/systemd-251/src/home/ ! |
D | user-record-util.c | 39 if (h->json) in user_record_synthesize() 82 r = json_build(&h->json, in user_record_synthesize() 117 if (g->json) in group_record_synthesize() 142 r = json_build(&g->json, in group_record_synthesize() 189 if (!host->json || !embedded->json) in user_record_reconcile() 240 extended = json_variant_ref(embedded->json); in user_record_reconcile() 242 e = json_variant_by_key(host->json, "binding"); in user_record_reconcile() 291 if (!h->json) in user_record_add_binding() 349 binding = json_variant_ref(json_variant_by_key(h->json, "binding")); in user_record_add_binding() 369 r = json_variant_set_field(&h->json, "binding", binding); in user_record_add_binding() [all …]
|
D | homed-bus.c | 10 const char *json; in bus_message_read_secret() local 15 r = sd_bus_message_read(m, "s", &json); in bus_message_read_secret() 19 r = json_parse(json, JSON_PARSE_SENSITIVE, &v, &line, &column); in bus_message_read_secret() 43 const char *json; in bus_message_read_home_record() local 48 r = sd_bus_message_read(m, "s", &json); in bus_message_read_home_record() 52 r = json_parse(json, JSON_PARSE_SENSITIVE, &v, &line, &column); in bus_message_read_home_record()
|
D | user-record-sign.c | 21 j = json_variant_ref(reduced->json); in user_record_signable_json() 85 v = json_variant_ref(ur->json); in user_record_sign() 115 array = json_variant_by_key(ur->json, "signature"); in user_record_verify() 168 array = json_variant_by_key(ur->json, "signature"); in user_record_has_signature()
|
D | pam_systemd_home.c | 103 const char *json = NULL; in acquire_user_record() local 137 r = pam_get_data(handle, homed_field, (const void**) &json); in acquire_user_record() 142 if (r == PAM_SUCCESS && json) { in acquire_user_record() 145 if (json == POINTER_MAX) in acquire_user_record() 171 r = sd_bus_message_read(reply, "sbo", &json, NULL, NULL); in acquire_user_record() 177 json_copy = strdup(json); in acquire_user_record() 191 json_copy = strdup(json); in acquire_user_record() 209 r = json_parse(json, JSON_PARSE_SENSITIVE, &v, NULL, NULL); in acquire_user_record()
|
D | homed-manager-bus.c | 199 _cleanup_free_ char *json = NULL, *path = NULL; in method_get_user_record_by_name() local 219 r = bus_home_get_record_json(h, message, &json, &incomplete); in method_get_user_record_by_name() 229 json, in method_get_user_record_by_name() 239 _cleanup_free_ char *json = NULL, *path = NULL; in method_get_user_record_by_uid() local 259 r = bus_home_get_record_json(h, message, &json, &incomplete); in method_get_user_record_by_uid() 268 json, in method_get_user_record_by_uid()
|
/systemd-251/src/cryptsetup/cryptsetup-tokens/ ! |
D | cryptsetup-token-systemd-fido2.c | 34 const char *json; in cryptsetup_token_open_pin() local 41 r = crypt_token_json_get(cd, token, &json); in cryptsetup_token_open_pin() 43 assert(json); in cryptsetup_token_open_pin() 56 …return acquire_luks2_key(cd, json, (const char *)usrptr, pin_string ?: pin, password, password_len… in cryptsetup_token_open_pin() 96 … const char *json /* validated 'systemd-tpm2' token if cryptsetup_token_validate is defined */) { in cryptsetup_token_dump() argument 105 assert(json); in cryptsetup_token_dump() 107 r = parse_luks2_fido2_data(cd, json, &rp_id, &salt, &salt_size, &cid, &cid_size, &required); in cryptsetup_token_dump() 163 … const char *json /* contains valid 'type' and 'keyslots' fields. 'type' is 'systemd-tpm2' */) { in cryptsetup_token_validate() argument 169 assert(json); in cryptsetup_token_validate() 171 r = json_parse(json, 0, &v, NULL, NULL); in cryptsetup_token_validate()
|
D | cryptsetup-token-systemd-pkcs11.c | 33 const char *json; in cryptsetup_token_open_pin() local 40 r = crypt_token_json_get(cd, token, &json); in cryptsetup_token_open_pin() 42 assert(json); in cryptsetup_token_open_pin() 44 return acquire_luks2_key(cd, json, usrptr, pin, pin_size, password, password_len); in cryptsetup_token_open_pin() 84 … const char *json /* validated 'systemd-pkcs11' token if cryptsetup_token_validate is defined */) { in cryptsetup_token_dump() argument 91 r = parse_luks2_pkcs11_data(cd, json, &pkcs11_uri, &pkcs11_key, &pkcs11_key_size); in cryptsetup_token_dump() 111 … const char *json /* contains valid 'type' and 'keyslots' fields. 'type' is 'systemd-pkcs11' */) { in cryptsetup_token_validate() argument 117 r = json_parse(json, 0, &v, NULL, NULL); in cryptsetup_token_validate()
|
D | cryptsetup-token-systemd-tpm2.c | 59 const char *json; in cryptsetup_token_open() local 76 r = crypt_token_json_get(cd, token, &json); in cryptsetup_token_open() 78 assert(json); in cryptsetup_token_open() 84 …r = parse_luks2_tpm2_data(json, params.search_pcr_mask, &pcr_mask, &pcr_bank, &primary_alg, &base6… in cryptsetup_token_open() 139 … const char *json /* validated 'systemd-tpm2' token if cryptsetup_token_validate is defined */) { in cryptsetup_token_dump() argument 150 assert(json); in cryptsetup_token_dump() 152 …r = parse_luks2_tpm2_data(json, UINT32_MAX, &pcr_mask, &pcr_bank, &primary_alg, &base64_blob, &hex… in cryptsetup_token_dump() 190 … const char *json /* contains valid 'type' and 'keyslots' fields. 'type' is 'systemd-tpm2' */) { in cryptsetup_token_validate() argument 196 assert(json); in cryptsetup_token_validate() 198 r = json_parse(json, 0, &v, NULL, NULL); in cryptsetup_token_validate()
|
D | luks2-fido2.c | 14 const char *json, in acquire_luks2_key() argument 32 r = parse_luks2_fido2_data(cd, json, &rp_id, &salt, &salt_size, &cid, &cid_size, &required); in acquire_luks2_key() 74 const char *json, in parse_luks2_fido2_data() argument 90 assert(json); in parse_luks2_fido2_data() 98 r = json_parse(json, 0, &v, NULL, NULL); in parse_luks2_fido2_data()
|
D | luks2-pkcs11.c | 177 const char *json, in acquire_luks2_key() argument 192 assert(json); in acquire_luks2_key() 196 r = parse_luks2_pkcs11_data(cd, json, &pkcs11_uri, &encrypted_key, &encrypted_key_size); in acquire_luks2_key() 229 const char *json, in parse_luks2_pkcs11_data() argument 241 assert(json); in parse_luks2_pkcs11_data() 246 r = json_parse(json, 0, &v, NULL, NULL); in parse_luks2_pkcs11_data()
|
D | luks2-pkcs11.h | 9 const char *json, 18 const char *json,
|
D | luks2-fido2.h | 10 const char *json, 18 const char *json,
|
D | luks2-tpm2.c | 66 const char *json, in parse_luks2_tpm2_data() argument 83 assert(json); in parse_luks2_tpm2_data() 90 r = json_parse(json, 0, &v, NULL, NULL); in parse_luks2_tpm2_data()
|
D | cryptsetup-token.h | 15 void cryptsetup_token_dump(struct crypt_device *cd, const char *json); 17 int cryptsetup_token_validate(struct crypt_device *cd, const char *json);
|
/systemd-251/src/shared/ ! |
D | group-record.c | 39 json_variant_unref(g->json); in group_record_free() 181 return json_log_oom(h->json, json_flags); in group_record_augment() 222 assert(!h->json); in group_record_load() 229 r = user_group_record_mangle(v, load_flags, &h->json, &h->mask); in group_record_load() 233 r = json_dispatch(h->json, group_dispatch_table, NULL, json_flags, h); in group_record_load() 240 … r = dispatch_per_machine("perMachine", json_variant_by_key(h->json, "perMachine"), json_flags, h); in group_record_load() 244 r = dispatch_binding("binding", json_variant_by_key(h->json, "binding"), json_flags, h); in group_record_load() 248 r = dispatch_status("status", json_variant_by_key(h->json, "status"), json_flags, h); in group_record_load() 253 …return json_log(h->json, json_flags, SYNTHETIC_ERRNO(EINVAL), "Group name field missing, refusing.… in group_record_load() 341 r = group_record_load(c, h->json, flags); in group_record_clone()
|
D | cryptsetup-util.h | 51 extern int (*sym_crypt_token_json_get)(struct crypt_device *cd, int token, const char **json); 52 extern int (*sym_crypt_token_json_set)(struct crypt_device *cd, int token, const char *json);
|
/systemd-251/shell-completion/zsh/ ! |
D | _sd_outputmodes | 5 …cise short-precise short-monotonic short-unix verbose export json json-pretty json-sse json-seq ca…
|
D | _networkctl | 45 _json_forms=( $(networkctl --json=help 2>/dev/null) ) 55 '--json[Shows output formatted as JSON]:format:_networkctl_get_json' \
|
D | _busctl | 69 _json_forms=( $(__busctl --json=help; echo help) ) 279 '--json=[Show result values in long format]:format:_busctl_get_json' \ 280 '-j[Show pretty json in interactive sessions, short json otherwise]' \
|
/systemd-251/test/units/ ! |
D | testsuite-65.sh | 121 cat <<EOF >/tmp/testfile.json 578 --security-policy=/tmp/testfile.json \ 583 --security-policy=/tmp/testfile.json \ 590 --security-policy=/tmp/testfile.json \ 596 --security-policy=/tmp/testfile.json \ 604 …systemd-analyze inspect-elf --json=short /lib/systemd/systemd | grep -q -F '"elfType":"executable"'
|
/systemd-251/src/nspawn/ ! |
D | nspawn-bind-user.c | 116 p = json_variant_by_key(u->json, "privileged"); in convert_user() 413 if (!json_variant_is_blank_object(shadow_group->json)) { in bind_user_setup() 416 shadow_group->json, in bind_user_setup() 432 stripped_group->json, in bind_user_setup() 445 if (!json_variant_is_blank_object(shadow_user->json)) { in bind_user_setup() 448 shadow_user->json, in bind_user_setup() 464 stripped_user->json, in bind_user_setup()
|
/systemd-251/shell-completion/bash/ ! |
D | systemd-analyze | 156 …--host -M --machine --offline --threshold --security-policy --json=off --json=pretty --json=short … 183 comps='--help --version --json=off --json=pretty --json=short'
|
D | networkctl | 36 [ARG]='-n --lines --json' 56 --json) 57 comps=$(networkctl --json=help | sort 2>/dev/null)
|
D | hostnamectl | 39 [ARG]='-H --host -M --machine --json' 50 --json) 51 comps=$( hostnamectl --json=help 2>/dev/null )
|
/systemd-251/src/fuzz/ ! |
D | fuzz-bootspec-gen.py | 5 import json 21 print(json.dumps(data, indent=4))
|