/systemd-251/src/cryptsetup/cryptsetup-tokens/ |
D | cryptsetup-token-systemd-fido2.c | 27 const char *pin, in cryptsetup_token_open_pin() argument 37 assert(!pin || pin_size); in cryptsetup_token_open_pin() 45 if (pin && memchr(pin, 0, pin_size - 1)) in cryptsetup_token_open_pin() 50 if (pin && pin[pin_size-1] != '\0') { in cryptsetup_token_open_pin() 51 pin_string = strndup(pin, pin_size); in cryptsetup_token_open_pin() 56 …return acquire_luks2_key(cd, json, (const char *)usrptr, pin_string ?: pin, password, password_len… in cryptsetup_token_open_pin()
|
D | luks2-pkcs11.c | 17 const char *pin; member 52 … r = pkcs11_token_login_by_pin(m, session, token_info, token_label, data->pin, data->pin_size); in luks2_pkcs11_callback() 107 const void *pin, in acquire_luks2_key_by_pin() argument 117 .pin = pin, in acquire_luks2_key_by_pin() 179 const void *pin, in acquire_luks2_key() argument 200 if (pkcs11_params && pin) in acquire_luks2_key() 211 cd, pkcs11_uri, pin, pin_size, in acquire_luks2_key()
|
D | cryptsetup-token-systemd-pkcs11.c | 27 const char *pin, in cryptsetup_token_open_pin() argument 36 assert(!pin || pin_size); in cryptsetup_token_open_pin() 44 return acquire_luks2_key(cd, json, usrptr, pin, pin_size, password, password_len); in cryptsetup_token_open_pin()
|
D | luks2-fido2.c | 16 const char *pin, in acquire_luks2_key() argument 36 if (pin) { in acquire_luks2_key() 37 pins = strv_new(pin); in acquire_luks2_key()
|
D | luks2-pkcs11.h | 11 const void *pin,
|
D | luks2-fido2.h | 12 const char *pin,
|
D | cryptsetup-token.h | 12 const char *pin, size_t pin_size,
|
/systemd-251/src/cryptenroll/ |
D | cryptenroll-tpm2.c | 78 _cleanup_strv_free_erase_ char **pin = NULL, **pin2 = NULL; in get_pin() local 84 pin = strv_free_erase(pin); in get_pin() 93 &pin); in get_pin() 96 assert(strv_length(pin) == 1); in get_pin() 109 assert(strv_length(pin) == 1); in get_pin() 111 if (strv_equal(pin, pin2)) { in get_pin() 112 pin_str = strdup(*pin); in get_pin()
|
/systemd-251/src/home/ |
D | homectl-pkcs11.c | 100 int identity_add_token_pin(JsonVariant **v, const char *pin) { in identity_add_token_pin() argument 107 if (isempty(pin)) in identity_add_token_pin() 117 if (strv_contains(pins, pin)) in identity_add_token_pin() 120 r = strv_extend(&pins, pin); in identity_add_token_pin() 161 _cleanup_(erase_and_freep) char *pin = NULL; in identity_add_pkcs11_key_data() 169 r = acquire_pkcs11_certificate(uri, "home directory operation", "user-home", &cert, &pin); in identity_add_pkcs11_key_data() 212 r = identity_add_token_pin(v, pin); in identity_add_pkcs11_key_data()
|
D | homectl-pkcs11.h | 6 int identity_add_token_pin(JsonVariant **v, const char *pin);
|
D | user-record-util.h | 52 int user_record_set_token_pin(UserRecord *h, char **pin, bool prepend);
|
D | user-record-util.c | 934 int user_record_set_token_pin(UserRecord *h, char **pin, bool prepend) { in user_record_set_token_pin() argument 942 e = strv_copy(pin); in user_record_set_token_pin() 956 if (strv_equal(h->token_pin, pin)) in user_record_set_token_pin() 959 e = strv_copy(pin); in user_record_set_token_pin()
|
D | homectl.c | 327 _cleanup_(strv_free_erasep) char **pin = NULL; in acquire_token_pin() 361 &pin); in acquire_token_pin() 370 r = user_record_set_token_pin(hr, pin, false); in acquire_token_pin()
|
/systemd-251/src/cryptsetup/ |
D | cryptsetup-tpm2.c | 16 _cleanup_strv_free_erase_ char **pin = NULL; in get_pin() local 31 pin = strv_free_erase(pin); in get_pin() 40 &pin); in get_pin() 43 assert(strv_length(pin) == 1); in get_pin() 45 pin_str = strdup(pin[0]); in get_pin()
|
/systemd-251/src/shared/ |
D | tpm2-util.c | 809 static void hash_pin(const char *pin, size_t len, uint8_t ret_digest[static SHA256_DIGEST_SIZE]) { in hash_pin() argument 812 assert(pin); in hash_pin() 815 sha256_process_bytes(pin, len, &hash); in hash_pin() 824 const char *pin, in tpm2_seal() argument 891 … r = tpm2_make_pcr_session(c.esys_context, primary, session, pcr_mask, UINT16_MAX, !!pin, NULL, in tpm2_seal() 923 if (pin) { in tpm2_seal() 924 hash_pin(pin, strlen(pin), hmac_sensitive.sensitive.userAuth.buffer); in tpm2_seal() 1039 const char *pin, in tpm2_unseal() argument 1104 …r = tpm2_make_pcr_session(c.esys_context, primary, hmac_session, pcr_mask, pcr_bank, !!pin, &sessi… in tpm2_unseal() 1142 if (pin) { in tpm2_unseal() [all …]
|
D | tpm2-util.h | 47 int tpm2_seal(const char *device, uint32_t pcr_mask, const char *pin, void **ret_secret, size_t *re… 48 … size_t blob_size, const void *pcr_hash, size_t pcr_hash_size, const char *pin, void **ret_secret,…
|
D | pkcs11-util.h | 33 …ssion, const CK_TOKEN_INFO *token_info, const char *token_label, const void *pin, size_t pin_size);
|
D | libfido2-util.c | 698 _cleanup_(strv_free_erasep) char **pin = NULL; in fido2_generate_hmac_hash() 700 …ter security token PIN:", askpw_icon_name, NULL, "fido2-pin", "fido2-pin", USEC_INFINITY, 0, &pin); in fido2_generate_hmac_hash() 705 STRV_FOREACH(i, pin) { in fido2_generate_hmac_hash()
|
D | pkcs11-util.c | 183 const void *pin, in pkcs11_token_login_by_pin() argument 206 if (!pin) in pkcs11_token_login_by_pin() 209 rv = m->C_Login(session, CKU_USER, (CK_UTF8CHAR*) pin, pin_size); in pkcs11_token_login_by_pin()
|
/systemd-251/test/units/ |
D | testsuite-70.sh | 25 env PASSWORD=passphrase NEWPIN=123456 systemd-cryptenroll --tpm2-device=auto --tpm2-with-pin=true $…
|
/systemd-251/ |
D | TODO | 1715 for all units. It should be both a way to pin units into memory as well as a
|
D | NEWS | 471 --tpm2-with-pin= option. 473 Option tpm2-pin= can be used in /etc/crypttab. 1200 and similar which want to pin the schemes of certain distribution 1801 --fido2-with-client-pin= to systemd-cryptenroll and homectl. Which 7763 * Bus clients of the service manager may now "pin" loaded units into
|
/systemd-251/hwdb.d/ |
D | usb.ids | 22748 1820 DAQPad-6020E (68 pin I/O)
|
D | 20-usb-vendor-model.hwdb | 68178 ID_MODEL_FROM_DATABASE=DAQPad-6020E (68 pin I/O)
|
D | pci.ids | 7989 71bc PCI-6221 (37-pin)
|