/systemd-251/po/ |
D | it.po | 74 msgstr "Crea un'area home" 78 msgstr "Autenticazione richiesta per creare l'area home di un utente." 82 msgstr "Rimuovi un'area home" 86 msgstr "Autenticazione richiesta per rimuovere l'area home di un utente." 90 msgstr "Controlla credenziali di un'area home" 96 "Autenticazione richiesta per controllare le credenziali di un'area home per " 101 msgstr "Aggiorna un'area home" 105 msgstr "Autenticazione richiesta per aggiornare l'area home di un utente." 109 msgstr "Ridimensiona un'area home" 113 msgstr "Autenticazione richiesta per ridimensionare l'area home di un utente." [all …]
|
D | es.po | 76 msgstr "Crear un área home" 80 msgstr "Se requiere autenticación para crear un área home de usuario." 84 msgstr "Quitar un área home" 88 msgstr "Se requiere autenticación para quitar un área home de usuario." 92 msgstr "Comprobar las credenciales de un área home" 99 "de un usuario." 103 msgstr "Actualizar un espacio personal" 108 "Necesita autenticarse para actualizar el espacio personal de un usuario." 112 msgstr "Redimensionar un espacio personal" 117 "Necesita autenticarse para redimensionar el espacio personal de un usuario." [all …]
|
D | fr.po | 75 msgstr "Créer un espace personnel" 80 "Authentification requise pour créer l’espace personnel d’un utilisateur." 84 msgstr "Retirer un espace personnel" 89 "Authentification requise pour retirer l’espace personnel d’un utilisateur." 93 msgstr "Vérifier les identifiants d’un espace personnel" 100 "personnel d’un utilisateur." 104 msgstr "Mettre à jour un espace personnel" 109 "Authentification requise pour mettre à jour l’espace personnel d’un " 114 msgstr "Retailler un espace personnel" 118 msgstr "Authentification requise pour retailler un espace personnel." [all …]
|
D | ca.po | 47 "Es requereix autenticació per gestionar un servei del sistema o bé fitxers " 115 "Es requereix autenticació per annexar un dispositiu a un lloc de treball." 125 msgstr "Es requereix autenticació per establir un missatge de mur" 383 "Es requereix autenticació per annexar un dispositiu a un lloc de treball." 642 msgstr "Estableix un missatge de mur" 646 msgstr "Es requereix autenticació per establir un missatge de mur" 660 msgstr "Inicia la sessió a un contenidor local" 664 msgstr "Es requereix autenticació per iniciar la sessió a un contenidor local." 676 msgstr "Adquireix un shell en un contenidor local" 681 "Es requereix autenticació per adquirir un shell en un contenidor local." [all …]
|
D | ro.po | 78 msgstr "Crează un spațiu personal" 109 msgstr "Actualizează un spațiu personal" 119 msgstr "Redimensionează un spațiu personal" 129 msgstr "Schimbă parola pentru un spațiu personal" 355 "Este necesară o cerere explicită pentru ca un utilizator neautentificat să " 374 msgstr "Autentificarea este necesară pentru a atașa un dispozitiv la o stație." 613 msgstr "Setează un mesaj pentru toată lumea" 617 msgstr "Autentificarea este necesară pentru a seta un mesaj pentru toată lumea" 625 msgstr "Autentificarea este necesară pentru a schimba un terminal virtual." 629 msgstr "Conectare la un container local" [all …]
|
/systemd-251/src/cryptenroll/ |
D | cryptenroll-fido2.c | 24 const char *node, *un; in enroll_fido2() local 34 un = strempty(crypt_get_uuid(cd)); in enroll_fido2() 40 …/* user_id= */ un, strlen(un), /* We pass the user ID and name as the same: the disk's UUID if we … in enroll_fido2() 41 /* user_name= */ un, in enroll_fido2()
|
/systemd-251/src/home/ |
D | homectl-fido2.c | 125 JsonVariant *un, *realm, *rn; in identity_add_fido2_parameters() local 136 un = json_variant_by_key(*v, "userName"); in identity_add_fido2_parameters() 137 if (!un) in identity_add_fido2_parameters() 140 if (!json_variant_is_string(un)) in identity_add_fido2_parameters() 150 fido_un = strjoina(json_variant_string(un), json_variant_string(realm)); in identity_add_fido2_parameters() 152 fido_un = json_variant_string(un); in identity_add_fido2_parameters()
|
D | user-record-util.c | 26 … _cleanup_free_ char *hd = NULL, *un = NULL, *ip = NULL, *rr = NULL, *user_name_and_realm = NULL; in user_record_synthesize() local 60 un = strdup(user_name); in user_record_synthesize() 61 if (!un) in user_record_synthesize() 97 free_and_replace(h->user_name, un); in user_record_synthesize() 110 … _cleanup_free_ char *un = NULL, *rr = NULL, *group_name_and_realm = NULL, *description = NULL; in group_record_synthesize() local 124 un = strdup(h->user_name); in group_record_synthesize() 125 if (!un) in group_record_synthesize() 133 group_name_and_realm = strjoin(un, "@", rr); in group_record_synthesize() 138 description = strjoin("Primary Group of User ", un); in group_record_synthesize() 144 JSON_BUILD_PAIR("groupName", JSON_BUILD_STRING(un)), in group_record_synthesize() [all …]
|
/systemd-251/catalog/ |
D | systemd.it.catalog.in | 47 Subject: I messaggi di un servizio sono stati soppressi 52 Un servizio ha registrato troppi messaggi in un dato periodo di tempo. 64 Subject: I messaggi di un servizio sono stati perduti 73 Subject: Il processo @COREDUMP_PID@ (@COREDUMP_COMM@) ha generato un dump. 78 Il processo @COREDUMP_PID@ (@COREDUMP_COMM@) si è bloccato generando un dump. 80 Questo di solito capita per un errore di programmazione nell'applicazione e 327 In questo modo ci si espone ad attacchi "DNSSEC downgrade", e un aggressore 331 Questo evento potrebbe indicare un'incompatibilità del DNS Server con DNSSEC o 332 che un aggressore è riuscito nel suo intento malevolo. 341 Una query DNS o un dato hanno fatto fallire la validazione DNSSEC. Questo è [all …]
|
D | systemd.fr.catalog.in | 47 Subject: Des messages d'un service ont été supprimés 52 Un service a essayé d'enregistrer un trop grand nombre de messages sur un 71 Subject: Le processus @COREDUMP_PID@ (@COREDUMP_COMM@) a généré un fichier « core » 76 Le processus @COREDUMP_PID@ (@COREDUMP_COMM@) a planté et généré un fichier « core ». 79 incriminé, et cela devrait être notifié à son concepteur comme un défaut (bug). 262 fichiers sous-jacent à un autre emplacement. 265 Subject: Une machine virtuelle ou un conteneur (container) a été démarré 273 Subject: Une machine virtuelle ou un conteneur (container) a été arrêté 293 car un attaquant peut être capable de désactiver la validation DNSSEC sur 297 DNSSEC, ou qu'un attaquant a peut-être conduit une telle attaque avec succès. [all …]
|
/systemd-251/src/basic/ |
D | socket-util.c | 96 a->sockaddr.un.sun_path[0] != 0 && in socket_address_verify() 101 e = memchr(a->sockaddr.un.sun_path, 0, sizeof(a->sockaddr.un.sun_path)); in socket_address_verify() 104 … if (a->size != offsetof(struct sockaddr_un, sun_path) + (e - a->sockaddr.un.sun_path) + 1) in socket_address_verify() 111 … if (!IN_SET(a->size, sizeof(a->sockaddr.un.sun_path), sizeof(a->sockaddr.un.sun_path)+1)) in socket_address_verify() 222 if ((a->sockaddr.un.sun_path[0] == 0) != (b->sockaddr.un.sun_path[0] == 0)) in socket_address_equal() 225 if (a->sockaddr.un.sun_path[0]) { in socket_address_equal() 226 … if (!path_equal_or_files_same(a->sockaddr.un.sun_path, b->sockaddr.un.sun_path, 0)) in socket_address_equal() 232 if (memcmp(a->sockaddr.un.sun_path, b->sockaddr.un.sun_path, a->size) != 0) in socket_address_equal() 270 if (a->sockaddr.un.sun_path[0] == 0) in socket_address_get_path() 277 return a->sockaddr.un.sun_path; in socket_address_get_path() [all …]
|
D | def.h | 68 .un.sun_family = AF_UNIX, \ 69 .un.sun_path = "\0/org/freedesktop/plymouthd", \
|
/systemd-251/src/cgroups-agent/ |
D | cgroups-agent.c | 12 .un.sun_family = AF_UNIX, in main() 13 .un.sun_path = "/run/systemd/cgroups-agent", in main() 35 n = sendto(fd, argv[1], l, 0, &sa.sa, SOCKADDR_UN_LEN(sa.un)); in main()
|
/systemd-251/src/shared/ |
D | nscd-flush.c | 22 .un.sun_family = AF_UNIX, 23 .un.sun_path = "/run/nscd/socket", 63 if (connect(fd, &nscd_sa.sa, SOCKADDR_UN_LEN(nscd_sa.un)) < 0) { in nscd_flush_cache_one()
|
D | utmp-wtmp.c | 344 _cleanup_free_ char *text = NULL, *hn = NULL, *un = NULL, *stdin_tty = NULL; in utmp_wall() local 352 un = getlogname_malloc(); in utmp_wall() 353 if (!un) in utmp_wall() 366 un ?: username, hn, in utmp_wall()
|
D | socket-netlink.c | 29 struct sockaddr_un un; in socket_address_parse() local 31 r = sockaddr_un_set_path(&un, s); in socket_address_parse() 36 .sockaddr.un = un, in socket_address_parse()
|
D | selinux-util.c | 595 const struct sockaddr_un *un; in mac_selinux_bind() local 616 un = (const struct sockaddr_un*) addr; in mac_selinux_bind() 617 if (un->sun_path[0] == 0) in mac_selinux_bind() 620 path = strndupa_safe(un->sun_path, in mac_selinux_bind()
|
/systemd-251/src/userdb/ |
D | userdbd-manager.c | 268 .un.sun_family = AF_UNIX, in manager_startup() 269 .un.sun_path = "/run/systemd/userdb/io.systemd.Multiplexer", in manager_startup() 280 (void) sockaddr_un_unlink(&sockaddr.un); in manager_startup() 283 if (bind(m->listen_fd, &sockaddr.sa, SOCKADDR_UN_LEN(sockaddr.un)) < 0) in manager_startup()
|
/systemd-251/src/fsck/ |
D | fsck.c | 230 .un.sun_family = AF_UNIX, in fsck_progress_socket() 231 .un.sun_path = "/run/systemd/fsck.progress", in fsck_progress_socket() 240 if (connect(fd, &sa.sa, SOCKADDR_UN_LEN(sa.un)) < 0) in fsck_progress_socket() 242 … errno, "Failed to connect to progress socket %s, ignoring: %m", sa.un.sun_path); in fsck_progress_socket()
|
/systemd-251/src/libsystemd/sd-journal/ |
D | journal-send.c | 236 .un.sun_family = AF_UNIX, in sd_journal_sendv() 237 .un.sun_path = "/run/systemd/journal/socket", in sd_journal_sendv() 241 .msg_namelen = SOCKADDR_UN_LEN(sa.un), in sd_journal_sendv() 412 .un.sun_family = AF_UNIX, in sd_journal_stream_fd() 413 .un.sun_path = "/run/systemd/journal/stdout", in sd_journal_stream_fd() 427 r = connect(fd, &sa.sa, SOCKADDR_UN_LEN(sa.un)); in sd_journal_stream_fd()
|
/systemd-251/src/test/ |
D | test-socket-util.c | 63 SocketAddress a = { .sockaddr = { .un = { .sun_family = AF_UNIX } }, in test_socket_print_unix_one() 67 memcpy(a.sockaddr.un.sun_path, in, len_in); in test_socket_print_unix_one() 422 static const union sockaddr_union sa = { .un.sun_family = AF_UNIX }; in TEST() 497 … assert_se(sockaddr_un_set_path(&sa.un, j) == -ENAMETOOLONG); /* too long for AF_UNIX socket */ in TEST() 504 assert_se(sockaddr_un_set_path(&sa.un, j) >= 0); in TEST() 523 …assert_se(sockaddr_un_set_path(&sa.un, FORMAT_PROC_FD_PATH(fd3)) >= 0); /* connect via O_PATH inst… in TEST()
|
D | test-serialize.c | 128 char *un; in TEST() local 129 assert_se(cunescape(t, 0, &un) >= 0); in TEST() 130 assert_se(strv_consume(&strv2, un) >= 0); in TEST()
|
/systemd-251/src/journal/ |
D | journald-syslog.c | 51 r = sockaddr_un_set_path(&sa.un, j); in forward_syslog_iovec() 463 r = sockaddr_un_set_path(&sa.un, syslog_socket); in server_open_syslog_socket() 472 (void) sockaddr_un_unlink(&sa.un); in server_open_syslog_socket() 476 return log_error_errno(errno, "bind(%s) failed: %m", sa.un.sun_path); in server_open_syslog_socket() 478 (void) chmod(sa.un.sun_path, 0666); in server_open_syslog_socket()
|
D | journald-native.c | 463 r = sockaddr_un_set_path(&sa.un, native_socket); in server_open_native_socket() 472 (void) sockaddr_un_unlink(&sa.un); in server_open_native_socket() 476 return log_error_errno(errno, "bind(%s) failed: %m", sa.un.sun_path); in server_open_native_socket() 478 (void) chmod(sa.un.sun_path, 0666); in server_open_native_socket()
|
/systemd-251/src/machine/ |
D | machined-varlink.c | 154 const char *un; in vl_method_get_user_record() local 179 un = found_name ?: p.user_name; in vl_method_get_user_record() 181 if (!user_match_lookup_parameters(&p, un, uid)) in vl_method_get_user_record() 184 r = build_user_json(un, uid, found_real_name, &v); in vl_method_get_user_record()
|