Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 120) sorted by relevance

12345

/systemd-251/src/home/
Dhomectl-recovery-key.c68 static int add_secret(JsonVariant **v, const char *password) { in add_secret() argument
74 assert(password); in add_secret()
83 r = strv_extend(&passwords, password); in add_secret()
105 _cleanup_(erase_and_freep) char *password = NULL, *hashed = NULL; in identity_add_recovery_key()
111 r = make_recovery_key(&password); in identity_add_recovery_key()
116 r = hash_password(password, &hashed); in identity_add_recovery_key()
131 r = add_secret(v, password); in identity_add_recovery_key()
147 fputs(password, stdout); in identity_add_recovery_key()
162 … (void) print_qrcode(stderr, "You may optionally scan the recovery key off screen", password); in identity_add_recovery_key()
Dhomework-fscrypt.c91 const char *password, in fscrypt_slot_try_one() argument
107 assert(password); in fscrypt_slot_try_one()
128 password, strlen(password), in fscrypt_slot_try_one()
213 char **password, in fscrypt_setup() argument
262 FOREACH_POINTER(list, cache->pkcs11_passwords, cache->fido2_passwords, password) { in fscrypt_setup()
318 h->password, in home_setup_fscrypt()
400 const char *password, in fscrypt_slot_set() argument
417 password, strlen(password), in fscrypt_slot_set()
658 h->password, in home_passwd_fscrypt()
Duser-record-pwquality.c38 STRV_FOREACH(pp, secret->password) { in user_record_quality_check_password()
48 STRV_FOREACH(old, secret->password) { in user_record_quality_check_password()
/systemd-251/docs/
DPASSWORD_AGENTS.md10password agents which can be used to query the user for system-level passwords or passphrases. The…
15 …man-pages/man1/wall.1.html) agent which sends wall messages as soon as a password shall be entered.
21 * Create an inotify watch on /run/systemd/ask-password, watch for `IN_CLOSE_WRITE|IN_MOVED_TO`
31 * Make sure to hide a password query dialog as soon as a) the `ask.xxxx` file is deleted, watch thi…
32password 1 /path/to/socket`" or "`/usr/bin/pkexec /lib/systemd/systemd-reply-password 0 /path/to/s…
33 …o the socket consisting of the password string either prefixed with "`+`" or with "`-`" depending …
35 Again, it is essential that you stop showing the password box/notification/status icon if the `ask.…
37 It may happen that multiple password entries are pending at the same time. Your agent needs to be a…
39 …th manually invoking the "`systemd-ask-password`" tool on the command line. Pass `--no-tty` to ens…
41password` directory and spawn the agent as soon as that directory becomes non-empty. In fact, the …
/systemd-251/src/shared/
Dlibcrypt-util.h7 int hash_password_full(const char *password, void **cd_data, int *cd_size, char **ret);
8 static inline int hash_password(const char *password, char **ret) { in hash_password() argument
9 return hash_password_full(password, NULL, NULL, ret); in hash_password()
12 int test_password_one(const char *hashed_password, const char *password);
13 int test_password_many(char **hashed_password, const char *password);
Dlibcrypt-util.c140 int hash_password_full(const char *password, void **cd_data, int *cd_size, char **ret) { in hash_password_full() argument
153 p = crypt_ra(password, salt, cd_data ?: &_cd_data, cd_size ?: &_cd_size); in hash_password_full()
182 int test_password_one(const char *hashed_password, const char *password) { in test_password_one() argument
188 k = crypt_ra(password, hashed_password, &cd_data, &cd_size); in test_password_one()
199 int test_password_many(char **hashed_password, const char *password) { in test_password_many() argument
203 r = test_password_one(*hpw, password); in test_password_many()
Dpwquality-util.h11 extern int (*sym_pwquality_check)(pwquality_settings_t *pwq, const char *password, const char *oldp…
14 extern int (*sym_pwquality_generate)(pwquality_settings_t *pwq, int entropy_bits, char **password);
27 int quality_check_password(const char *password, const char *username, char **ret_error);
35 static inline int quality_check_password(const char *password, const char *username, char **ret_err… in quality_check_password() argument
Dpwquality-util.c17 int (*sym_pwquality_check)(pwquality_settings_t *pwq, const char *password, const char *oldpassword…
20 int (*sym_pwquality_generate)(pwquality_settings_t *pwq, int entropy_bits, char **password);
138 int quality_check_password(const char *password, const char *username, char **ret_error) { in quality_check_password() argument
144 assert(password); in quality_check_password()
152 r = sym_pwquality_check(pwq, password, NULL, username, &auxerror); in quality_check_password()
/systemd-251/units/
Dsystemd-ask-password-wall.service12 Documentation=man:systemd-ask-password-wall.service(8)
16 …l stop systemd-ask-password-console.path systemd-ask-password-console.service systemd-ask-password
17 ExecStart=systemd-tty-ask-password-agent --wall
Dsystemd-sysusers.service25 # Optionally, pick up a root password and shell for the root user from a
28 LoadCredential=passwd.hashed-password.root
29 LoadCredential=passwd.plaintext-password.root
Dsystemd-firstboot.service24 ExecStart=systemd-firstboot --prompt-locale --prompt-timezone --prompt-root-password
32 LoadCredential=passwd.hashed-password.root
33 LoadCredential=passwd.plaintext-password.root
Dsystemd-ask-password-wall.path12 Documentation=man:systemd-ask-password-wall.path(8)
18 DirectoryNotEmpty=/run/systemd/ask-password
Dsystemd-ask-password-console.path12 Documentation=man:systemd-ask-password-console.path(8)
20 DirectoryNotEmpty=/run/systemd/ask-password
/systemd-251/src/cryptenroll/
Dcryptenroll-recovery.c17 _cleanup_(erase_and_freep) char *password = NULL; in enroll_recovery()
28 r = make_recovery_key(&password); in enroll_recovery()
41 password, in enroll_recovery()
42 strlen(password)); in enroll_recovery()
55 fputs(password, stdout); in enroll_recovery()
70 … (void) print_qrcode(stderr, "You may optionally scan the recovery key off screen", password); in enroll_recovery()
Dmeson.build7 'cryptenroll-password.c',
8 'cryptenroll-password.h',
/systemd-251/src/basic/
Drecovery-key.c21 int normalize_recovery_key(const char *password, char **ret) { in normalize_recovery_key() argument
25 assert(password); in normalize_recovery_key()
28 l = strlen(password); in normalize_recovery_key()
50 if (i > 0 && i % 4 == 0 && password[k-1] != '-') in normalize_recovery_key()
54 a = decode_modhex_char(password[k]); in normalize_recovery_key()
57 b = decode_modhex_char(password[k+1]); in normalize_recovery_key()
Duser-util.h138 static inline bool hashed_password_is_locked_or_invalid(const char *password) { in hashed_password_is_locked_or_invalid() argument
139 return password && password[0] != '$'; in hashed_password_is_locked_or_invalid()
/systemd-251/shell-completion/bash/
Dhomectl42 --no-pager --no-legend --no-ask-password
69 --password-hint
70 --enforce-password-policy
71 --password-change-now
72 --password-change-min
73 --password-change-max
74 --password-change-warn
75 --password-change-inactive
128 …--locked|--enforce-password-policy|--password-change-now|--luks-discard|--luks-offline-discard|--n…
/systemd-251/shell-completion/zsh/
D_systemd1 …cat systemd-ask-password systemd-cgls systemd-cgtop systemd-detect-virt systemd-machine-id-setup s…
6 systemd-ask-password)
69 systemd-tty-ask-password-agent)
73 '--list[Lists all currently pending system password requests.]' \
74 …'--query[Process all currently pending system password requests by querying the user on the callin…
75 '--watch[Continuously process password requests.]' \
76 '--wall[Forward password requests to wall(1).]' \
/systemd-251/src/cryptsetup/cryptsetup-tokens/
Dcryptsetup-token-systemd-pkcs11.c29 char **password, /* freed by cryptsetup_token_buffer_free */ in cryptsetup_token_open_pin() argument
44 return acquire_luks2_key(cd, json, usrptr, pin, pin_size, password, password_len); in cryptsetup_token_open_pin()
63 char **password, /* freed by cryptsetup_token_buffer_free */ in cryptsetup_token_open() argument
67 return cryptsetup_token_open_pin(cd, token, NULL, 0, password, password_len, usrptr); in cryptsetup_token_open()
Dcryptsetup-token-systemd-fido2.c29 char **password, /* freed by cryptsetup_token_buffer_free */ in cryptsetup_token_open_pin() argument
56 …return acquire_luks2_key(cd, json, (const char *)usrptr, pin_string ?: pin, password, password_len… in cryptsetup_token_open_pin()
75 char **password, /* freed by cryptsetup_token_buffer_free */ in cryptsetup_token_open() argument
79 return cryptsetup_token_open_pin(cd, token, NULL, 0, password, password_len, usrptr); in cryptsetup_token_open()
Dcryptsetup-token.h9 char **password, size_t *password_len, void *usrptr);
13 char **password, size_t *password_len, void *usrptr);
/systemd-251/factory/etc/pam.d/
Dsystem-auth15 -password sufficient pam_systemd_home.so
16 password sufficient pam_unix.so sha512 shadow try_first_pass use_authtok
17 password required pam_deny.so
/systemd-251/src/firstboot/
Dfirstboot.c727 static int write_root_passwd(const char *passwd_path, const char *password, const char *shell) { in write_root_passwd() argument
732 assert(password); in write_root_passwd()
749 i->pw_passwd = (char *) password; in write_root_passwd()
764 .pw_passwd = (char *) password, in write_root_passwd()
867 const char *password, *hashed_password; in process_root_args() local
927 password = PASSWORD_SEE_SHADOW; in process_root_args()
934 password = PASSWORD_SEE_SHADOW; in process_root_args()
938 password = hashed_password = PASSWORD_NONE; in process_root_args()
940 password = hashed_password = PASSWORD_LOCKED_AND_INVALID; in process_root_args()
942 r = write_root_passwd(etc_passwd, password, arg_root_shell); in process_root_args()
/systemd-251/test/fuzz/fuzz-unit-file/
Dsystemd-ask-password-console.path13 Documentation=man:systemd-ask-password-console.service(8)
21 DirectoryNotEmpty=/run/systemd/ask-password

12345