/systemd-251/src/cryptenroll/ |
D | cryptenroll-password.c | 42 _cleanup_strv_free_erase_ char **passwords = NULL, **passwords2 = NULL; in enroll_password() local 53 …, "drive-harddisk", id, "cryptenroll", "cryptenroll.new-passphrase", USEC_INFINITY, 0, &passwords); in enroll_password() 57 assert(strv_length(passwords) == 1); in enroll_password() 70 if (strv_equal(passwords, passwords2)) { in enroll_password()
|
D | cryptenroll.c | 506 _cleanup_strv_free_erase_ char **passwords = NULL; in prepare_luks() local 515 &passwords); in prepare_luks() 520 STRV_FOREACH(p, passwords) { in prepare_luks()
|
/systemd-251/src/tty-ask-password-agent/ |
D | tty-ask-password-agent.c | 56 static int send_passwords(const char *socket_name, char **passwords) { in send_passwords() argument 73 STRV_FOREACH(p, passwords) in send_passwords() 83 STRV_FOREACH(p, passwords) in send_passwords() 233 _cleanup_strv_free_erase_ char **passwords = NULL; in process_one_password_file() local 249 r = ask_password_plymouth(message, not_after, flags, filename, &passwords); in process_one_password_file() 251 r = agent_ask_password_tty(message, not_after, flags, filename, &passwords); in process_one_password_file() 260 if (strv_isempty(passwords)) in process_one_password_file() 263 r = send_passwords(socket_name, passwords); in process_one_password_file()
|
/systemd-251/src/home/ |
D | homectl-recovery-key.c | 70 _cleanup_(strv_free_erasep) char **passwords = NULL; in add_secret() 79 r = json_variant_strv(l, &passwords); in add_secret() 83 r = strv_extend(&passwords, password); in add_secret() 87 r = json_variant_new_array_strv(&l, passwords); in add_secret()
|
D | homework-fscrypt.c | 194 char **passwords, in fscrypt_slot_try_many() argument 202 STRV_FOREACH(i, passwords) { in fscrypt_slot_try_many()
|
D | homework-luks.c | 302 char **passwords, in luks_try_passwords() argument 312 STRV_FOREACH(pp, passwords) { in luks_try_passwords() 337 …_errno(r, "Password %zu didn't work for unlocking LUKS superblock: %m", (size_t) (pp - passwords)); in luks_try_passwords() 351 char **passwords, in luks_setup() argument 423 passwords) { in luks_setup()
|
/systemd-251/src/cryptsetup/ |
D | cryptsetup.c | 576 _cleanup_strv_free_erase_ char **passwords = NULL; in get_password() local 603 &passwords); in get_password() 610 assert(strv_length(passwords) == 1); in get_password() 623 if (!streq(passwords[0], passwords2[0])) in get_password() 628 strv_uniq(passwords); in get_password() 630 STRV_FOREACH(p, passwords) { in get_password() 646 *ret = TAKE_PTR(passwords); in get_password() 657 char **passwords, in attach_tcrypt() argument 670 assert(key_file || key_data || !strv_isempty(passwords)); in attach_tcrypt() 699 params.passphrase = passwords[0]; in attach_tcrypt() [all …]
|
/systemd-251/docs/ |
D | PASSWORD_AGENTS.md | 10 …ht password agents which can be used to query the user for system-level passwords or passphrases. … 12 * A Plymouth agent used for querying passwords during boot-up 16 …which is built into "`systemctl start`" (and similar commands) and asks passwords to the user duri… 17 * A simple tty agent which can be run manually to respond to all queued passwords 37 …nding on your environment you may either choose to show all outstanding passwords at the same time… 39 … privileged users may use this tool (after all this is intended purely for system-level passwords).
|
D | GROUP_RECORD.md | 65 `hashedPassword` → An array of strings with UNIX hashed passwords; see the 122 At this time almost all Linux machines employ shadow passwords, thus the
|
D | ENVIRONMENT.md | 99 UNIX `crypt()` when generating passwords. By default the system's "preferred 391 Various tools that read passwords from the TTY, such as `systemd-cryptenroll`
|
D | USER_RECORD.md | 168 a new home directory, as passwords and similar credentials need to be 676 in most ways similar to regular passwords, except that they are generated by 683 keys should be accepted wherever regular passwords are. The `recoveryKey` field 1001 At this time almost all Linux machines employ shadow passwords, thus the
|
D | CREDENTIALS.md | 14 cryptographic keys, certificates, passwords, identity information and similar
|
/systemd-251/src/shared/ |
D | ask-password-api.c | 85 static int add_to_keyring(const char *keyname, AskPasswordFlags flags, char **passwords) { in add_to_keyring() argument 96 if (strv_isempty(passwords)) in add_to_keyring() 107 r = strv_extend_strv(&l, passwords, true); in add_to_keyring() 132 static int add_to_keyring_and_log(const char *keyname, AskPasswordFlags flags, char **passwords) { in add_to_keyring_and_log() argument 137 r = add_to_keyring(keyname, flags, passwords); in add_to_keyring_and_log()
|
D | pkcs11-util.c | 277 _cleanup_strv_free_erase_ char **passwords = NULL; in pkcs11_token_login() local 284 passwords = strv_new(envpin); in pkcs11_token_login() 285 if (!passwords) in pkcs11_token_login() 313 … r = ask_password_auto(text, icon_name, id, key_name, credential_name, until, 0, &passwords); in pkcs11_token_login() 318 STRV_FOREACH(i, passwords) { in pkcs11_token_login()
|
/systemd-251/shell-completion/zsh/ |
D | _systemd | 12 '--accept-cached[Accept cached passwords]' \ 13 '--multiple[List multiple passwords if available]'
|
D | _machinectl | 91 '--no-ask-password[Do not ask for system passwords.]' \
|
D | _loginctl | 179 '--no-ask-password[Do not ask for system passwords]' \
|
D | _systemctl.in | 490 '--no-ask-password[Do not ask for system passwords]' \
|
/systemd-251/ |
D | TODO | 425 passwords, not just the first. i.e. if there are multiple defined, prefer 656 - cryptsetup-generator: allow specification of passwords in crypttab itself 850 * paranoia: whenever we process passwords, call mlock() on the memory 1298 * add libsystemd-password or so to query passwords during boot using the password agent logic 1578 …- in systemd's PAMName= logic: query passwords with ssh-askpassword, so that we can make "loginctl… 1600 and always verify passwords against it too. Bootstrapping is a problem
|
D | NEWS | 617 certificates, passwords and similar securely at rest and only decrypt 1477 * systemd-sysusers now supports querying the passwords to set for the 1483 there is one). This permits easy configuration of user passwords 1490 doesn't set any passwords as effect of the command line above if the 1786 requests to query the user interactively for passwords or PINs will 1837 to the main user and group records. Thus, hashed passwords managed by 1902 * The systemd-ask-password tool now also supports reading passwords 2862 such as passwords or cryptographic keys but also associated less 8931 passwords or SSL passwords during boot gained support for 8932 caching passwords in the kernel keyring, if it is
|