Home
last modified time | relevance | path

Searched refs:json (Results 1 – 25 of 69) sorted by relevance

123

/systemd-251/src/home/ !
Duser-record-util.c39 if (h->json) in user_record_synthesize()
82 r = json_build(&h->json, in user_record_synthesize()
117 if (g->json) in group_record_synthesize()
142 r = json_build(&g->json, in group_record_synthesize()
189 if (!host->json || !embedded->json) in user_record_reconcile()
240 extended = json_variant_ref(embedded->json); in user_record_reconcile()
242 e = json_variant_by_key(host->json, "binding"); in user_record_reconcile()
291 if (!h->json) in user_record_add_binding()
349 binding = json_variant_ref(json_variant_by_key(h->json, "binding")); in user_record_add_binding()
369 r = json_variant_set_field(&h->json, "binding", binding); in user_record_add_binding()
[all …]
Dhomed-bus.c10 const char *json; in bus_message_read_secret() local
15 r = sd_bus_message_read(m, "s", &json); in bus_message_read_secret()
19 r = json_parse(json, JSON_PARSE_SENSITIVE, &v, &line, &column); in bus_message_read_secret()
43 const char *json; in bus_message_read_home_record() local
48 r = sd_bus_message_read(m, "s", &json); in bus_message_read_home_record()
52 r = json_parse(json, JSON_PARSE_SENSITIVE, &v, &line, &column); in bus_message_read_home_record()
Duser-record-sign.c21 j = json_variant_ref(reduced->json); in user_record_signable_json()
85 v = json_variant_ref(ur->json); in user_record_sign()
115 array = json_variant_by_key(ur->json, "signature"); in user_record_verify()
168 array = json_variant_by_key(ur->json, "signature"); in user_record_has_signature()
Dpam_systemd_home.c103 const char *json = NULL; in acquire_user_record() local
137 r = pam_get_data(handle, homed_field, (const void**) &json); in acquire_user_record()
142 if (r == PAM_SUCCESS && json) { in acquire_user_record()
145 if (json == POINTER_MAX) in acquire_user_record()
171 r = sd_bus_message_read(reply, "sbo", &json, NULL, NULL); in acquire_user_record()
177 json_copy = strdup(json); in acquire_user_record()
191 json_copy = strdup(json); in acquire_user_record()
209 r = json_parse(json, JSON_PARSE_SENSITIVE, &v, NULL, NULL); in acquire_user_record()
Dhomed-manager-bus.c199 _cleanup_free_ char *json = NULL, *path = NULL; in method_get_user_record_by_name() local
219 r = bus_home_get_record_json(h, message, &json, &incomplete); in method_get_user_record_by_name()
229 json, in method_get_user_record_by_name()
239 _cleanup_free_ char *json = NULL, *path = NULL; in method_get_user_record_by_uid() local
259 r = bus_home_get_record_json(h, message, &json, &incomplete); in method_get_user_record_by_uid()
268 json, in method_get_user_record_by_uid()
/systemd-251/src/cryptsetup/cryptsetup-tokens/ !
Dcryptsetup-token-systemd-fido2.c34 const char *json; in cryptsetup_token_open_pin() local
41 r = crypt_token_json_get(cd, token, &json); in cryptsetup_token_open_pin()
43 assert(json); in cryptsetup_token_open_pin()
56 …return acquire_luks2_key(cd, json, (const char *)usrptr, pin_string ?: pin, password, password_len… in cryptsetup_token_open_pin()
96 … const char *json /* validated 'systemd-tpm2' token if cryptsetup_token_validate is defined */) { in cryptsetup_token_dump() argument
105 assert(json); in cryptsetup_token_dump()
107 r = parse_luks2_fido2_data(cd, json, &rp_id, &salt, &salt_size, &cid, &cid_size, &required); in cryptsetup_token_dump()
163 … const char *json /* contains valid 'type' and 'keyslots' fields. 'type' is 'systemd-tpm2' */) { in cryptsetup_token_validate() argument
169 assert(json); in cryptsetup_token_validate()
171 r = json_parse(json, 0, &v, NULL, NULL); in cryptsetup_token_validate()
Dcryptsetup-token-systemd-pkcs11.c33 const char *json; in cryptsetup_token_open_pin() local
40 r = crypt_token_json_get(cd, token, &json); in cryptsetup_token_open_pin()
42 assert(json); in cryptsetup_token_open_pin()
44 return acquire_luks2_key(cd, json, usrptr, pin, pin_size, password, password_len); in cryptsetup_token_open_pin()
84 … const char *json /* validated 'systemd-pkcs11' token if cryptsetup_token_validate is defined */) { in cryptsetup_token_dump() argument
91 r = parse_luks2_pkcs11_data(cd, json, &pkcs11_uri, &pkcs11_key, &pkcs11_key_size); in cryptsetup_token_dump()
111 … const char *json /* contains valid 'type' and 'keyslots' fields. 'type' is 'systemd-pkcs11' */) { in cryptsetup_token_validate() argument
117 r = json_parse(json, 0, &v, NULL, NULL); in cryptsetup_token_validate()
Dcryptsetup-token-systemd-tpm2.c59 const char *json; in cryptsetup_token_open() local
76 r = crypt_token_json_get(cd, token, &json); in cryptsetup_token_open()
78 assert(json); in cryptsetup_token_open()
84 …r = parse_luks2_tpm2_data(json, params.search_pcr_mask, &pcr_mask, &pcr_bank, &primary_alg, &base6… in cryptsetup_token_open()
139 … const char *json /* validated 'systemd-tpm2' token if cryptsetup_token_validate is defined */) { in cryptsetup_token_dump() argument
150 assert(json); in cryptsetup_token_dump()
152 …r = parse_luks2_tpm2_data(json, UINT32_MAX, &pcr_mask, &pcr_bank, &primary_alg, &base64_blob, &hex… in cryptsetup_token_dump()
190 … const char *json /* contains valid 'type' and 'keyslots' fields. 'type' is 'systemd-tpm2' */) { in cryptsetup_token_validate() argument
196 assert(json); in cryptsetup_token_validate()
198 r = json_parse(json, 0, &v, NULL, NULL); in cryptsetup_token_validate()
Dluks2-fido2.c14 const char *json, in acquire_luks2_key() argument
32 r = parse_luks2_fido2_data(cd, json, &rp_id, &salt, &salt_size, &cid, &cid_size, &required); in acquire_luks2_key()
74 const char *json, in parse_luks2_fido2_data() argument
90 assert(json); in parse_luks2_fido2_data()
98 r = json_parse(json, 0, &v, NULL, NULL); in parse_luks2_fido2_data()
Dluks2-pkcs11.c177 const char *json, in acquire_luks2_key() argument
192 assert(json); in acquire_luks2_key()
196 r = parse_luks2_pkcs11_data(cd, json, &pkcs11_uri, &encrypted_key, &encrypted_key_size); in acquire_luks2_key()
229 const char *json, in parse_luks2_pkcs11_data() argument
241 assert(json); in parse_luks2_pkcs11_data()
246 r = json_parse(json, 0, &v, NULL, NULL); in parse_luks2_pkcs11_data()
Dluks2-pkcs11.h9 const char *json,
18 const char *json,
Dluks2-fido2.h10 const char *json,
18 const char *json,
Dluks2-tpm2.c66 const char *json, in parse_luks2_tpm2_data() argument
83 assert(json); in parse_luks2_tpm2_data()
90 r = json_parse(json, 0, &v, NULL, NULL); in parse_luks2_tpm2_data()
Dcryptsetup-token.h15 void cryptsetup_token_dump(struct crypt_device *cd, const char *json);
17 int cryptsetup_token_validate(struct crypt_device *cd, const char *json);
/systemd-251/src/shared/ !
Dgroup-record.c39 json_variant_unref(g->json); in group_record_free()
181 return json_log_oom(h->json, json_flags); in group_record_augment()
222 assert(!h->json); in group_record_load()
229 r = user_group_record_mangle(v, load_flags, &h->json, &h->mask); in group_record_load()
233 r = json_dispatch(h->json, group_dispatch_table, NULL, json_flags, h); in group_record_load()
240 … r = dispatch_per_machine("perMachine", json_variant_by_key(h->json, "perMachine"), json_flags, h); in group_record_load()
244 r = dispatch_binding("binding", json_variant_by_key(h->json, "binding"), json_flags, h); in group_record_load()
248 r = dispatch_status("status", json_variant_by_key(h->json, "status"), json_flags, h); in group_record_load()
253 …return json_log(h->json, json_flags, SYNTHETIC_ERRNO(EINVAL), "Group name field missing, refusing.… in group_record_load()
341 r = group_record_load(c, h->json, flags); in group_record_clone()
Dcryptsetup-util.h51 extern int (*sym_crypt_token_json_get)(struct crypt_device *cd, int token, const char **json);
52 extern int (*sym_crypt_token_json_set)(struct crypt_device *cd, int token, const char *json);
/systemd-251/shell-completion/zsh/ !
D_sd_outputmodes5 …cise short-precise short-monotonic short-unix verbose export json json-pretty json-sse json-seq ca…
D_networkctl45 _json_forms=( $(networkctl --json=help 2>/dev/null) )
55 '--json[Shows output formatted as JSON]:format:_networkctl_get_json' \
D_busctl69 _json_forms=( $(__busctl --json=help; echo help) )
279 '--json=[Show result values in long format]:format:_busctl_get_json' \
280 '-j[Show pretty json in interactive sessions, short json otherwise]' \
/systemd-251/test/units/ !
Dtestsuite-65.sh121 cat <<EOF >/tmp/testfile.json
578 --security-policy=/tmp/testfile.json \
583 --security-policy=/tmp/testfile.json \
590 --security-policy=/tmp/testfile.json \
596 --security-policy=/tmp/testfile.json \
604 …systemd-analyze inspect-elf --json=short /lib/systemd/systemd | grep -q -F '"elfType":"executable"'
/systemd-251/src/nspawn/ !
Dnspawn-bind-user.c116 p = json_variant_by_key(u->json, "privileged"); in convert_user()
413 if (!json_variant_is_blank_object(shadow_group->json)) { in bind_user_setup()
416 shadow_group->json, in bind_user_setup()
432 stripped_group->json, in bind_user_setup()
445 if (!json_variant_is_blank_object(shadow_user->json)) { in bind_user_setup()
448 shadow_user->json, in bind_user_setup()
464 stripped_user->json, in bind_user_setup()
/systemd-251/shell-completion/bash/ !
Dsystemd-analyze156 …--host -M --machine --offline --threshold --security-policy --json=off --json=pretty --json=short …
183 comps='--help --version --json=off --json=pretty --json=short'
Dnetworkctl36 [ARG]='-n --lines --json'
56 --json)
57 comps=$(networkctl --json=help | sort 2>/dev/null)
Dhostnamectl39 [ARG]='-H --host -M --machine --json'
50 --json)
51 comps=$( hostnamectl --json=help 2>/dev/null )
/systemd-251/src/fuzz/ !
Dfuzz-bootspec-gen.py5 import json
21 print(json.dumps(data, indent=4))

123