/systemd-251/src/test/ |
D | test-libcrypt-util.c | 76 _cleanup_free_ char *hashed; in test_hash_password_full() local 79 assert_se(hash_password_full(i, &cd_data, &cd_size, &hashed) == 0); in test_hash_password_full() 81 assert_se(hash_password_full(i, NULL, NULL, &hashed) == 0); in test_hash_password_full() 82 log_debug("\"%s\" → \"%s\"", i, hashed); in test_hash_password_full() 85 assert_se(test_password_one(hashed, i) == true); in test_hash_password_full() 86 … assert_se(test_password_one(i, hashed) <= 0); /* We get an error for non-utf8 */ in test_hash_password_full() 87 assert_se(test_password_one(hashed, "foobar") == false); in test_hash_password_full() 88 assert_se(test_password_many(STRV_MAKE(hashed), i) == true); in test_hash_password_full() 89 assert_se(test_password_many(STRV_MAKE(hashed), "foobar") == false); in test_hash_password_full() 90 … assert_se(test_password_many(STRV_MAKE(hashed, hashed, hashed), "foobar") == false); in test_hash_password_full() [all …]
|
/systemd-251/src/home/ |
D | homectl-recovery-key.c | 14 static int add_privileged(JsonVariant **v, const char *hashed) { in add_privileged() argument 19 assert(hashed); in add_privileged() 23 … JSON_BUILD_PAIR("hashedPassword", JSON_BUILD_STRING(hashed)))); in add_privileged() 105 _cleanup_(erase_and_freep) char *password = NULL, *hashed = NULL; in identity_add_recovery_key() 116 r = hash_password(password, &hashed); in identity_add_recovery_key() 121 r = add_privileged(v, hashed); in identity_add_recovery_key()
|
D | homectl-fido2.c | 75 _cleanup_(erase_and_freep) char *base64_encoded = NULL, *hashed = NULL; in add_fido2_salt() 84 r = hash_password(base64_encoded, &hashed); in add_fido2_salt() 91 JSON_BUILD_PAIR("hashedPassword", JSON_BUILD_STRING(hashed)), in add_fido2_salt()
|
D | homectl-pkcs11.c | 21 _cleanup_(erase_and_freep) char *base64_encoded = NULL, *hashed = NULL; in add_pkcs11_encrypted_key() 37 r = hash_password(base64_encoded, &hashed); in add_pkcs11_encrypted_key() 44 … JSON_BUILD_PAIR("hashedPassword", JSON_BUILD_STRING(hashed)))); in add_pkcs11_encrypted_key()
|
D | homework-fscrypt.c | 78 uint8_t hashed[512 / 8] = {}, hashed2[512 / 8] = {}; in calculate_key_descriptor() local 82 assert_se(SHA512(key, key_size, hashed) == hashed); in calculate_key_descriptor() 83 assert_se(SHA512(hashed, sizeof(hashed), hashed2) == hashed2); in calculate_key_descriptor()
|
D | user-record-util.c | 796 _cleanup_(erase_and_freep) char *hashed = NULL; in user_record_make_hashed_password() 798 r = hash_password(*i, &hashed); in user_record_make_hashed_password() 802 r = strv_consume(&np, TAKE_PTR(hashed)); in user_record_make_hashed_password()
|
/systemd-251/src/nss-systemd/ |
D | userdb-glue.c | 140 const char *hashed; in nss_pack_user_record_shadow() local 149 …assert_se(hashed = strv_isempty(hr->hashed_password) ? PASSWORD_LOCKED_AND_INVALID : hr->hashed_pa… in nss_pack_user_record_shadow() 150 required += strlen(hashed) + 1; in nss_pack_user_record_shadow() 173 strcpy(spwd->sp_pwdp, hashed); in nss_pack_user_record_shadow() 418 const char *hashed; in nss_pack_group_record_shadow() local 427 …assert_se(hashed = strv_isempty(hr->hashed_password) ? PASSWORD_LOCKED_AND_INVALID : hr->hashed_pa… in nss_pack_group_record_shadow() 428 required += strlen(hashed) + 1; in nss_pack_group_record_shadow() 440 strcpy(sgrp->sg_passwd, hashed); in nss_pack_group_record_shadow()
|
/systemd-251/test/fuzz/fuzz-unit-file/ |
D | github-19178 | 3 LoadCredential=passwd.hashed-password.root
|
/systemd-251/units/ |
D | systemd-sysusers.service | 28 LoadCredential=passwd.hashed-password.root
|
D | systemd-firstboot.service | 32 LoadCredential=passwd.hashed-password.root
|
/systemd-251/src/resolve/ |
D | resolved-dns-dnssec.c | 1659 static int nsec3_hashed_domain_format(const uint8_t *hashed, size_t hashed_size, const char *zone, … in nsec3_hashed_domain_format() argument 1663 assert(hashed); in nsec3_hashed_domain_format() 1668 l = base32hexmem(hashed, hashed_size, false); in nsec3_hashed_domain_format() 1681 uint8_t hashed[DNSSEC_HASH_SIZE_MAX]; in nsec3_hashed_domain_make() local 1689 hashed_size = dnssec_nsec3_hash(nsec3, domain, hashed); in nsec3_hashed_domain_make() 1693 return nsec3_hashed_domain_format(hashed, (size_t) hashed_size, zone, ret); in nsec3_hashed_domain_make()
|
D | resolvectl.c | 931 _cleanup_free_ char *hashed = NULL; in resolve_openpgp() local 945 r = string_hashsum_sha256(address, domain - 1 - address, &hashed); in resolve_openpgp() 949 strshorten(hashed, 56); in resolve_openpgp() 951 full = strjoina(hashed, "._openpgpkey.", domain); in resolve_openpgp() 959 hashed = mfree(hashed); in resolve_openpgp() 960 r = string_hashsum_sha224(address, domain - 1 - address, &hashed); in resolve_openpgp() 964 full = strjoina(hashed, "._openpgpkey.", domain); in resolve_openpgp()
|
/systemd-251/docs/ |
D | CREDENTIALS.md | 324 will look for the credentials `passwd.hashed-password.<username>`, 326 configure the password (either in UNIX hashed form, or plaintext) or shell of 341 --set-credential=passwd.hashed-password.root:$(mkpasswd mysecret) \ 366 … -fw_cfg name=opt/io.systemd.credentials/passwd.hashed-password.root,string=$(mkpasswd mysecret) \
|
D | GROUP_RECORD.md | 65 `hashedPassword` → An array of strings with UNIX hashed passwords; see the
|
D | CONTAINER_INTERFACE.md | 213 devices, for example hashed out of the container names. That way it is more
|
D | RANDOM_SEEDS.md | 196 system token they are combined and hashed with SHA256 (in counter mode, to
|
D | USER_RECORD.md | 626 `hashedPassword` → An array of strings, each containing a hashed UNIX password 645 Base64-encoded and tested against the specified UNIX hashed password. The
|
/systemd-251/ |
D | TODO | 811 invocation id, that is derived from process creds, specifically a hashed
|
D | NEWS | 1479 passwd.hashed-password.<user> and passwd.plaintext-password.<user> 1481 hashed form, or literally). By default these credentials are inherited 1837 to the main user and group records. Thus, hashed passwords managed by 1860 with its hashed password) is dropped into /run/host/userdb/. These 3662 also gained a new switch --root-password-hashed= which is like 3663 --root-password= but accepts a pre-hashed UNIX password as
|