Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

pam-1.5.1-8.1 RPM for armv7hl

From OpenSuSE Ports Tumbleweed for armv7hl

Name: pam Distribution: openSUSE Tumbleweed
Version: 1.5.1 Vendor: openSUSE
Release: 8.1 Build date: Wed Aug 18 08:58:08 2021
Group: System/Libraries Build host: obs-arm-5
Size: 1297265 Source RPM: pam-1.5.1-8.1.src.rpm
Packager: http://bugs.opensuse.org
Url: http://www.linux-pam.org/
Summary: A Security Tool that Provides Authentication for Applications
PAM (Pluggable Authentication Modules) is a system security tool that
allows system administrators to set authentication policies without
having to recompile programs that do authentication.

Provides

Requires

License

GPL-2.0-or-later OR BSD-3-Clause

Changelog

* Thu Aug 12 2021 Thorsten Kukuk <kukuk@suse.com>
  - pam_umask-usergroups-login_defs.patch: Deprecate pam_umask
    explicit "usergroups" option and instead read it from login.def's
    "USERGROUP_ENAB" option if umask is only defined there.
    [bsc#1189139]
* Tue Aug 03 2021 pgajdos@suse.com
  - package man5/motd.5 as a man-pages link to man8/pam_motd.8
    [bsc#1188724]
* Tue Jul 13 2021 Thorsten Kukuk <kukuk@suse.com>
  - revert-check_shadow_expiry.diff: revert wrong
    CRYPT_SALT_METHOD_LEGACY check.
* Fri Jun 25 2021 Callum Farmer <gmbr3@opensuse.org>
  - Create /run/motd.d
* Wed Jun 09 2021 Ludwig Nussel <lnussel@suse.de>
  - Remove legacy pre-usrmerge compat code (removed pam-usrmerge.diff)
  - Backport patch to not install /usr/etc/securetty (boo#1033626) ie
    no distro defaults and don't complain about it missing
    (pam_securetty-don-t-complain-about-missing-config.patch)
  - add debug bcond to be able to build pam with debug output easily
  - add macros file to allow other packages to stop hardcoding
    directory names. Compatible with Fedora.
* Mon May 10 2021 Josef Möllers <josef.moellers@suse.com>
  - In the 32-bit compatibility package for 64-bit architectures,
    require "systemd-32bit" to be also installed as it contains
    pam_systemd.so for 32 bit applications.
    [bsc#1185562, baselibs.conf]
* Wed Apr 07 2021 Josef Möllers <josef.moellers@suse.com>
  - If "LOCAL" is configured in access.conf, and a login attempt from
    a remote host is made, pam_access tries to resolve "LOCAL" as
    a hostname and logs a failure.
    Checking explicitly for "LOCAL" and rejecting access in this case
    resolves this issue.
    [bsc#1184358, bsc1184358-prevent-LOCAL-from-being-resolved.patch]
* Wed Mar 31 2021 Josef Möllers <josef.moellers@suse.com>
  - pam_limits: "unlimited" is not a legitimate value for "nofile"
    (see setrlimit(2)). So, when "nofile" is set to one of the
    "unlimited" values, it is set to the contents of
    "/proc/sys/fs/nr_open" instead.
    Also changed the manpage of pam_limits to express this.
    [bsc#1181443, pam-bsc1181443-make-nofile-unlimited-mean-nr_open.patch]
* Thu Feb 18 2021 Thorsten Kukuk <kukuk@suse.com>
  - Add missing conflicts for pam_unix-nis
* Tue Feb 16 2021 Thorsten Kukuk <kukuk@suse.com>
  - Split out pam_unix module and build without NIS support
* Fri Nov 27 2020 Thorsten Kukuk <kukuk@suse.com>
  - Update to 1.5.1
    - pam_unix: fixed CVE-2020-27780 - authentication bypass when a user
      doesn't exist and root password is blank [bsc#1179166]
    - pam_faillock: added nodelay option to not set pam_fail_delay
    - pam_wheel: use pam_modutil_user_in_group to check for the group membership
      with getgrouplist where it is available
* Thu Nov 26 2020 Ludwig Nussel <lnussel@suse.de>
  - add macros.pam to abstract directory for pam modules
* Thu Nov 19 2020 Thorsten Kukuk <kukuk@suse.com>
  - Update to 1.5.0
    - obsoletes pam-bsc1178727-initialize-daysleft.patch
    - Multiple minor bug fixes, portability fixes, and documentation improvements.
    - Extended libpam API with pam_modutil_check_user_in_passwd function.
    - pam_faillock: changed /run/faillock/$USER permissions from 0600 to 0660.
    - pam_motd: read motd files with target user credentials skipping unreadable ones.
    - pam_pwhistory: added a SELinux helper executable.
    - pam_unix, pam_usertype: implemented avoidance of certain timing attacks.
    - pam_wheel: implemented PAM_RUSER fallback for the case when getlogin fails.
    - pam_env: Reading of the user environment is deprecated and will be removed
      at some point in the future.
    - libpam: pam_modutil_drop_priv() now correctly sets the target user's
      supplementary groups, allowing pam_motd to filter messages accordingly
  - Refresh pam-xauth_ownership.patch
  - pam_tally2-removal.patch: Re-add pam_tally2 for deprecated sub-package
  - pam_cracklib-removal.patch: Re-add pam_cracklib for deprecated sub-package
* Wed Nov 18 2020 Josef Möllers <josef.moellers@suse.com>
  - pam_cracklib: added code to check whether the password contains
    a substring of of the user's name of at least <N> characters length
    in some form.
    This is enabled by the new parameter "usersubstr=<N>"
    See https://github.com/libpwquality/libpwquality/commit/bfef79dbe6aa525e9557bf4b0a61e6dde12749c4
    [jsc#SLE-16719, jsc#SLE-16720, pam-pam_cracklib-add-usersubstr.patch]
* Wed Nov 18 2020 Josef Möllers <josef.moellers@suse.com>
  - pam_xauth.c: do not free() a string which has been (successfully)
    passed to putenv().
    [bsc#1177858, pam-bsc1177858-dont-free-environment-string.patch]
* Fri Nov 13 2020 Josef Möllers <josef.moellers@suse.com>
  - Initialize pam_unix pam_sm_acct_mgmt() local variable "daysleft"
    to avoid spurious (and misleading)
      Warning: your password will expire in ... days.
    fixed upstream with commit db6b293046a
    [bsc#1178727, pam-bsc1178727-initialize-daysleft.patch]
* Tue Nov 10 2020 Thorsten Kukuk <kukuk@suse.com>
  - Enable pam_faillock [bnc#1171562]
* Thu Oct 29 2020 Ludwig Nussel <lnussel@suse.de>
  - prepare usrmerge (boo#1029961, pam-usrmerge.diff)
* Thu Oct 08 2020 Josef Möllers <josef.moellers@suse.com>
  - /usr/bin/xauth chokes on the old user's $HOME being on an NFS
    file system. Run /usr/bin/xauth using the old user's uid/gid
    Patch courtesy of Dr. Werner Fink.
    [bsc#1174593, pam-xauth_ownership.patch]
* Thu Oct 08 2020 Stanislav Brabec <sbrabec@suse.com>
  - pam-login_defs-check.sh: Fix the regexp to get a real variable
    list (boo#1164274).
* Wed Jun 24 2020 Josef Möllers <josef.moellers@suse.com>
  - Revert the previous change [SR#815713].
    The group is not necessary for PAM functionality but used only
    during testing. The test system should therefore create this group.
    [bsc#1171016, pam.spec]
* Mon Jun 15 2020 Josef Möllers <josef.moellers@suse.com>
  - Add requirement for group "wheel" to spec file.
    [bsc#1171016, pam.spec]
* Mon Jun 08 2020 Thorsten Kukuk <kukuk@suse.com>
  - Update to final 1.4.0 release
    - includes pam-check-user-home-dir.patch
    - obsoletes fix-man-links.dif
* Mon Jun 08 2020 Thorsten Kukuk <kukuk@suse.com>
  - common-password: remove pam_cracklib, as that is deprecated.
* Thu May 28 2020 Josef Möllers <josef.moellers@suse.com>
  - pam_setquota.so:
    When setting quota, don't apply any quota if the user's $HOME is
    a mountpoint (ie the user has a partition of his/her own).
    [bsc#1171721, pam-check-user-home-dir.patch]
* Wed May 27 2020 Thorsten Kukuk <kukuk@suse.com>
  - Update to current Linux-PAM snapshot
    - pam_tally* and pam_cracklib got deprecated
  - Disable pam_faillock and pam_setquota until they are whitelisted
* Tue May 12 2020 Josef Möllers <josef.moellers@suse.com>
  - Adapted patch pam-hostnames-in-access_conf.patch for new version
    New version obsoleted patch use-correct-IP-address.patch
    [pam-hostnames-in-access_conf.patch,
    use-correct-IP-address.patch]
* Tue May 12 2020 Thorsten Kukuk <kukuk@suse.com>
  - Update to current Linux-PAM snapshot
    - Obsoletes pam_namespace-systemd.diff
* Tue May 12 2020 Thorsten Kukuk <kukuk@suse.com>
  - Update to current Linux-PAM snapshot
    - Add pam_faillock
    - Multiple minor bug fixes and documentation improvements
    - Fixed grammar of messages printed via pam_prompt
    - Added support for a vendor directory and libeconf
    - configure: Allowed disabling documentation through --disable-doc
    - pam_get_authtok_verify: Avoid duplicate password verification
    - pam_env: Changed the default to not read the user .pam_environment file
    - pam_group, pam_time: Fixed logical error with multiple ! operators
    - pam_keyinit: In pam_sm_setcred do the same as in pam_sm_open_session
    - pam_lastlog: Do not log info about failed login if the session was opened
      with PAM_SILENT flag
    - pam_lastlog: Limit lastlog file use by LASTLOG_UID_MAX option in login.defs
    - pam_lastlog: With 'unlimited' option prevent SIGXFSZ due to reduced 'fsize'
      limit
    - pam_motd: Export MOTD_SHOWN=pam after showing MOTD
    - pam_motd: Support multiple motd paths specified, with filename overrides
    - pam_namespace: Added a systemd service, which creates the namespaced
      instance parent directories during boot
    - pam_namespace: Support for noexec, nosuid and nodev flags for tmpfs mounts
    - pam_shells: Recognize /bin/sh as the default shell
    - pam_succeed_if: Support lists in group membership checks
    - pam_tty_audit: If kernel audit is disabled return PAM_IGNORE
    - pam_umask: Added new 'nousergroups' module argument and allowed specifying
      the default for usergroups at build-time
    - pam_unix: Added 'nullresetok' option to allow resetting blank passwords
    - pam_unix: Report unusable hashes found by checksalt to syslog
    - pam_unix: Support for (gost-)yescrypt hashing methods
    - pam_unix: Use bcrypt b-variant when it bcrypt is chosen
    - pam_usertype: New module to tell if uid is in login.defs ranges
    - Added new API call pam_start_confdir() for special applications that
      cannot use the system-default PAM configuration paths and need to
      explicitly specify another path
  - pam_namespace-systemd.diff: fix path of pam_namespace.services
* Thu Apr 02 2020 Ludwig Nussel <lnussel@suse.de>
  - own /usr/lib/motd.d/ so other packages can add files there
* Tue Mar 24 2020 Josef Möllers <josef.moellers@suse.com>
  - Listed all manual pages seperately as pam_userdb.8 has been moved
    to pam-extra.
    Also %exclude %{_defaultdocdir}/pam as the docs are in a separate
    package.
    [pam.spec]
* Mon Mar 16 2020 Josef Möllers <josef.moellers@suse.com>
  - pam_userdb moved to a new package pam-extra as pam-modules
    is obsolete and not part of SLE.
    [bsc#1166510, pam.spec]
* Thu Mar 12 2020 Josef Möllers <josef.moellers@suse.com>
  - Removed pam_userdb from this package and moved to pam-modules.
    This removed the requirement for libdb.
    Also made "xz" required for all releases.
    Remove limits for nproc from /etc/security/limits.conf
    [bsc#1164562, bsc#1166510, bsc#1110700, pam.spec]
* Wed Feb 19 2020 kukuk@suse.de
  - Recommend login.defs only (no hard requirement)
* Tue Sep 24 2019 kukuk@suse.com
  - Update to version 1.3.1+git20190923.ea78d67:
    * Fixed missing quotes in configure script
    * Add support for a vendor directory and libeconf (#136)
    * pam_lastlog: document the 'unlimited' option
    * pam_lastlog: prevent crash due to reduced 'fsize' limit
    * pam_unix_sess.c add uid for opening session
    * Fix the man page for "pam_fail_delay()"
    * Fix a typo
    * Update a function comment
  - drop usr-etc-support.patch (accepted upstream)
* Thu Sep 05 2019 kukuk@suse.de
  - Add migration support from /etc to /usr/etc during upgrade
* Wed Sep 04 2019 kukuk@suse.com
  - Update to version 1.3.1+git20190902.9de67ee:
    * pwhistory: fix read of uninitialized data and memory leak when modifying opasswd
* Tue Aug 27 2019 kukuk@suse.com
  - Update to version 1.3.1+git20190826.1b087ed:
    * libpam/pam_modutil_sanitize.c: optimize the way to close fds
* Thu Aug 22 2019 Jan Engelhardt <jengelh@inai.de>
  - Replace old $RPM_* shell vars by macros.
  - Avoid unnecessary invocation of subshells.
  - Shorten recipe for constructing securetty contents on s390.
* Mon Aug 19 2019 kukuk@suse.de
  - usr-etc-support.patch: Add support for /usr/etc/pam.d
* Mon Aug 19 2019 kukuk@suse.de
  - encryption_method_nis.diff: obsolete, NIS clients shouldn't
    require DES anymore.
  - etc.environment: removed, the sources contain the same
* Mon Aug 19 2019 kukuk@suse.com
  - Update to version 1.3.1+git20190807.e31dd6c:
    * pam_tty_audit: Manual page clarification about password logging
    * pam_get_authtok_verify: Avoid duplicate password verification
    * Mention that ./autogen.sh is needeed to be run if you check out the sources from git
    * pam_unix: Correct MAXPASS define name in the previous two commits.
    * Restrict password length when changing password
    * Trim password at PAM_MAX_RESP_SIZE chars
    * pam_succeed_if: Request user data only when needed
    * pam_tally2: Remove unnecessary fsync()
    * Fixed a grammer mistake
    * Fix documentation for pam_wheel
    * Fix a typo in the documentation
    * pam_lastlog: Improve silent option documentation
    * pam_lastlog: Respect PAM_SILENT flag
    * Fix regressions from the last commits.
    * Replace strndupa with strncpy
    * build: ignore pam_lastlog when logwtmp is not available.
    * build: ignore pam_rhosts if neither ruserok nor ruserok_af is available.
    * pam_motd: Cleanup the code and avoid unnecessary logging
    * pam_lastlog: Limit lastlog file use by LASTLOG_UID_MAX option in login.defs.
    * Move the duplicated search_key function to pam_modutil.
    * pam_unix: Use pam_syslog instead of helper_log_err.
    * pam_unix: Report unusable hashes found by checksalt to syslog.
    * Revert "pam_unix: Add crypt_default method, if supported."
    * pam_unix: Add crypt_default method, if supported.
    * Revert part of the commit 4da9febc
    * pam_unix: Add support for (gost-)yescrypt hashing methods.
    * pam_unix: Fix closing curly brace. (#77)
    * pam_unix: Add support for crypt_checksalt, if libcrypt supports it.
    * pam_unix: Prefer a gensalt function, that supports auto entropy.
    * pam_motd: Fix segmentation fault when no motd_dir specified (#76)
    * pam_motd: Support multiple motd paths specified, with filename overrides (#69)
    * pam_unix: Use bcrypt b-variant for computing new hashes.
    * pam_tally, pam_tally2: fix grammar and spelling (#54)
    * Fix grammar of messages printed via pam_prompt
    * pam_stress: do not mark messages for translation
    * pam_unix: remove obsolete _UNIX_AUTHTOK, _UNIX_OLD_AUTHTOK, and _UNIX_NEW_AUTHTOK macros
    * pam_unix: remove obsolete _unix_read_password prototype
* Thu May 02 2019 sbrabec@suse.com
  - Add virtual symbols for login.defs compatibility (bsc#1121197).
  - Add login.defs safety check pam-login_defs-check.sh
    (bsc#1121197).
* Thu Nov 15 2018 josef.moellers@suse.com
  - When comparing an incoming IP address with an entry in
    access.conf that only specified a single host (ie no netmask),
    the incoming IP address was used rather than the IP address from
    access.conf, effectively comparing the incoming address with
    itself.  (Also fixed a small typo while I was at it)
    {bsc#1115640, use-correct-IP-address.patch, CVE-2018-17953]
* Mon Oct 22 2018 josef.moellers@suse.com
  - Upgrade to 1.3.1
    * pam_motd: add support for a motd.d directory
    * pam_umask: Fix documentation to align with order of loading umask
    * pam_get_user.3: Fix missing word in documentation
    * pam_tally2 --reset: avoid creating a missing tallylog file
    * pam_mkhomedir: Allow creating parent of homedir under /
    * access.conf.5: Add note about spaces around ':'
    * pam.8: Workaround formatting problem
    * pam_unix: Check return value of malloc used for setcred data
    * pam_cracklib: Drop unused prompt macros
    * pam_tty_audit: Support matching users by uid range
    * pam_access: support parsing files in /etc/security/access.d/*.conf
    * pam_localuser: Correct documentation
    * pam_issue: Fix no prompting in parse escape codes mode
    * Unification and cleanup of syslog log levels
    Also: removed nproc limit, referred to systemd instead.
    Patch5 (pam-fix-config-order-in-manpage.patch) not needed any more.
    [bsc#1112508, pam-fix-config-order-in-manpage.patch]
* Fri Aug 24 2018 psimons@suse.com
  - Add libdb as build-time dependency to enable pam_userdb module.
    This module is useful for implementing virtual user support for
    vsftpd and possibly other daemons, too. [bsc#929711, fate#322538]
* Fri Jul 13 2018 sbrabec@suse.com
  - Install empty directory /etc/security/namespace.d for
    pam_namespace.so iscript.
* Thu May 03 2018 josef.moellers@suse.com
  - pam_umask.8 needed to be patched as well.
    [bsc#1089884, pam-fix-config-order-in-manpage.patch]
* Wed May 02 2018 josef.moellers@suse.com
  - Changed order of configuration files to reflect actual code.
    [bsc#1089884, pam-fix-config-order-in-manpage.patch]
* Thu Feb 22 2018 fvogt@suse.com
  - Use %license (boo#1082318)

Files

/etc/environment
/etc/pam.d
/etc/security
/etc/security/access.conf
/etc/security/faillock.conf
/etc/security/group.conf
/etc/security/limits.conf
/etc/security/limits.d
/etc/security/namespace.conf
/etc/security/namespace.d
/etc/security/namespace.init
/etc/security/pam_env.conf
/etc/security/sepermit.conf
/etc/security/time.conf
/run/motd.d
/usr/etc/pam.d
/usr/etc/pam.d/common-account
/usr/etc/pam.d/common-auth
/usr/etc/pam.d/common-password
/usr/etc/pam.d/common-session
/usr/etc/pam.d/other
/usr/lib/libpam.so.0
/usr/lib/libpam.so.0.85.1
/usr/lib/libpam_misc.so.0
/usr/lib/libpam_misc.so.0.82.1
/usr/lib/libpamc.so.0
/usr/lib/libpamc.so.0.82.1
/usr/lib/motd.d
/usr/lib/security
/usr/lib/security/pam_access.so
/usr/lib/security/pam_debug.so
/usr/lib/security/pam_deny.so
/usr/lib/security/pam_echo.so
/usr/lib/security/pam_env.so
/usr/lib/security/pam_exec.so
/usr/lib/security/pam_faildelay.so
/usr/lib/security/pam_faillock.so
/usr/lib/security/pam_filter
/usr/lib/security/pam_filter.so
/usr/lib/security/pam_filter/upperLOWER
/usr/lib/security/pam_ftp.so
/usr/lib/security/pam_group.so
/usr/lib/security/pam_issue.so
/usr/lib/security/pam_keyinit.so
/usr/lib/security/pam_lastlog.so
/usr/lib/security/pam_limits.so
/usr/lib/security/pam_listfile.so
/usr/lib/security/pam_localuser.so
/usr/lib/security/pam_loginuid.so
/usr/lib/security/pam_mail.so
/usr/lib/security/pam_mkhomedir.so
/usr/lib/security/pam_motd.so
/usr/lib/security/pam_namespace.so
/usr/lib/security/pam_nologin.so
/usr/lib/security/pam_permit.so
/usr/lib/security/pam_pwhistory.so
/usr/lib/security/pam_rhosts.so
/usr/lib/security/pam_rootok.so
/usr/lib/security/pam_securetty.so
/usr/lib/security/pam_selinux.so
/usr/lib/security/pam_sepermit.so
/usr/lib/security/pam_setquota.so
/usr/lib/security/pam_shells.so
/usr/lib/security/pam_stress.so
/usr/lib/security/pam_succeed_if.so
/usr/lib/security/pam_time.so
/usr/lib/security/pam_timestamp.so
/usr/lib/security/pam_tty_audit.so
/usr/lib/security/pam_umask.so
/usr/lib/security/pam_usertype.so
/usr/lib/security/pam_warn.so
/usr/lib/security/pam_wheel.so
/usr/lib/security/pam_xauth.so
/usr/lib/systemd/system/pam_namespace.service
/usr/lib/tmpfiles.d/motd.conf
/usr/sbin/faillock
/usr/sbin/mkhomedir_helper
/usr/sbin/pam_namespace_helper
/usr/sbin/pam_timestamp_check
/usr/sbin/pwhistory_helper
/usr/sbin/unix2_chkpwd
/usr/sbin/unix_chkpwd
/usr/sbin/unix_update
/usr/share/doc/packages/pam/NEWS
/usr/share/licenses/pam
/usr/share/licenses/pam/COPYING
/usr/share/locale/ar/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/as/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/be/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/bg/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/bn/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/bn_IN/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ca/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/cs/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/da/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/de/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/de_CH/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/el/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/eo/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/es/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/et/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/eu/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/fa/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/fi/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/fr/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ga/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/gl/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/gu/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/he/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/hi/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/hr/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/hu/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ia/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/id/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/is/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/it/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ja/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/kk/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/km/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/kn/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ko/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/lt/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/lv/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/mk/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ml/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/mr/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/nb/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ne/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/nl/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/nn/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/or/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/pa/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/pl/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/pt/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/pt_BR/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ro/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ru/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/sk/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/sl/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/sq/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/sr/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/sr@latin/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/sv/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/ta/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/te/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/th/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/tr/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/uk/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/vi/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/zh_CN/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/zh_HK/LC_MESSAGES/Linux-PAM.mo
/usr/share/locale/zh_TW/LC_MESSAGES/Linux-PAM.mo
/usr/share/man/man5/access.conf.5.gz
/usr/share/man/man5/environment.5.gz
/usr/share/man/man5/faillock.conf.5.gz
/usr/share/man/man5/group.conf.5.gz
/usr/share/man/man5/limits.conf.5.gz
/usr/share/man/man5/motd.5.gz
/usr/share/man/man5/namespace.conf.5.gz
/usr/share/man/man5/pam.conf.5.gz
/usr/share/man/man5/pam.d.5.gz
/usr/share/man/man5/pam_env.conf.5.gz
/usr/share/man/man5/sepermit.conf.5.gz
/usr/share/man/man5/time.conf.5.gz
/usr/share/man/man8/PAM.8.gz
/usr/share/man/man8/faillock.8.gz
/usr/share/man/man8/mkhomedir_helper.8.gz
/usr/share/man/man8/pam.8.gz
/usr/share/man/man8/pam_access.8.gz
/usr/share/man/man8/pam_debug.8.gz
/usr/share/man/man8/pam_deny.8.gz
/usr/share/man/man8/pam_echo.8.gz
/usr/share/man/man8/pam_env.8.gz
/usr/share/man/man8/pam_exec.8.gz
/usr/share/man/man8/pam_faildelay.8.gz
/usr/share/man/man8/pam_faillock.8.gz
/usr/share/man/man8/pam_filter.8.gz
/usr/share/man/man8/pam_ftp.8.gz
/usr/share/man/man8/pam_group.8.gz
/usr/share/man/man8/pam_issue.8.gz
/usr/share/man/man8/pam_keyinit.8.gz
/usr/share/man/man8/pam_lastlog.8.gz
/usr/share/man/man8/pam_limits.8.gz
/usr/share/man/man8/pam_listfile.8.gz
/usr/share/man/man8/pam_localuser.8.gz
/usr/share/man/man8/pam_loginuid.8.gz
/usr/share/man/man8/pam_mail.8.gz
/usr/share/man/man8/pam_mkhomedir.8.gz
/usr/share/man/man8/pam_motd.8.gz
/usr/share/man/man8/pam_namespace.8.gz
/usr/share/man/man8/pam_namespace_helper.8.gz
/usr/share/man/man8/pam_nologin.8.gz
/usr/share/man/man8/pam_permit.8.gz
/usr/share/man/man8/pam_pwhistory.8.gz
/usr/share/man/man8/pam_rhosts.8.gz
/usr/share/man/man8/pam_rootok.8.gz
/usr/share/man/man8/pam_securetty.8.gz
/usr/share/man/man8/pam_selinux.8.gz
/usr/share/man/man8/pam_sepermit.8.gz
/usr/share/man/man8/pam_setquota.8.gz
/usr/share/man/man8/pam_shells.8.gz
/usr/share/man/man8/pam_stress.8.gz
/usr/share/man/man8/pam_succeed_if.8.gz
/usr/share/man/man8/pam_time.8.gz
/usr/share/man/man8/pam_timestamp.8.gz
/usr/share/man/man8/pam_timestamp_check.8.gz
/usr/share/man/man8/pam_tty_audit.8.gz
/usr/share/man/man8/pam_umask.8.gz
/usr/share/man/man8/pam_unix.8.gz
/usr/share/man/man8/pam_usertype.8.gz
/usr/share/man/man8/pam_warn.8.gz
/usr/share/man/man8/pam_wheel.8.gz
/usr/share/man/man8/pam_xauth.8.gz
/usr/share/man/man8/pwhistory_helper.8.gz
/usr/share/man/man8/unix2_chkpwd.8.gz
/usr/share/man/man8/unix_chkpwd.8.gz
/usr/share/man/man8/unix_update.8.gz


Generated by rpm2html 1.8.1

Fabrice Bellet, Thu Sep 9 11:24:11 2021