Home
last modified time | relevance | path

Searched refs:hashed (Results 1 – 19 of 19) sorted by relevance

/systemd-251/src/test/
Dtest-libcrypt-util.c76 _cleanup_free_ char *hashed; in test_hash_password_full() local
79 assert_se(hash_password_full(i, &cd_data, &cd_size, &hashed) == 0); in test_hash_password_full()
81 assert_se(hash_password_full(i, NULL, NULL, &hashed) == 0); in test_hash_password_full()
82 log_debug("\"%s\" → \"%s\"", i, hashed); in test_hash_password_full()
85 assert_se(test_password_one(hashed, i) == true); in test_hash_password_full()
86 … assert_se(test_password_one(i, hashed) <= 0); /* We get an error for non-utf8 */ in test_hash_password_full()
87 assert_se(test_password_one(hashed, "foobar") == false); in test_hash_password_full()
88 assert_se(test_password_many(STRV_MAKE(hashed), i) == true); in test_hash_password_full()
89 assert_se(test_password_many(STRV_MAKE(hashed), "foobar") == false); in test_hash_password_full()
90 … assert_se(test_password_many(STRV_MAKE(hashed, hashed, hashed), "foobar") == false); in test_hash_password_full()
[all …]
/systemd-251/src/home/
Dhomectl-recovery-key.c14 static int add_privileged(JsonVariant **v, const char *hashed) { in add_privileged() argument
19 assert(hashed); in add_privileged()
23 … JSON_BUILD_PAIR("hashedPassword", JSON_BUILD_STRING(hashed)))); in add_privileged()
105 _cleanup_(erase_and_freep) char *password = NULL, *hashed = NULL; in identity_add_recovery_key()
116 r = hash_password(password, &hashed); in identity_add_recovery_key()
121 r = add_privileged(v, hashed); in identity_add_recovery_key()
Dhomectl-fido2.c75 _cleanup_(erase_and_freep) char *base64_encoded = NULL, *hashed = NULL; in add_fido2_salt()
84 r = hash_password(base64_encoded, &hashed); in add_fido2_salt()
91 JSON_BUILD_PAIR("hashedPassword", JSON_BUILD_STRING(hashed)), in add_fido2_salt()
Dhomectl-pkcs11.c21 _cleanup_(erase_and_freep) char *base64_encoded = NULL, *hashed = NULL; in add_pkcs11_encrypted_key()
37 r = hash_password(base64_encoded, &hashed); in add_pkcs11_encrypted_key()
44 … JSON_BUILD_PAIR("hashedPassword", JSON_BUILD_STRING(hashed)))); in add_pkcs11_encrypted_key()
Dhomework-fscrypt.c78 uint8_t hashed[512 / 8] = {}, hashed2[512 / 8] = {}; in calculate_key_descriptor() local
82 assert_se(SHA512(key, key_size, hashed) == hashed); in calculate_key_descriptor()
83 assert_se(SHA512(hashed, sizeof(hashed), hashed2) == hashed2); in calculate_key_descriptor()
Duser-record-util.c796 _cleanup_(erase_and_freep) char *hashed = NULL; in user_record_make_hashed_password()
798 r = hash_password(*i, &hashed); in user_record_make_hashed_password()
802 r = strv_consume(&np, TAKE_PTR(hashed)); in user_record_make_hashed_password()
/systemd-251/src/nss-systemd/
Duserdb-glue.c140 const char *hashed; in nss_pack_user_record_shadow() local
149 …assert_se(hashed = strv_isempty(hr->hashed_password) ? PASSWORD_LOCKED_AND_INVALID : hr->hashed_pa… in nss_pack_user_record_shadow()
150 required += strlen(hashed) + 1; in nss_pack_user_record_shadow()
173 strcpy(spwd->sp_pwdp, hashed); in nss_pack_user_record_shadow()
418 const char *hashed; in nss_pack_group_record_shadow() local
427 …assert_se(hashed = strv_isempty(hr->hashed_password) ? PASSWORD_LOCKED_AND_INVALID : hr->hashed_pa… in nss_pack_group_record_shadow()
428 required += strlen(hashed) + 1; in nss_pack_group_record_shadow()
440 strcpy(sgrp->sg_passwd, hashed); in nss_pack_group_record_shadow()
/systemd-251/test/fuzz/fuzz-unit-file/
Dgithub-191783 LoadCredential=passwd.hashed-password.root
/systemd-251/units/
Dsystemd-sysusers.service28 LoadCredential=passwd.hashed-password.root
Dsystemd-firstboot.service32 LoadCredential=passwd.hashed-password.root
/systemd-251/src/resolve/
Dresolved-dns-dnssec.c1659 static int nsec3_hashed_domain_format(const uint8_t *hashed, size_t hashed_size, const char *zone, … in nsec3_hashed_domain_format() argument
1663 assert(hashed); in nsec3_hashed_domain_format()
1668 l = base32hexmem(hashed, hashed_size, false); in nsec3_hashed_domain_format()
1681 uint8_t hashed[DNSSEC_HASH_SIZE_MAX]; in nsec3_hashed_domain_make() local
1689 hashed_size = dnssec_nsec3_hash(nsec3, domain, hashed); in nsec3_hashed_domain_make()
1693 return nsec3_hashed_domain_format(hashed, (size_t) hashed_size, zone, ret); in nsec3_hashed_domain_make()
Dresolvectl.c931 _cleanup_free_ char *hashed = NULL; in resolve_openpgp() local
945 r = string_hashsum_sha256(address, domain - 1 - address, &hashed); in resolve_openpgp()
949 strshorten(hashed, 56); in resolve_openpgp()
951 full = strjoina(hashed, "._openpgpkey.", domain); in resolve_openpgp()
959 hashed = mfree(hashed); in resolve_openpgp()
960 r = string_hashsum_sha224(address, domain - 1 - address, &hashed); in resolve_openpgp()
964 full = strjoina(hashed, "._openpgpkey.", domain); in resolve_openpgp()
/systemd-251/docs/
DCREDENTIALS.md324 will look for the credentials `passwd.hashed-password.<username>`,
326 configure the password (either in UNIX hashed form, or plaintext) or shell of
341 --set-credential=passwd.hashed-password.root:$(mkpasswd mysecret) \
366 … -fw_cfg name=opt/io.systemd.credentials/passwd.hashed-password.root,string=$(mkpasswd mysecret) \
DGROUP_RECORD.md65 `hashedPassword` → An array of strings with UNIX hashed passwords; see the
DCONTAINER_INTERFACE.md213 devices, for example hashed out of the container names. That way it is more
DRANDOM_SEEDS.md196 system token they are combined and hashed with SHA256 (in counter mode, to
DUSER_RECORD.md626 `hashedPassword` → An array of strings, each containing a hashed UNIX password
645 Base64-encoded and tested against the specified UNIX hashed password. The
/systemd-251/
DTODO811 invocation id, that is derived from process creds, specifically a hashed
DNEWS1479 passwd.hashed-password.<user> and passwd.plaintext-password.<user>
1481 hashed form, or literally). By default these credentials are inherited
1837 to the main user and group records. Thus, hashed passwords managed by
1860 with its hashed password) is dropped into /run/host/userdb/. These
3662 also gained a new switch --root-password-hashed= which is like
3663 --root-password= but accepts a pre-hashed UNIX password as