Home
last modified time | relevance | path

Searched refs:passwords (Results 1 – 20 of 20) sorted by relevance

/systemd-251/src/cryptenroll/
Dcryptenroll-password.c42 _cleanup_strv_free_erase_ char **passwords = NULL, **passwords2 = NULL; in enroll_password() local
53 …, "drive-harddisk", id, "cryptenroll", "cryptenroll.new-passphrase", USEC_INFINITY, 0, &passwords); in enroll_password()
57 assert(strv_length(passwords) == 1); in enroll_password()
70 if (strv_equal(passwords, passwords2)) { in enroll_password()
Dcryptenroll.c506 _cleanup_strv_free_erase_ char **passwords = NULL; in prepare_luks() local
515 &passwords); in prepare_luks()
520 STRV_FOREACH(p, passwords) { in prepare_luks()
/systemd-251/src/tty-ask-password-agent/
Dtty-ask-password-agent.c56 static int send_passwords(const char *socket_name, char **passwords) { in send_passwords() argument
73 STRV_FOREACH(p, passwords) in send_passwords()
83 STRV_FOREACH(p, passwords) in send_passwords()
233 _cleanup_strv_free_erase_ char **passwords = NULL; in process_one_password_file() local
249 r = ask_password_plymouth(message, not_after, flags, filename, &passwords); in process_one_password_file()
251 r = agent_ask_password_tty(message, not_after, flags, filename, &passwords); in process_one_password_file()
260 if (strv_isempty(passwords)) in process_one_password_file()
263 r = send_passwords(socket_name, passwords); in process_one_password_file()
/systemd-251/src/home/
Dhomectl-recovery-key.c70 _cleanup_(strv_free_erasep) char **passwords = NULL; in add_secret()
79 r = json_variant_strv(l, &passwords); in add_secret()
83 r = strv_extend(&passwords, password); in add_secret()
87 r = json_variant_new_array_strv(&l, passwords); in add_secret()
Dhomework-fscrypt.c194 char **passwords, in fscrypt_slot_try_many() argument
202 STRV_FOREACH(i, passwords) { in fscrypt_slot_try_many()
Dhomework-luks.c302 char **passwords, in luks_try_passwords() argument
312 STRV_FOREACH(pp, passwords) { in luks_try_passwords()
337 …_errno(r, "Password %zu didn't work for unlocking LUKS superblock: %m", (size_t) (pp - passwords)); in luks_try_passwords()
351 char **passwords, in luks_setup() argument
423 passwords) { in luks_setup()
/systemd-251/src/cryptsetup/
Dcryptsetup.c576 _cleanup_strv_free_erase_ char **passwords = NULL; in get_password() local
603 &passwords); in get_password()
610 assert(strv_length(passwords) == 1); in get_password()
623 if (!streq(passwords[0], passwords2[0])) in get_password()
628 strv_uniq(passwords); in get_password()
630 STRV_FOREACH(p, passwords) { in get_password()
646 *ret = TAKE_PTR(passwords); in get_password()
657 char **passwords, in attach_tcrypt() argument
670 assert(key_file || key_data || !strv_isempty(passwords)); in attach_tcrypt()
699 params.passphrase = passwords[0]; in attach_tcrypt()
[all …]
/systemd-251/docs/
DPASSWORD_AGENTS.md10 …ht password agents which can be used to query the user for system-level passwords or passphrases. …
12 * A Plymouth agent used for querying passwords during boot-up
16 …which is built into "`systemctl start`" (and similar commands) and asks passwords to the user duri…
17 * A simple tty agent which can be run manually to respond to all queued passwords
37 …nding on your environment you may either choose to show all outstanding passwords at the same time…
39 … privileged users may use this tool (after all this is intended purely for system-level passwords).
DGROUP_RECORD.md65 `hashedPassword` → An array of strings with UNIX hashed passwords; see the
122 At this time almost all Linux machines employ shadow passwords, thus the
DENVIRONMENT.md99 UNIX `crypt()` when generating passwords. By default the system's "preferred
391 Various tools that read passwords from the TTY, such as `systemd-cryptenroll`
DUSER_RECORD.md168 a new home directory, as passwords and similar credentials need to be
676 in most ways similar to regular passwords, except that they are generated by
683 keys should be accepted wherever regular passwords are. The `recoveryKey` field
1001 At this time almost all Linux machines employ shadow passwords, thus the
DCREDENTIALS.md14 cryptographic keys, certificates, passwords, identity information and similar
/systemd-251/src/shared/
Dask-password-api.c85 static int add_to_keyring(const char *keyname, AskPasswordFlags flags, char **passwords) { in add_to_keyring() argument
96 if (strv_isempty(passwords)) in add_to_keyring()
107 r = strv_extend_strv(&l, passwords, true); in add_to_keyring()
132 static int add_to_keyring_and_log(const char *keyname, AskPasswordFlags flags, char **passwords) { in add_to_keyring_and_log() argument
137 r = add_to_keyring(keyname, flags, passwords); in add_to_keyring_and_log()
Dpkcs11-util.c277 _cleanup_strv_free_erase_ char **passwords = NULL; in pkcs11_token_login() local
284 passwords = strv_new(envpin); in pkcs11_token_login()
285 if (!passwords) in pkcs11_token_login()
313 … r = ask_password_auto(text, icon_name, id, key_name, credential_name, until, 0, &passwords); in pkcs11_token_login()
318 STRV_FOREACH(i, passwords) { in pkcs11_token_login()
/systemd-251/shell-completion/zsh/
D_systemd12 '--accept-cached[Accept cached passwords]' \
13 '--multiple[List multiple passwords if available]'
D_machinectl91 '--no-ask-password[Do not ask for system passwords.]' \
D_loginctl179 '--no-ask-password[Do not ask for system passwords]' \
D_systemctl.in490 '--no-ask-password[Do not ask for system passwords]' \
/systemd-251/
DTODO425 passwords, not just the first. i.e. if there are multiple defined, prefer
656 - cryptsetup-generator: allow specification of passwords in crypttab itself
850 * paranoia: whenever we process passwords, call mlock() on the memory
1298 * add libsystemd-password or so to query passwords during boot using the password agent logic
1578 …- in systemd's PAMName= logic: query passwords with ssh-askpassword, so that we can make "loginctl…
1600 and always verify passwords against it too. Bootstrapping is a problem
DNEWS617 certificates, passwords and similar securely at rest and only decrypt
1477 * systemd-sysusers now supports querying the passwords to set for the
1483 there is one). This permits easy configuration of user passwords
1490 doesn't set any passwords as effect of the command line above if the
1786 requests to query the user interactively for passwords or PINs will
1837 to the main user and group records. Thus, hashed passwords managed by
1902 * The systemd-ask-password tool now also supports reading passwords
2862 such as passwords or cryptographic keys but also associated less
8931 passwords or SSL passwords during boot gained support for
8932 caching passwords in the kernel keyring, if it is