/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
H A D | shadow-update-pam-conf.patch | 12 See meta/recipes-extended/pam/libpam/pam.d/common-password 29 diff --git a/etc/pam.d/chage b/etc/pam.d/chage 31 --- a/etc/pam.d/chage 39 diff --git a/etc/pam.d/chgpasswd b/etc/pam.d/chgpasswd 49 diff --git a/etc/pam.d/groupadd b/etc/pam.d/groupadd 59 diff --git a/etc/pam.d/groupdel b/etc/pam.d/groupdel 69 diff --git a/etc/pam.d/groupmems b/etc/pam.d/groupmems 79 diff --git a/etc/pam.d/groupmod b/etc/pam.d/groupmod 89 diff --git a/etc/pam.d/useradd b/etc/pam.d/useradd 99 diff --git a/etc/pam.d/userdel b/etc/pam.d/userdel [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/pam/ |
H A D | libpam_1.6.0.bb | 17 file://pam.d/common-account \ 18 file://pam.d/common-auth \ 19 file://pam.d/common-password \ 20 file://pam.d/common-session \ 22 file://pam.d/other \ 25 file://pam-volatiles.conf \ 150 install -d ${D}${sysconfdir}/pam.d/ 151 install -m 0644 ${WORKDIR}/pam.d/* ${D}${sysconfdir}/pam.d/ 178 ANY_OF_DISTRO_FEATURES = "pam systemd" 189 GITHUB_BASE_URI = "https://github.com/linux-pam/linux-pam/releases" [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/sudo/ |
H A D | sudo_1.9.15p5.bb | 4 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \ 8 PAM_SRC_URI = "file://sudo.pam" 12 DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" 13 RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-ke… 24 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--with-pam', '--without-pam', d)} \ 32 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then 33 install -D -m 644 ${WORKDIR}/sudo.pam ${D}/${sysconfdir}/pam.d/sudo 34 if ${@bb.utils.contains('PACKAGECONFIG', 'pam-wheel', 'true', 'false', d)} ; then 35 echo 'auth required pam_wheel.so use_uid' >>${D}${sysconfdir}/pam.d/sudo
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/ |
H A D | libpam_%.bbappend | 3 SRC_URI += " file://pam.d/common-password \ 4 file://pam.d/common-account \ 5 file://pam.d/common-auth \ 6 file://pam.d/common-session \ 9 file://convert-pam-configs.service \ 10 file://convert-pam-configs.sh \ 14 SYSTEMD_SERVICE:${PN} += "convert-pam-configs.service" 16 FILES:${PN} += "${bindir}/convert-pam-configs.sh \ 25 sed -i '/pam_systemd.so/d' ${D}${sysconfdir}/pam.d/common-session 32 install -m 0755 ${WORKDIR}/convert-pam-configs.sh ${D}${bindir} [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/ |
H A D | shadow.inc | 31 PAM_SRC_URI = "file://pam.d/chfn \ 33 file://pam.d/chsh \ 37 file://pam.d/su" 60 pam-plugin-env \ 61 pam-plugin-group \ 63 pam-plugin-motd \ 64 pam-plugin-mail \ 66 pam-plugin-rootok" 126 install -m 0644 ${WORKDIR}/pam.d/* ${D}${sysconfdir}/pam.d/ 178 ${sysconfdir}/pam.d/login \ [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/at/ |
H A D | at_3.2.5.bb | 9 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" 17 RDEPENDS:${PN} = "${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_DEPS}', '', d)} \ 20 PAM_DEPS = "libpam libpam-runtime pam-plugin-env pam-plugin-limits" 31 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \ 36 PAM_SRC_URI = "file://pam.conf.patch \ 37 file://configure-add-enable-pam.patch" 46 … ac_cv_header_security_pam_appl_h=${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', 'no', d)} " 72 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then 73 install -D -m 0644 ${WORKDIR}/${BP}/pam.conf ${D}${sysconfdir}/pam.d/atd
|
/openbmc/openbmc/poky/meta/recipes-extended/screen/ |
H A D | screen_4.9.1.bb | 16 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" 20 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'file://screen.pam', '', d)} \ 34 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--enable-pam', '--disable-pam', d)}" 38 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then 39 install -D -m 644 ${WORKDIR}/screen.pam ${D}/${sysconfdir}/pam.d/screen
|
/openbmc/openbmc/poky/meta/recipes-extended/cronie/cronie/ |
H A D | crond_pam_config.patch | 6 password-auth is the Fedora's common pam configure file, use oe common pam 14 pam/crond | 6 +++--- 17 diff --git a/pam/crond b/pam/crond 19 --- a/pam/crond 20 +++ b/pam/crond
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/ |
H A D | lxdm_0.5.3.bb | 7 … ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'file://lxdm-pam file://lxdm-pam-debug', '', d)} \ 14 file://0003-check-whether-password-expired-with-pam.patch \ 15 file://0004-lxdm.c-add-function-to-change-password-with-pam.patch \ 45 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--with-pam', '--without-pam', d)} \ 65 if ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'true', 'false', d)}; then 66 # ArchLinux version of pam config has the following advantages: 69 …/${@bb.utils.contains("DISTRO_TYPE", "debug", "lxdm-pam-debug", "lxdm-pam",d)} ${D}${sysconfdir}/p… 87 RDEPENDS:${PN} = "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-loginuid', '', d)} set…
|
/openbmc/qemu/hw/pci-host/ |
H A D | pam.c | 63 void pam_update(PAMMemoryRegion *pam, int idx, uint8_t val) in pam_update() argument 67 memory_region_set_enabled(&pam->alias[pam->current], false); in pam_update() 68 pam->current = (val >> ((!(idx & 1)) * 4)) & PAM_ATTR_MASK; in pam_update() 69 memory_region_set_enabled(&pam->alias[pam->current], true); in pam_update()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/ |
H A D | vlock_2.2.3.bb | 24 # authentification method: either pam or shadow 25 PACKAGECONFIG ?= "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam', 'shadow', d)}" 26 PACKAGECONFIG[pam] = "--enable-pam,,libpam," 51 if [ ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', '', d)} = yes ]; then 52 install -d -m 0755 ${D}/${sysconfdir}/pam.d 53 install -m 0644 ${WORKDIR}/vlock_pam ${D}${sysconfdir}/pam.d/vlock
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
H A D | 0003-check-whether-password-expired-with-pam.patch | 4 Subject: [PATCH 3/8] check whether password expired with pam 7 password is expired, return it. Only work with pam. 14 src/pam.c | 4 ++++ 29 diff --git a/src/pam.c b/src/pam.c 31 --- a/src/pam.c 32 +++ b/src/pam.c
|
/openbmc/openbmc/poky/meta/recipes-core/libcgroup/ |
H A D | libcgroup_3.1.0.bb | 21 PACKAGECONFIG = "${@bb.utils.filter('DISTRO_FEATURES', 'pam systemd', d)}" 22 PACKAGECONFIG[pam] = "--enable-pam-module-dir=${base_libdir}/security --enable-pam=yes,--enable-pam… 25 PACKAGES =+ "cgroups-pam-plugin" 26 FILES:cgroups-pam-plugin = "${base_libdir}/security/pam_cgroup.so*"
|
/openbmc/openbmc/poky/meta/recipes-extended/at/at/ |
H A D | pam.conf.patch | 4 Subject: [PATCH] fix pam.conf 13 pam.conf | 6 +++--- 16 diff --git a/pam.conf b/pam.conf 18 --- a/pam.conf 19 +++ b/pam.conf
|
/openbmc/openbmc/poky/meta/recipes-support/consolekit/ |
H A D | consolekit_0.4.6.bb | 28 PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'pam systemd polkit', d)}" 30 PACKAGECONFIG[pam] = "--enable-pam-module --with-pam-module-dir=${base_libdir}/security,--disable-p… 38 PACKAGES =+ "pam-plugin-ck-connector" 39 FILES:pam-plugin-ck-connector += "${base_libdir}/security/*.so" 40 RDEPENDS:pam-plugin-ck-connector += "${PN}"
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/ |
H A D | vlock_pam_tally2_reset.patch | 12 src/auth-pam.c | 3 +++ 15 diff --git a/src/auth-pam.c b/src/auth-pam.c 17 --- a/src/auth-pam.c 18 +++ b/src/auth-pam.c
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/passwdqc/ |
H A D | passwdqc_2.0.3.bb | 25 REQUIRED_DISTRO_FEATURES = "pam" 35 # explicitly define LINUX_PAM in case DISTRO_FEATURES no pam 36 # this package's pam_passwdqc.so needs pam 57 PROVIDES += "pam-${BPN}" 58 PACKAGES =+ "lib${BPN} pam-${BPN}" 61 FILES:pam-${BPN} = "${base_libdir}/security/pam_passwdqc.so" 64 RDEPENDS:${PN} = "lib${BPN} pam-${BPN}" 65 RDEPENDS:pam-${BPN} = "lib${BPN}"
|
/openbmc/openbmc/poky/meta/recipes-core/dropbear/ |
H A D | dropbear_2022.83.bb | 22 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \ 29 PAM_SRC_URI = "file://0005-dropbear-enable-pam.patch \ 34 pam-plugin-deny \ 35 pam-plugin-permit \ 36 pam-plugin-unix \ 51 PACKAGECONFIG ?= "disable-weak-ciphers ${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" 52 PACKAGECONFIG[pam] = "--enable-pam,--disable-pam,libpam,${PAM_PLUGINS}" 100 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then 101 install -d ${D}${sysconfdir}/pam.d 102 install -m 0644 ${WORKDIR}/dropbear ${D}${sysconfdir}/pam.d/
|
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/ |
H A D | common-account | 2 # /etc/pam.d/common-account - authorization settings common to all services 9 # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 12 # pam-auth-update to manage selection of other modules. See 13 # pam-auth-update(8) for details. 25 # end of pam-auth-update config
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/ |
H A D | common-account | 2 # /etc/pam.d/common-account - authorization settings common to all services 9 # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 12 # pam-auth-update to manage selection of other modules. See 13 # pam-auth-update(8) for details. 28 # end of pam-auth-update config
|
/openbmc/openbmc/poky/meta/recipes-core/dropbear/dropbear/ |
H A D | 0006-dropbear-configuration-file.patch | 6 dropbear: Change the path ("/etc/pam.d/sshd" as default) to find a pam configuration file \ 7 to "/etc/pam.d/dropbear for dropbear when enabling pam supporting" 25 /* Init pam */
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/libpwquality/ |
H A D | libpwquality_1.4.5.bb | 35 PACKAGECONFIG ??= "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam', '', d)}" 36 PACKAGECONFIG[pam] = "--enable-pam,--disable-pam,libpam"
|
/openbmc/openbmc/poky/meta/recipes-core/kbd/ |
H A D | kbd_2.6.4.bb | 33 PACKAGECONFIG ?= "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)} \ 36 PACKAGECONFIG[pam] = "--enable-vlock, --disable-vlock, libpam," 55 if [ "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', 'no', d)}" = "yes" ] \ 56 && [ -f ${D}${sysconfdir}/pam.d/vlock ]; then 57 mv -f ${D}${sysconfdir}/pam.d/vlock ${D}${sysconfdir}/pam.d/vlock.kbd 64 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'vlock','', d)}"
|
/openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/ |
H A D | common-account | 2 # /etc/pam.d/common-account - authorization settings common to all services 9 # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 12 # pam-auth-update to manage selection of other modules. See 13 # pam-auth-update(8) for details. 29 # end of pam-auth-update config
|
/openbmc/openbmc/meta-google/recipes-extended/pam/ |
H A D | libpam_%.bbappend | 8 sed -i '/pam_pwquality.so/d' ${D}${sysconfdir}/pam.d/common-password 18 ${D}${sysconfdir}/pam.d/common-password \ 19 > ${D}${sysconfdir}/pam.d/common-password.new 20 mv ${D}${sysconfdir}/pam.d/common-password.new \ 21 ${D}${sysconfdir}/pam.d/common-password
|