| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/files/ |
| H A D | shadow-update-pam-conf.patch | 1 The system-auth in the configure files is from Fedora which put all the 4 pam type rules 11 diff -Nur shadow-4.1.4.3/etc/pam.d.orig/chage shadow-4.1.4.3/etc/pam.d/chage 12 --- shadow-4.1.4.3/etc/pam.d.orig/chage 2011-07-20 19:02:27.384844958 +0800 13 +++ shadow-4.1.4.3/etc/pam.d/chage 2011-07-20 19:03:08.964844958 +0800 20 diff -Nur shadow-4.1.4.3/etc/pam.d.orig/chgpasswd shadow-4.1.4.3/etc/pam.d/chgpasswd 21 --- shadow-4.1.4.3/etc/pam.d.orig/chgpasswd 2011-07-20 19:02:27.384844958 +0800 22 +++ shadow-4.1.4.3/etc/pam.d/chgpasswd 2011-07-20 19:03:26.544844958 +0800 29 diff -Nur shadow-4.1.4.3/etc/pam.d.orig/groupadd shadow-4.1.4.3/etc/pam.d/groupadd 30 --- shadow-4.1.4.3/etc/pam.d.orig/groupadd 2011-07-20 19:02:27.384844958 +0800 31 +++ shadow-4.1.4.3/etc/pam.d/groupadd 2011-07-20 19:04:08.124844958 +0800 [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/ |
| H A D | libpam_1.5.2.bb | 4 HOMEPAGE = "https://fedorahosted.org/linux-pam/" 5 BUGTRACKER = "https://fedorahosted.org/linux-pam/newticket" 8 # /etc/pam.d comes from Debian libpam-runtime in 2009-11 (at that time 15 SRC_URI = "https://github.com/linux-pam/linux-pam/releases/download/v${PV}/Linux-PAM-${PV}.tar.xz \ 17 file://pam.d/common-account \ 18 file://pam.d/common-auth \ 19 file://pam.d/common-password \ 20 file://pam.d/common-session \ 21 file://pam.d/common-session-noninteractive \ 22 file://pam.d/other \ [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/shadow/ |
| H A D | shadow.inc | 16 ${@bb.utils.contains('PACKAGECONFIG', 'pam', '${PAM_SRC_URI}', '', d)} \ 23 file://shadow-update-pam-conf.patch \ 39 PAM_SRC_URI = "file://pam.d/chfn \ 40 file://pam.d/chpasswd \ 41 file://pam.d/chsh \ 42 file://pam.d/login \ 43 file://pam.d/newusers \ 44 file://pam.d/passwd \ 45 file://pam.d/su" 63 pam-plugin-faildelay \ [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/sudo/ |
| H A D | sudo_1.9.13p3.bb | 4 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \ 9 PAM_SRC_URI = "file://sudo.pam" 13 DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" 14 RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-ke… 25 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--with-pam', '--without-pam', d)} \ 33 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then 34 install -D -m 644 ${WORKDIR}/sudo.pam ${D}/${sysconfdir}/pam.d/sudo 35 if ${@bb.utils.contains('PACKAGECONFIG', 'pam-wheel', 'true', 'false', d)} ; then 36 echo 'auth required pam_wheel.so use_uid' >>${D}${sysconfdir}/pam.d/sudo
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/pam/libpam/ |
| H A D | 0001-run-xtests.sh-check-whether-files-exist.patch | 10 mv: cannot stat '/etc/security/opasswd-pam-xtests': No such file or directory 16 Upstream-Status: Backport [https://github.com/linux-pam/linux-pam/commit/e8e8ccfd57e0274b431bc5717b… 31 - cp /etc/security/$config /etc/security/$config-pam-xtests 33 + mv /etc/security/$config /etc/security/$config-pam-xtests 36 -mv /etc/security/opasswd /etc/security/opasswd-pam-xtests 38 + mv /etc/security/opasswd /etc/security/opasswd-pam-xtests 44 rm -f /etc/pam.d/$testname* 46 -mv /etc/security/access.conf-pam-xtests /etc/security/access.conf 47 -mv /etc/security/group.conf-pam-xtests /etc/security/group.conf 48 -mv /etc/security/time.conf-pam-xtests /etc/security/time.conf [all …]
|
| /OK3568_Linux_fs/buildroot/package/linux-pam/ |
| H A D | linux-pam.mk | 9 LINUX_PAM_SITE = https://github.com/linux-pam/linux-pam/releases/download/v$(LINUX_PAM_VERSION) 25 LINUX_PAM_CPE_ID_VENDOR = linux-pam 34 $(TARGET_DIR)/etc/pam.d/login 49 $(INSTALL) -m 0644 -D package/linux-pam/login.pam \ 50 $(TARGET_DIR)/etc/pam.d/login 51 $(INSTALL) -m 0644 -D package/linux-pam/other.pam \ 52 $(TARGET_DIR)/etc/pam.d/other
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-netkit/netkit-rsh/ |
| H A D | netkit-rsh_0.17.bb | 28 PAM_SRC_URI = "file://rexec.pam \ 29 file://rlogin.pam \ 30 file://rsh.pam \ 32 SRC_URI += "${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)}" 40 PACKAGECONFIG:append = " ${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" 41 PACKAGECONFIG[pam] = " , --without-pam, libpam, libpam" 49 if [ "${@bb.utils.filter('PACKAGECONFIG', 'pam', d)}" ]; then 71 if [ "${@bb.utils.filter('PACKAGECONFIG', 'pam', d)}" ]; then 72 install -d ${D}${sysconfdir}/pam.d 74 install -m 0644 ${WORKDIR}/rexec.pam ${D}/${sysconfdir}/pam.d/rexec [all …]
|
| /OK3568_Linux_fs/buildroot/package/weston/ |
| H A D | 0088-libweston-Add-user-authentication-support-via-PAM.patch | 7 This requires a configuration file /etc/pam.d/weston. 17 pam/meson.build | 8 +++ 18 pam/weston-remote-access | 3 + 21 create mode 100644 pam/meson.build 22 create mode 100644 pam/weston-remote-access 115 + struct pam_handle *pam; 120 + ret = pam_start("weston-remote-access", username, &conv, &pam); 126 + ret = pam_authenticate(pam, 0); 132 + ret = pam_acct_mgmt(pam, 0); 140 + ret = pam_end(pam, ret); [all …]
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-graphics/wayland/weston_11.0.1/ |
| H A D | 0089-libweston-Add-user-authentication-support-via-PAM.patch | 7 This requires a configuration file /etc/pam.d/weston. 17 pam/meson.build | 8 +++ 18 pam/weston-remote-access | 3 + 21 create mode 100644 pam/meson.build 22 create mode 100644 pam/weston-remote-access 115 + struct pam_handle *pam; 120 + ret = pam_start("weston-remote-access", username, &conv, &pam); 126 + ret = pam_authenticate(pam, 0); 132 + ret = pam_acct_mgmt(pam, 0); 140 + ret = pam_end(pam, ret); [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/lxdm/ |
| H A D | lxdm_0.5.3.bb | 7 … ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'file://lxdm-pam file://lxdm-pam-debug', '', d)} \ 14 file://0003-check-whether-password-expired-with-pam.patch \ 15 file://0004-lxdm.c-add-function-to-change-password-with-pam.patch \ 44 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--with-pam', '--without-pam', d)} \ 64 if ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'true', 'false', d)}; then 65 # ArchLinux version of pam config has the following advantages: 68 …/${@bb.utils.contains("DISTRO_TYPE", "debug", "lxdm-pam-debug", "lxdm-pam",d)} ${D}${sysconfdir}/p… 86 RDEPENDS:${PN} = "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-loginuid', '', d)} set…
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/at/ |
| H A D | at_3.2.5.bb | 9 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" 17 RDEPENDS:${PN} = "${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_DEPS}', '', d)} \ 20 PAM_DEPS = "libpam libpam-runtime pam-plugin-env pam-plugin-limits" 31 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \ 36 PAM_SRC_URI = "file://pam.conf.patch \ 37 file://configure-add-enable-pam.patch" 46 … ac_cv_header_security_pam_appl_h=${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', 'no', d)} " 72 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then 73 install -D -m 0644 ${WORKDIR}/${BP}/pam.conf ${D}${sysconfdir}/pam.d/atd
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/screen/ |
| H A D | screen_4.9.0.bb | 16 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" 20 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'file://screen.pam', '', d)} \ 34 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--enable-pam', '--disable-pam', d)}" 38 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then 39 install -D -m 644 ${WORKDIR}/screen.pam ${D}/${sysconfdir}/pam.d/screen
|
| /OK3568_Linux_fs/buildroot/package/python-pam/ |
| H A D | Config.in | 1 comment "python-pam needs a toolchain w/ wchar, locale, dynamic library" 6 bool "python-pam" 8 depends on BR2_ENABLE_LOCALE # linux-pam 9 depends on BR2_USE_WCHAR # linux-pam 10 depends on BR2_USE_MMU # linux-pam 11 depends on !BR2_STATIC_LIBS # linux-pam
|
| /OK3568_Linux_fs/kernel/mm/ |
| H A D | highmem.c | 421 struct page_address_map *pam; in page_address() local 423 list_for_each_entry(pam, &pas->lh, list) { in page_address() 424 if (pam->page == page) { in page_address() 425 ret = pam->virtual; in page_address() 446 struct page_address_map *pam; in set_page_address() local 452 pam = &page_address_maps[PKMAP_NR((unsigned long)virtual)]; in set_page_address() 453 pam->page = page; in set_page_address() 454 pam->virtual = virtual; in set_page_address() 457 list_add_tail(&pam->list, &pas->lh); in set_page_address() 461 list_for_each_entry(pam, &pas->lh, list) { in set_page_address() [all …]
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/vlock/ |
| H A D | vlock_2.2.3.bb | 24 # authentification method: either pam or shadow 25 PACKAGECONFIG ?= "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam', 'shadow', d)}" 26 PACKAGECONFIG[pam] = "--enable-pam,,libpam," 51 if [ ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', '', d)} = yes ]; then 52 install -d -m 0755 ${D}/${sysconfdir}/pam.d 53 install -m 0644 ${WORKDIR}/vlock_pam ${D}${sysconfdir}/pam.d/vlock
|
| /OK3568_Linux_fs/buildroot/package/nss-pam-ldapd/ |
| H A D | nss-pam-ldapd.mk | 8 NSS_PAM_LDAPD_SITE = http://arthurdejong.org/nss-pam-ldapd 23 NSS_PAM_LDAPD_CONF_OPTS += --enable-pam 24 NSS_PAM_LDAPD_DEPENDENCIES += linux-pam 26 NSS_PAM_LDAPD_CONF_OPTS += --disable-pam 30 $(INSTALL) -m 644 -D package/nss-pam-ldapd/nslcd.service \ 35 $(INSTALL) -m 755 -D package/nss-pam-ldapd/S45nslcd \
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/dropbear/ |
| H A D | dropbear.inc | 20 DEPENDS += "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" 29 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \ 34 PAM_SRC_URI = "file://0005-dropbear-enable-pam.patch \ 39 pam-plugin-deny \ 40 pam-plugin-permit \ 41 pam-plugin-unix \ 43 RDEPENDS:${PN} += "${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_PLUGINS}', '', d)}" 63 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--enable-pam', '--disable-pam', d)}" 101 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then 102 install -d ${D}${sysconfdir}/pam.d [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/libcgroup/ |
| H A D | libcgroup_2.0.2.bb | 22 PACKAGECONFIG = "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" 23 PACKAGECONFIG[pam] = "--enable-pam-module-dir=${base_libdir}/security --enable-pam=yes,--enable-pam… 25 PACKAGES =+ "cgroups-pam-plugin" 26 FILES:cgroups-pam-plugin = "${base_libdir}/security/pam_cgroup.so*"
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
| H A D | 0003-check-whether-password-expired-with-pam.patch | 4 Subject: [PATCH 3/8] check whether password expired with pam 7 password is expired, return it. Only work with pam. 14 src/pam.c | 4 ++++ 29 diff --git a/src/pam.c b/src/pam.c 31 --- a/src/pam.c 32 +++ b/src/pam.c
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/cronie/cronie/ |
| H A D | crond_pam_config.patch | 1 password-auth is the Fedora's common pam configure file, use oe common pam 7 diff --git a/pam/crond b/pam/crond 9 --- a/pam/crond 10 +++ b/pam/crond
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-support/consolekit/ |
| H A D | consolekit_0.4.6.bb | 28 PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'pam systemd polkit', d)}" 30 PACKAGECONFIG[pam] = "--enable-pam-module --with-pam-module-dir=${base_libdir}/security,--disable-p… 38 PACKAGES =+ "pam-plugin-ck-connector" 39 FILES:pam-plugin-ck-connector += "${base_libdir}/security/*.so" 40 RDEPENDS:pam-plugin-ck-connector += "${PN}"
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/kbd/ |
| H A D | kbd_2.4.0.bb | 21 PACKAGECONFIG ?= "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)} \ 24 PACKAGECONFIG[pam] = "--enable-vlock, --disable-vlock, libpam," 34 if [ ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', '', d)} = yes ] \ 35 && [ -f ${D}${sysconfdir}/pam.d/vlock ]; then 36 mv -f ${D}${sysconfdir}/pam.d/vlock ${D}${sysconfdir}/pam.d/vlock.kbd 43 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'vlock','', d)}"
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/at/at/ |
| H A D | pam.conf.patch | 4 Subject: [PATCH] fix pam.conf 13 pam.conf | 6 +++--- 16 diff --git a/pam.conf b/pam.conf 18 --- a/pam.conf 19 +++ b/pam.conf
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-security/passwdqc/ |
| H A D | passwdqc_1.3.1.bb | 25 REQUIRED_DISTRO_FEATURES = "pam" 36 # explicitly define LINUX_PAM in case DISTRO_FEATURES no pam 37 # this package's pam_passwdqc.so needs pam 58 PROVIDES += "pam-${BPN}" 59 PACKAGES =+ "lib${BPN} pam-${BPN}" 62 FILES:pam-${BPN} = "${base_libdir}/security/pam_passwdqc.so" 65 RDEPENDS:${PN} = "lib${BPN} pam-${BPN}" 66 RDEPENDS:pam-${BPN} = "lib${BPN}"
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/ |
| H A D | vlock_pam_tally2_reset.patch | 12 src/auth-pam.c | 3 +++ 15 diff --git a/src/auth-pam.c b/src/auth-pam.c 17 --- a/src/auth-pam.c 18 +++ b/src/auth-pam.c
|