/openbmc/openbmc/poky/meta/recipes-extended/shadow/files/ |
H A D | shadow-update-pam-conf.patch | 4 Subject: [PATCH] shadow: update pam related configure files 6 The system-auth in the configure files is from Fedora which put all the 4 pam type rules 12 See meta/recipes-extended/pam/libpam/pam.d/common-password 18 etc/pam.d/chage | 2 +- 19 etc/pam.d/chgpasswd | 2 +- 20 etc/pam.d/groupadd | 2 +- 21 etc/pam.d/groupdel | 2 +- 22 etc/pam.d/groupmems | 2 +- 23 etc/pam.d/groupmod | 2 +- 24 etc/pam.d/useradd | 2 +- [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/pam/ |
H A D | libpam_1.7.0.bb | 4 HOMEPAGE = "https://fedorahosted.org/linux-pam/" 5 BUGTRACKER = "https://fedorahosted.org/linux-pam/newticket" 8 # /etc/pam.d comes from Debian libpam-runtime in 2009-11 (at that time 17 file://pam.d/common-account \ 18 file://pam.d/common-auth \ 19 file://pam.d/common-password \ 20 file://pam.d/common-session \ 21 file://pam.d/common-session-noninteractive \ 22 file://pam.d/other \ 24 file://pam-volatiles.conf \ [all …]
|
/openbmc/openbmc/poky/meta/recipes-gnome/libsecret/libsecret/ |
H A D | 0001-meson-add-option-to-disable-pam-tests.patch | 4 Subject: [PATCH] meson: add option to disable pam tests 11 pam/meson.build | 44 +++++++++++++++++++++++--------------------- 21 option('pam', type: 'boolean', value: false, description: 'Build PAM module') 22 +option('pam-tests', type: 'boolean', value: true, description: 'Build PAM Tests') 23 diff --git a/pam/meson.build b/pam/meson.build 25 --- a/pam/meson.build 26 +++ b/pam/meson.build 30 # pam tests 33 +if get_option('pam-tests') 42 - 'test-pam.c', [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/sudo/ |
H A D | sudo_1.9.16p2.bb | 4 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \ 8 PAM_SRC_URI = "file://sudo.pam" 12 DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" 13 RDEPENDS:${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-ke… 24 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--with-pam', '--without-pam', d)} \ 32 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then 33 install -D -m 644 ${UNPACKDIR}/sudo.pam ${D}/${sysconfdir}/pam.d/sudo 34 if ${@bb.utils.contains('PACKAGECONFIG', 'pam-wheel', 'true', 'false', d)} ; then 35 echo 'auth required pam_wheel.so use_uid' >>${D}${sysconfdir}/pam.d/sudo
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/ |
H A D | libpam_%.bbappend | 3 SRC_URI += " file://pam.d/common-password \ 4 file://pam.d/common-account \ 5 file://pam.d/common-auth \ 6 file://pam.d/common-session \ 16 sed -i '/pam_systemd.so/d' ${D}${sysconfdir}/pam.d/common-session 24 ${MLPREFIX}pam-plugin-faillock-${libpam_suffix} \ 25 ${MLPREFIX}pam-plugin-pwhistory-${libpam_suffix} \ 26 ${MLPREFIX}pam-plugin-succeed-if-${libpam_suffix} \ 27 ${MLPREFIX}pam-plugin-localuser-${libpam_suffix} \
|
/openbmc/openbmc/poky/meta/recipes-extended/shadow/ |
H A D | shadow_4.17.1.bb | 15 ${@bb.utils.contains('PACKAGECONFIG', 'pam', '${PAM_SRC_URI}', '', d)} \ 22 file://shadow-update-pam-conf.patch \ 32 PAM_SRC_URI = "file://pam.d/chfn \ 33 file://pam.d/chpasswd \ 34 file://pam.d/chsh \ 35 file://pam.d/login \ 36 file://pam.d/newusers \ 37 file://pam.d/passwd \ 38 file://pam.d/su" 58 pam-plugin-faildelay \ [all …]
|
/openbmc/openbmc/poky/meta/recipes-extended/screen/ |
H A D | screen_5.0.0.bb | 16 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" 20 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'file://screen.pam', '', d)} \ 31 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--enable-pam', '--disable-pam', d)}" 35 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then 36 install -D -m 644 ${UNPACKDIR}/screen.pam ${D}/${sysconfdir}/pam.d/screen
|
/openbmc/openbmc/poky/meta/recipes-extended/at/ |
H A D | at_3.2.5.bb | 9 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" 17 RDEPENDS:${PN} = "${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_DEPS}', '', d)} \ 20 PAM_DEPS = "libpam libpam-runtime pam-plugin-env pam-plugin-limits" 31 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \ 36 PAM_SRC_URI = "file://pam.conf.patch \ 37 file://configure-add-enable-pam.patch" 46 … ac_cv_header_security_pam_appl_h=${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', 'no', d)} " 72 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then 73 install -D -m 0644 ${S}/pam.conf ${D}${sysconfdir}/pam.d/atd
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/ |
H A D | lxdm_0.5.3.bb | 7 … ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'file://lxdm-pam file://lxdm-pam-debug', '', d)} \ 14 file://0003-check-whether-password-expired-with-pam.patch \ 15 file://0004-lxdm.c-add-function-to-change-password-with-pam.patch \ 41 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--with-pam', '--without-pam', d)} \ 61 if ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'true', 'false', d)}; then 62 # ArchLinux version of pam config has the following advantages: 65 …GE_FEATURES", [ "allow-empty-password", "empty-root-password" ], "lxdm-pam-debug", "lxdm-pam",d)} \ 66 ${D}${sysconfdir}/pam.d/lxdm 84 RDEPENDS:${PN} = "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-loginuid', '', d)} set…
|
/openbmc/openbmc/poky/meta/recipes-extended/cronie/cronie/ |
H A D | crond_pam_config.patch | 6 password-auth is the Fedora's common pam configure file, use oe common pam 14 pam/crond | 6 +++--- 17 diff --git a/pam/crond b/pam/crond 19 --- a/pam/crond 20 +++ b/pam/crond
|
/openbmc/qemu/hw/pci-host/ |
H A D | pam.c | 63 void pam_update(PAMMemoryRegion *pam, int idx, uint8_t val) in pam_update() argument 67 memory_region_set_enabled(&pam->alias[pam->current], false); in pam_update() 68 pam->current = (val >> ((!(idx & 1)) * 4)) & PAM_ATTR_MASK; in pam_update() 69 memory_region_set_enabled(&pam->alias[pam->current], true); in pam_update()
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/ |
H A D | vlock_2.2.3.bb | 23 # authentification method: either pam or shadow 24 PACKAGECONFIG ?= "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam', 'shadow', d)}" 25 PACKAGECONFIG[pam] = "--enable-pam,,libpam," 50 if [ ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', '', d)} = yes ]; then 51 install -d -m 0755 ${D}/${sysconfdir}/pam.d 52 install -m 0644 ${UNPACKDIR}/vlock_pam ${D}${sysconfdir}/pam.d/vlock
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-graphics/lxdm/lxdm/ |
H A D | 0003-check-whether-password-expired-with-pam.patch | 4 Subject: [PATCH 3/8] check whether password expired with pam 7 password is expired, return it. Only work with pam. 14 src/pam.c | 4 ++++ 29 diff --git a/src/pam.c b/src/pam.c 31 --- a/src/pam.c 32 +++ b/src/pam.c
|
/openbmc/openbmc/poky/meta/recipes-core/libcgroup/ |
H A D | libcgroup_3.1.0.bb | 22 PACKAGECONFIG = "${@bb.utils.filter('DISTRO_FEATURES', 'pam systemd', d)}" 23 PACKAGECONFIG[pam] = "--enable-pam-module-dir=${base_libdir}/security --enable-pam=yes,--enable-pam… 26 PACKAGES =+ "cgroups-pam-plugin" 27 FILES:cgroups-pam-plugin = "${base_libdir}/security/pam_cgroup.so*"
|
/openbmc/openbmc/poky/meta/recipes-extended/at/at/ |
H A D | pam.conf.patch | 4 Subject: [PATCH] fix pam.conf 13 pam.conf | 6 +++--- 16 diff --git a/pam.conf b/pam.conf 18 --- a/pam.conf 19 +++ b/pam.conf
|
/openbmc/openbmc/poky/meta/recipes-support/consolekit/ |
H A D | consolekit_0.4.6.bb | 28 PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'pam systemd polkit', d)}" 30 PACKAGECONFIG[pam] = "--enable-pam-module --with-pam-module-dir=${base_libdir}/security,--disable-p… 41 PACKAGES =+ "pam-plugin-ck-connector" 42 FILES:pam-plugin-ck-connector += "${base_libdir}/security/*.so" 43 RDEPENDS:pam-plugin-ck-connector += "${PN}"
|
/openbmc/openbmc/poky/meta/recipes-core/dropbear/ |
H A D | dropbear_2024.86.bb | 22 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \ 28 PAM_SRC_URI = "file://0005-dropbear-enable-pam.patch \ 33 pam-plugin-deny \ 34 pam-plugin-permit \ 35 pam-plugin-unix \ 50 PACKAGECONFIG ?= "disable-weak-ciphers ${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" 51 PACKAGECONFIG[pam] = "--enable-pam,--disable-pam,libpam,${PAM_PLUGINS}" 99 if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then 100 install -d ${D}${sysconfdir}/pam.d 101 install -m 0644 ${UNPACKDIR}/dropbear ${D}${sysconfdir}/pam.d/
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-security/passwdqc/ |
H A D | passwdqc_2.0.3.bb | 25 REQUIRED_DISTRO_FEATURES = "pam" 35 # explicitly define LINUX_PAM in case DISTRO_FEATURES no pam 36 # this package's pam_passwdqc.so needs pam 57 PROVIDES += "pam-${BPN}" 58 PACKAGES =+ "lib${BPN} pam-${BPN}" 61 FILES:pam-${BPN} = "${base_libdir}/security/pam_passwdqc.so" 64 RDEPENDS:${PN} = "lib${BPN} pam-${BPN}" 65 RDEPENDS:pam-${BPN} = "lib${BPN}"
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/vlock/vlock-2.2.3/ |
H A D | vlock_pam_tally2_reset.patch | 12 src/auth-pam.c | 3 +++ 15 diff --git a/src/auth-pam.c b/src/auth-pam.c 17 --- a/src/auth-pam.c 18 +++ b/src/auth-pam.c
|
/openbmc/openbmc/poky/meta/recipes-extended/pam/libpam/pam.d/ |
H A D | common-account | 2 # /etc/pam.d/common-account - authorization settings common to all services 9 # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 12 # pam-auth-update to manage selection of other modules. See 13 # pam-auth-update(8) for details. 25 # end of pam-auth-update config
|
/openbmc/openbmc/poky/meta/recipes-core/kbd/ |
H A D | kbd_2.7.1.bb | 33 PACKAGECONFIG ?= "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)} \ 36 PACKAGECONFIG[pam] = "--enable-vlock, --disable-vlock, libpam," 49 if [ "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'yes', 'no', d)}" = "yes" ] \ 50 && [ -f ${D}${sysconfdir}/pam.d/vlock ]; then 51 mv -f ${D}${sysconfdir}/pam.d/vlock ${D}${sysconfdir}/pam.d/vlock.kbd 58 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'vlock','', d)}"
|
/openbmc/openbmc/meta-phosphor/recipes-extended/pam/libpam/pam.d/ |
H A D | common-account | 2 # /etc/pam.d/common-account - authorization settings common to all services 9 # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 12 # pam-auth-update to manage selection of other modules. See 13 # pam-auth-update(8) for details. 28 # end of pam-auth-update config
|
/openbmc/openbmc/meta-ibm/recipes-extended/pam/libpam/pam.d/ |
H A D | common-account | 2 # /etc/pam.d/common-account - authorization settings common to all services 9 # As of pam 1.0.1-6, this file is managed by pam-auth-update by default. 12 # pam-auth-update to manage selection of other modules. See 13 # pam-auth-update(8) for details. 28 # end of pam-auth-update config
|
/openbmc/openbmc/meta-openembedded/meta-networking/recipes-daemons/vsftpd/ |
H A D | vsftpd_3.0.5.bb | 22 ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '', '${NOPAM_SRC}', d)} \ 38 DEPENDS += "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" 39 RDEPENDS:${PN} += "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-listfile', '', d)}" 40 PAMLIB = "${@bb.utils.contains('DISTRO_FEATURES', 'pam', '-L${STAGING_BASELIBDIR} -lpam', '', d)}" 77 install -d ${D}${sysconfdir}/pam.d/ 78 cp ${S}/RedHat/vsftpd.pam ${D}${sysconfdir}/pam.d/vsftpd 79 sed -i "s:/lib/security:${base_libdir}/security:" ${D}${sysconfdir}/pam.d/vsftpd 80 sed -i "s:ftpusers:vsftpd.ftpusers:" ${D}${sysconfdir}/pam.d/vsftpd
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/libpwquality/ |
H A D | libpwquality_1.4.5.bb | 35 PACKAGECONFIG ??= "${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam', '', d)}" 36 PACKAGECONFIG[pam] = "--enable-pam,--disable-pam,libpam"
|