/systemd-251/src/home/ |
D | homectl-recovery-key.c | 68 static int add_secret(JsonVariant **v, const char *password) { in add_secret() argument 74 assert(password); in add_secret() 83 r = strv_extend(&passwords, password); in add_secret() 105 _cleanup_(erase_and_freep) char *password = NULL, *hashed = NULL; in identity_add_recovery_key() 111 r = make_recovery_key(&password); in identity_add_recovery_key() 116 r = hash_password(password, &hashed); in identity_add_recovery_key() 131 r = add_secret(v, password); in identity_add_recovery_key() 147 fputs(password, stdout); in identity_add_recovery_key() 162 … (void) print_qrcode(stderr, "You may optionally scan the recovery key off screen", password); in identity_add_recovery_key()
|
D | homework-fscrypt.c | 91 const char *password, in fscrypt_slot_try_one() argument 107 assert(password); in fscrypt_slot_try_one() 128 password, strlen(password), in fscrypt_slot_try_one() 213 char **password, in fscrypt_setup() argument 262 FOREACH_POINTER(list, cache->pkcs11_passwords, cache->fido2_passwords, password) { in fscrypt_setup() 318 h->password, in home_setup_fscrypt() 400 const char *password, in fscrypt_slot_set() argument 417 password, strlen(password), in fscrypt_slot_set() 658 h->password, in home_passwd_fscrypt()
|
D | user-record-pwquality.c | 38 STRV_FOREACH(pp, secret->password) { in user_record_quality_check_password() 48 STRV_FOREACH(old, secret->password) { in user_record_quality_check_password()
|
/systemd-251/docs/ |
D | PASSWORD_AGENTS.md | 10 …password agents which can be used to query the user for system-level passwords or passphrases. The… 15 …man-pages/man1/wall.1.html) agent which sends wall messages as soon as a password shall be entered. 21 * Create an inotify watch on /run/systemd/ask-password, watch for `IN_CLOSE_WRITE|IN_MOVED_TO` 31 * Make sure to hide a password query dialog as soon as a) the `ask.xxxx` file is deleted, watch thi… 32 …password 1 /path/to/socket`" or "`/usr/bin/pkexec /lib/systemd/systemd-reply-password 0 /path/to/s… 33 …o the socket consisting of the password string either prefixed with "`+`" or with "`-`" depending … 35 Again, it is essential that you stop showing the password box/notification/status icon if the `ask.… 37 It may happen that multiple password entries are pending at the same time. Your agent needs to be a… 39 …th manually invoking the "`systemd-ask-password`" tool on the command line. Pass `--no-tty` to ens… 41 …password` directory and spawn the agent as soon as that directory becomes non-empty. In fact, the …
|
/systemd-251/src/shared/ |
D | libcrypt-util.h | 7 int hash_password_full(const char *password, void **cd_data, int *cd_size, char **ret); 8 static inline int hash_password(const char *password, char **ret) { in hash_password() argument 9 return hash_password_full(password, NULL, NULL, ret); in hash_password() 12 int test_password_one(const char *hashed_password, const char *password); 13 int test_password_many(char **hashed_password, const char *password);
|
D | libcrypt-util.c | 140 int hash_password_full(const char *password, void **cd_data, int *cd_size, char **ret) { in hash_password_full() argument 153 p = crypt_ra(password, salt, cd_data ?: &_cd_data, cd_size ?: &_cd_size); in hash_password_full() 182 int test_password_one(const char *hashed_password, const char *password) { in test_password_one() argument 188 k = crypt_ra(password, hashed_password, &cd_data, &cd_size); in test_password_one() 199 int test_password_many(char **hashed_password, const char *password) { in test_password_many() argument 203 r = test_password_one(*hpw, password); in test_password_many()
|
D | pwquality-util.h | 11 extern int (*sym_pwquality_check)(pwquality_settings_t *pwq, const char *password, const char *oldp… 14 extern int (*sym_pwquality_generate)(pwquality_settings_t *pwq, int entropy_bits, char **password); 27 int quality_check_password(const char *password, const char *username, char **ret_error); 35 static inline int quality_check_password(const char *password, const char *username, char **ret_err… in quality_check_password() argument
|
D | pwquality-util.c | 17 int (*sym_pwquality_check)(pwquality_settings_t *pwq, const char *password, const char *oldpassword… 20 int (*sym_pwquality_generate)(pwquality_settings_t *pwq, int entropy_bits, char **password); 138 int quality_check_password(const char *password, const char *username, char **ret_error) { in quality_check_password() argument 144 assert(password); in quality_check_password() 152 r = sym_pwquality_check(pwq, password, NULL, username, &auxerror); in quality_check_password()
|
/systemd-251/units/ |
D | systemd-ask-password-wall.service | 12 Documentation=man:systemd-ask-password-wall.service(8) 16 …l stop systemd-ask-password-console.path systemd-ask-password-console.service systemd-ask-password… 17 ExecStart=systemd-tty-ask-password-agent --wall
|
D | systemd-sysusers.service | 25 # Optionally, pick up a root password and shell for the root user from a 28 LoadCredential=passwd.hashed-password.root 29 LoadCredential=passwd.plaintext-password.root
|
D | systemd-firstboot.service | 24 ExecStart=systemd-firstboot --prompt-locale --prompt-timezone --prompt-root-password 32 LoadCredential=passwd.hashed-password.root 33 LoadCredential=passwd.plaintext-password.root
|
D | systemd-ask-password-wall.path | 12 Documentation=man:systemd-ask-password-wall.path(8) 18 DirectoryNotEmpty=/run/systemd/ask-password
|
D | systemd-ask-password-console.path | 12 Documentation=man:systemd-ask-password-console.path(8) 20 DirectoryNotEmpty=/run/systemd/ask-password
|
/systemd-251/src/cryptenroll/ |
D | cryptenroll-recovery.c | 17 _cleanup_(erase_and_freep) char *password = NULL; in enroll_recovery() 28 r = make_recovery_key(&password); in enroll_recovery() 41 password, in enroll_recovery() 42 strlen(password)); in enroll_recovery() 55 fputs(password, stdout); in enroll_recovery() 70 … (void) print_qrcode(stderr, "You may optionally scan the recovery key off screen", password); in enroll_recovery()
|
D | meson.build | 7 'cryptenroll-password.c', 8 'cryptenroll-password.h',
|
/systemd-251/src/basic/ |
D | recovery-key.c | 21 int normalize_recovery_key(const char *password, char **ret) { in normalize_recovery_key() argument 25 assert(password); in normalize_recovery_key() 28 l = strlen(password); in normalize_recovery_key() 50 if (i > 0 && i % 4 == 0 && password[k-1] != '-') in normalize_recovery_key() 54 a = decode_modhex_char(password[k]); in normalize_recovery_key() 57 b = decode_modhex_char(password[k+1]); in normalize_recovery_key()
|
D | user-util.h | 138 static inline bool hashed_password_is_locked_or_invalid(const char *password) { in hashed_password_is_locked_or_invalid() argument 139 return password && password[0] != '$'; in hashed_password_is_locked_or_invalid()
|
/systemd-251/shell-completion/bash/ |
D | homectl | 42 --no-pager --no-legend --no-ask-password 69 --password-hint 70 --enforce-password-policy 71 --password-change-now 72 --password-change-min 73 --password-change-max 74 --password-change-warn 75 --password-change-inactive 128 …--locked|--enforce-password-policy|--password-change-now|--luks-discard|--luks-offline-discard|--n…
|
/systemd-251/shell-completion/zsh/ |
D | _systemd | 1 …cat systemd-ask-password systemd-cgls systemd-cgtop systemd-detect-virt systemd-machine-id-setup s… 6 systemd-ask-password) 69 systemd-tty-ask-password-agent) 73 '--list[Lists all currently pending system password requests.]' \ 74 …'--query[Process all currently pending system password requests by querying the user on the callin… 75 '--watch[Continuously process password requests.]' \ 76 '--wall[Forward password requests to wall(1).]' \
|
/systemd-251/src/cryptsetup/cryptsetup-tokens/ |
D | cryptsetup-token-systemd-pkcs11.c | 29 char **password, /* freed by cryptsetup_token_buffer_free */ in cryptsetup_token_open_pin() argument 44 return acquire_luks2_key(cd, json, usrptr, pin, pin_size, password, password_len); in cryptsetup_token_open_pin() 63 char **password, /* freed by cryptsetup_token_buffer_free */ in cryptsetup_token_open() argument 67 return cryptsetup_token_open_pin(cd, token, NULL, 0, password, password_len, usrptr); in cryptsetup_token_open()
|
D | cryptsetup-token-systemd-fido2.c | 29 char **password, /* freed by cryptsetup_token_buffer_free */ in cryptsetup_token_open_pin() argument 56 …return acquire_luks2_key(cd, json, (const char *)usrptr, pin_string ?: pin, password, password_len… in cryptsetup_token_open_pin() 75 char **password, /* freed by cryptsetup_token_buffer_free */ in cryptsetup_token_open() argument 79 return cryptsetup_token_open_pin(cd, token, NULL, 0, password, password_len, usrptr); in cryptsetup_token_open()
|
D | cryptsetup-token.h | 9 char **password, size_t *password_len, void *usrptr); 13 char **password, size_t *password_len, void *usrptr);
|
/systemd-251/factory/etc/pam.d/ |
D | system-auth | 15 -password sufficient pam_systemd_home.so 16 password sufficient pam_unix.so sha512 shadow try_first_pass use_authtok 17 password required pam_deny.so
|
/systemd-251/src/firstboot/ |
D | firstboot.c | 727 static int write_root_passwd(const char *passwd_path, const char *password, const char *shell) { in write_root_passwd() argument 732 assert(password); in write_root_passwd() 749 i->pw_passwd = (char *) password; in write_root_passwd() 764 .pw_passwd = (char *) password, in write_root_passwd() 867 const char *password, *hashed_password; in process_root_args() local 927 password = PASSWORD_SEE_SHADOW; in process_root_args() 934 password = PASSWORD_SEE_SHADOW; in process_root_args() 938 password = hashed_password = PASSWORD_NONE; in process_root_args() 940 password = hashed_password = PASSWORD_LOCKED_AND_INVALID; in process_root_args() 942 r = write_root_passwd(etc_passwd, password, arg_root_shell); in process_root_args()
|
/systemd-251/test/fuzz/fuzz-unit-file/ |
D | systemd-ask-password-console.path | 13 Documentation=man:systemd-ask-password-console.service(8) 21 DirectoryNotEmpty=/run/systemd/ask-password
|