Home
last modified time | relevance | path

Searched refs:pam (Results 1 – 25 of 225) sorted by relevance

123456789

/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/
H A Dshadow-update-pam-conf.patch4 Subject: [PATCH] shadow: update pam related configure files
6 The system-auth in the configure files is from Fedora which put all the 4 pam type rules
12 See meta/recipes-extended/pam/libpam/pam.d/common-password
18 etc/pam.d/chage | 2 +-
19 etc/pam.d/chgpasswd | 2 +-
20 etc/pam.d/groupadd | 2 +-
21 etc/pam.d/groupdel | 2 +-
22 etc/pam.d/groupmems | 2 +-
23 etc/pam.d/groupmod | 2 +-
24 etc/pam.d/useradd | 2 +-
[all …]
/openbmc/openbmc/poky/meta/recipes-extended/pam/
H A Dlibpam_1.7.0.bb4 HOMEPAGE = "https://fedorahosted.org/linux-pam/"
5 BUGTRACKER = "https://fedorahosted.org/linux-pam/newticket"
8 # /etc/pam.d comes from Debian libpam-runtime in 2009-11 (at that time
17 file://pam.d/common-account \
18 file://pam.d/common-auth \
19 file://pam.d/common-password \
20 file://pam.d/common-session \
21 file://pam.d/common-session-noninteractive \
22 file://pam.d/other \
24 file://pam-volatiles.conf \
[all …]
/openbmc/openbmc/poky/meta/recipes-gnome/libsecret/libsecret/
H A D0001-meson-add-option-to-disable-pam-tests.patch4 Subject: [PATCH] meson: add option to disable pam tests
11 pam/meson.build | 44 +++++++++++++++++++++++---------------------
21 option('pam', type: 'boolean', value: false, description: 'Build PAM module')
22 +option('pam-tests', type: 'boolean', value: true, description: 'Build PAM Tests')
23 diff --git a/pam/meson.build b/pam/meson.build
25 --- a/pam/meson.build
26 +++ b/pam/meson.build
30 # pam tests
33 +if get_option('pam-tests')
42 - 'test-pam.c',
[all …]
/openbmc/openbmc/poky/meta/recipes-extended/sudo/
H A Dsudo_1.9.16p2.bb4 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \
8 PAM_SRC_URI = "file://sudo.pam"
12 DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"
13 RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-ke…
24 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--with-pam', '--without-pam', d)} \
32 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then
33 install -D -m 644 ${UNPACKDIR}/sudo.pam ${D}/${sysconfdir}/pam.d/sudo
34 if ${@bb.utils.contains('PACKAGECONFIG', 'pam-wheel', 'true', 'false', d)} ; then
35 echo 'auth required pam_wheel.so use_uid' >>${D}${sysconfdir}/pam.d/sudo
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/
H A Dlibpam_%.bbappend3 SRC_URI += " file://pam.d/common-password \
4 file://pam.d/common-account \
5 file://pam.d/common-auth \
6 file://pam.d/common-session \
16 sed -i '/pam_systemd.so/d' ${D}${sysconfdir}/pam.d/common-session
24 ${MLPREFIX}pam-plugin-faillock-${libpam_suffix} \
25 ${MLPREFIX}pam-plugin-pwhistory-${libpam_suffix} \
26 ${MLPREFIX}pam-plugin-succeed-if-${libpam_suffix} \
27 ${MLPREFIX}pam-plugin-localuser-${libpam_suffix} \
/openbmc/openbmc/poky/meta/recipes-extended/shadow/
H A Dshadow_4.17.1.bb15 ${@bb.utils.contains('PACKAGECONFIG', 'pam', '${PAM_SRC_URI}', '', d)} \
22 file://shadow-update-pam-conf.patch \
32 PAM_SRC_URI = "file://pam.d/chfn \
33 file://pam.d/chpasswd \
34 file://pam.d/chsh \
35 file://pam.d/login \
36 file://pam.d/newusers \
37 file://pam.d/passwd \
38 file://pam.d/su"
58 pam-plugin-faildelay \
[all …]
/openbmc/openbmc/poky/meta/recipes-extended/screen/
H A Dscreen_5.0.0.bb16 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"
20 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'file://screen.pam', '', d)} \
31 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--enable-pam', '--disable-pam', d)}"
35 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then
36 install -D -m 644 ${UNPACKDIR}/screen.pam ${D}/${sysconfdir}/pam.d/screen
/openbmc/openbmc/poky/meta/recipes-extended/at/
H A Dat_3.2.5.bb9 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"
17 RDEPENDS:${PN} = "${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_DEPS}', '', d)} \
20 PAM_DEPS = "libpam libpam-runtime pam-plugin-env pam-plugin-limits"
31 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \
36 PAM_SRC_URI = "file://pam.conf.patch \
37 file://configure-add-enable-pam.patch"
46 … ac_cv_header_security_pam_appl_h=${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', 'no', d)} "
72 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then
73 install -D -m 0644 ${S}/pam.conf ${D}${sysconfdir}/pam.d/atd
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/
H A Dlxdm_0.5.3.bb7 … ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'file://lxdm-pam file://lxdm-pam-debug', '', d)} \
14 file://0003-check-whether-password-expired-with-pam.patch \
15 file://0004-lxdm.c-add-function-to-change-password-with-pam.patch \
41 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--with-pam', '--without-pam', d)} \
61 if ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'true', 'false', d)}; then
62 # ArchLinux version of pam config has the following advantages:
65 …GE_FEATURES", [ "allow-empty-password", "empty-root-password" ], "lxdm-pam-debug", "lxdm-pam",d)} \
66 ${D}${sysconfdir}/pam.d/lxdm
84 RDEPENDS:${PN} = "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-loginuid', '', d)} set…
/openbmc/openbmc/poky/meta/recipes-extended/cronie/cronie/
H A Dcrond_pam_config.patch6 password-auth is the Fedora's common pam configure file, use oe common pam
14 pam/crond | 6 +++---
17 diff --git a/pam/crond b/pam/crond
19 --- a/pam/crond
20 +++ b/pam/crond
/openbmc/qemu/hw/pci-host/
H A Dpam.c63 void pam_update(PAMMemoryRegion *pam, int idx, uint8_t val) in pam_update() argument
67 memory_region_set_enabled(&pam->alias[pam->current], false); in pam_update()
68 pam->current = (val >> ((!(idx & 1)) * 4)) & PAM_ATTR_MASK; in pam_update()
69 memory_region_set_enabled(&pam->alias[pam->current], true); in pam_update()
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/
H A Dvlock_2.2.3.bb23 # authentification method: either pam or shadow
24 PACKAGECONFIG ?= "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam', 'shadow', d)}"
25 PACKAGECONFIG[pam] = "--enable-pam,,libpam,"
50 if [ ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', '', d)} = yes ]; then
51 install -d -m 0755 ${D}/${sysconfdir}/pam.d
52 install -m 0644 ${UNPACKDIR}/vlock_pam ${D}${sysconfdir}/pam.d/vlock
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/
H A D0003-check-whether-password-expired-with-pam.patch4 Subject: [PATCH 3/8] check whether password expired with pam
7 password is expired, return it. Only work with pam.
14 src/pam.c | 4 ++++
29 diff --git a/src/pam.c b/src/pam.c
31 --- a/src/pam.c
32 +++ b/src/pam.c
/openbmc/openbmc/poky/meta/recipes-core/libcgroup/
H A Dlibcgroup_3.1.0.bb22 PACKAGECONFIG = "${@bb.utils.filter('DISTRO_FEATURES', 'pam systemd', d)}"
23 PACKAGECONFIG[pam] = "--enable-pam-module-dir=${base_libdir}/security --enable-pam=yes,--enable-pam
26 PACKAGES =+ "cgroups-pam-plugin"
27 FILES:cgroups-pam-plugin = "${base_libdir}/security/pam_cgroup.so*"
/openbmc/openbmc/poky/meta/recipes-extended/at/at/
H A Dpam.conf.patch4 Subject: [PATCH] fix pam.conf
13 pam.conf | 6 +++---
16 diff --git a/pam.conf b/pam.conf
18 --- a/pam.conf
19 +++ b/pam.conf
/openbmc/openbmc/poky/meta/recipes-support/consolekit/
H A Dconsolekit_0.4.6.bb28 PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'pam systemd polkit', d)}"
30 PACKAGECONFIG[pam] = "--enable-pam-module --with-pam-module-dir=${base_libdir}/security,--disable-p…
41 PACKAGES =+ "pam-plugin-ck-connector"
42 FILES:pam-plugin-ck-connector += "${base_libdir}/security/*.so"
43 RDEPENDS:pam-plugin-ck-connector += "${PN}"
/openbmc/openbmc/poky/meta/recipes-core/dropbear/
H A Ddropbear_2024.86.bb22 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \
28 PAM_SRC_URI = "file://0005-dropbear-enable-pam.patch \
33 pam-plugin-deny \
34 pam-plugin-permit \
35 pam-plugin-unix \
50 PACKAGECONFIG ?= "disable-weak-ciphers ${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}"
51 PACKAGECONFIG[pam] = "--enable-pam,--disable-pam,libpam,${PAM_PLUGINS}"
99 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then
100 install -d ${D}${sysconfdir}/pam.d
101 install -m 0644 ${UNPACKDIR}/dropbear ${D}${sysconfdir}/pam.d/
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/passwdqc/
H A Dpasswdqc_2.0.3.bb25 REQUIRED_DISTRO_FEATURES = "pam"
35 # explicitly define LINUX_PAM in case DISTRO_FEATURES no pam
36 # this package's pam_passwdqc.so needs pam
57 PROVIDES += "pam-${BPN}"
58 PACKAGES =+ "lib${BPN} pam-${BPN}"
61 FILES:pam-${BPN} = "${base_libdir}/security/pam_passwdqc.so"
64 RDEPENDS:${PN} = "lib${BPN} pam-${BPN}"
65 RDEPENDS:pam-${BPN} = "lib${BPN}"
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/
H A Dvlock_pam_tally2_reset.patch12 src/auth-pam.c | 3 +++
15 diff --git a/src/auth-pam.c b/src/auth-pam.c
17 --- a/src/auth-pam.c
18 +++ b/src/auth-pam.c
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/
H A Dcommon-account2 # /etc/pam.d/common-account - authorization settings common to all services
9 # As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
12 # pam-auth-update to manage selection of other modules. See
13 # pam-auth-update(8) for details.
25 # end of pam-auth-update config
/openbmc/openbmc/poky/meta/recipes-core/kbd/
H A Dkbd_2.7.1.bb33 PACKAGECONFIG ?= "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)} \
36 PACKAGECONFIG[pam] = "--enable-vlock, --disable-vlock, libpam,"
49 if [ "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', 'no', d)}" = "yes" ] \
50 && [ -f ${D}${sysconfdir}/pam.d/vlock ]; then
51 mv -f ${D}${sysconfdir}/pam.d/vlock ${D}${sysconfdir}/pam.d/vlock.kbd
58 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'vlock','', d)}"
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/
H A Dcommon-account2 # /etc/pam.d/common-account - authorization settings common to all services
9 # As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
12 # pam-auth-update to manage selection of other modules. See
13 # pam-auth-update(8) for details.
28 # end of pam-auth-update config
/openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/
H A Dcommon-account2 # /etc/pam.d/common-account - authorization settings common to all services
9 # As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
12 # pam-auth-update to manage selection of other modules. See
13 # pam-auth-update(8) for details.
28 # end of pam-auth-update config
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/vsftpd/
H A Dvsftpd_3.0.5.bb22 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '', '${NOPAM_SRC}', d)} \
38 DEPENDS += "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"
39 RDEPENDS:${PN} += "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-listfile', '', d)}"
40 PAMLIB = "${@bb.utils.contains('DISTRO_FEATURES', 'pam', '-L${STAGING_BASELIBDIR} -lpam', '', d)}"
77 install -d ${D}${sysconfdir}/pam.d/
78 cp ${S}/RedHat/vsftpd.pam ${D}${sysconfdir}/pam.d/vsftpd
79 sed -i "s:/lib/security:${base_libdir}/security:" ${D}${sysconfdir}/pam.d/vsftpd
80 sed -i "s:ftpusers:vsftpd.ftpusers:" ${D}${sysconfdir}/pam.d/vsftpd
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/libpwquality/
H A Dlibpwquality_1.4.5.bb35 PACKAGECONFIG ??= "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam', '', d)}"
36 PACKAGECONFIG[pam] = "--enable-pam,--disable-pam,libpam"

123456789