_libdir}/security --enable-pam=yes,--enable-pam
25 PACKAGES =+ "cgroups-pam-plugin"
26 FILES:cgroups-pam-plugin = "${base_libdir}/security/pam_cgroup.so*"
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/
H A D0003-check-whether-password-expired-with-pam.patch4 Subject: [PATCH 3/8] check whether password expired with pam
7 password is expired, return it. Only work with pam.
14 src/pam.c | 4 ++++
29 diff --git a/src/pam.c b/src/pam.c
31 --- a/src/pam.c
32 +++ b/src/pam.c
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/cronie/cronie/
H A Dcrond_pam_config.patch1 password-auth is the Fedora's common pam configure file, use oe common pam
7 diff --git a/pam/crond b/pam/crond
9 --- a/pam/crond
10 +++ b/pam/crond
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/consolekit/
H A Dconsolekit_0.4.6.bb28 PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'pam systemd polkit', d)}"
30 PACKAGECONFIG[pam] = "--enable-pam-module --with-pam-module-dir=${base_libdir}/security,--disable-p…
38 PACKAGES =+ "pam-plugin-ck-connector"
39 FILES:pam-plugin-ck-connector += "${base_libdir}/security/*.so"
40 RDEPENDS:pam-plugin-ck-connector += "${PN}"
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/kbd/
H A Dkbd_2.4.0.bb21 PACKAGECONFIG ?= "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)} \
24 PACKAGECONFIG[pam] = "--enable-vlock, --disable-vlock, libpam,"
34 if [ ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', '', d)} = yes ] \
35 && [ -f ${D}${sysconfdir}/pam.d/vlock ]; then
36 mv -f ${D}${sysconfdir}/pam.d/vlock ${D}${sysconfdir}/pam.d/vlock.kbd
43 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'vlock','', d)}"
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/at/at/
H A Dpam.conf.patch4 Subject: [PATCH] fix pam.conf
13 pam.conf | 6 +++---
16 diff --git a/pam.conf b/pam.conf
18 --- a/pam.conf
19 +++ b/pam.conf
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-security/passwdqc/
H A Dpasswdqc_1.3.1.bb25 REQUIRED_DISTRO_FEATURES = "pam"
36 # explicitly define LINUX_PAM in case DISTRO_FEATURES no pam
37 # this package's pam_passwdqc.so needs pam
58 PROVIDES += "pam-${BPN}"
59 PACKAGES =+ "lib${BPN} pam-${BPN}"
62 FILES:pam-${BPN} = "${base_libdir}/security/pam_passwdqc.so"
65 RDEPENDS:${PN} = "lib${BPN} pam-${BPN}"
66 RDEPENDS:pam-${BPN} = "lib${BPN}"
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/
H A Dvlock_pam_tally2_reset.patch12 src/auth-pam.c | 3 +++
15 diff --git a/src/auth-pam.c b/src/auth-pam.c
17 --- a/src/auth-pam.c
18 +++ b/src/auth-pam.c

12345678910