/systemd-251/src/home/ |
D | homework-fido2.c | 14 const Fido2HmacSalt *salt, in fido2_use_token() argument 24 assert(salt); in fido2_use_token() 31 if (salt->up > 0) { in fido2_use_token() 36 } else if (salt->up < 0) /* unset? */ in fido2_use_token() 39 if (salt->uv > 0) { in fido2_use_token() 44 } else if (salt->uv < 0) in fido2_use_token() 47 if (salt->client_pin > 0) { in fido2_use_token() 53 } else if (salt->client_pin < 0) in fido2_use_token() 59 salt->salt, salt->salt_size, in fido2_use_token() 60 salt->credential.id, salt->credential.size, in fido2_use_token()
|
D | homework-fscrypt.c | 92 const void *salt, size_t salt_size, in fscrypt_slot_try_one() argument 108 assert(salt); in fscrypt_slot_try_one() 129 salt, salt_size, in fscrypt_slot_try_one() 195 const void *salt, size_t salt_size, in fscrypt_slot_try_many() argument 203 …r = fscrypt_slot_try_one(*i, salt, salt_size, encrypted, encrypted_size, match_key_descriptor, ret… in fscrypt_slot_try_many() 230 _cleanup_free_ void *salt = NULL, *encrypted = NULL; in fscrypt_setup() local 254 r = unbase64mem(value, e - value, &salt, &salt_size); in fscrypt_setup() 265 salt, salt_size, in fscrypt_setup() 407 uint8_t salt[64], derived[512 / 8] = {}; in fscrypt_slot_set() local 412 r = genuine_random_bytes(salt, sizeof(salt), RANDOM_BLOCK); in fscrypt_slot_set() [all …]
|
D | homectl-fido2.c | 126 _cleanup_(erase_and_freep) void *secret = NULL, *salt = NULL; in identity_add_fido2_parameters() 171 &salt, &salt_size, in identity_add_fido2_parameters() 189 salt, in identity_add_fido2_parameters()
|
D | homework-fido2.h | 6 int fido2_use_token(UserRecord *h, UserRecord *secret, const Fido2HmacSalt *salt, char **ret);
|
/systemd-251/src/shared/ |
D | libcrypt-util.c | 36 char *salt; in make_salt() local 51 salt = crypt_gensalt_ra(e, 0, NULL, 0); in make_salt() 52 if (!salt) in make_salt() 55 *ret = salt; in make_salt() 67 char *salt, *j; in make_salt() 83 salt = new(char, 3+sizeof(raw)+1+1); in make_salt() 84 if (!salt) in make_salt() 88 j = stpcpy(salt, "$6$"); in make_salt() 94 *ret = salt; in make_salt() 141 _cleanup_free_ char *salt = NULL; in hash_password_full() local [all …]
|
D | libfido2-util.c | 201 const void *salt, in fido2_use_hmac_hash_specific_token() argument 220 assert(salt); in fido2_use_hmac_hash_specific_token() 262 r = sym_fido_assert_set_hmac_salt(a, salt, salt_size); in fido2_use_hmac_hash_specific_token() 470 const void *salt, in fido2_use_hmac_hash() argument 488 …return fido2_use_hmac_hash_specific_token(device, rp_id, salt, salt_size, cid, cid_size, pins, req… in fido2_use_hmac_hash() 523 …r = fido2_use_hmac_hash_specific_token(path, rp_id, salt, salt_size, cid, cid_size, pins, required… in fido2_use_hmac_hash() 556 _cleanup_(erase_and_freep) void *salt = NULL, *secret_copy = NULL; in fido2_generate_hmac_hash() 595 salt = malloc(FIDO2_SALT_SIZE); in fido2_generate_hmac_hash() 596 if (!salt) in fido2_generate_hmac_hash() 599 r = genuine_random_bytes(salt, FIDO2_SALT_SIZE, RANDOM_BLOCK); in fido2_generate_hmac_hash() [all …]
|
D | libfido2-util.h | 93 const void *salt,
|
D | user-record.c | 115 erase_and_free(s->salt); in fido2_hmac_salt_done() 855 k->salt = erase_and_free(k->salt); in dispatch_fido2_hmac_salt_value() 867 erase_and_free(k->salt); in dispatch_fido2_hmac_salt_value() 868 k->salt = b; in dispatch_fido2_hmac_salt_value()
|
D | user-record.h | 198 void *salt; member
|
/systemd-251/src/cryptsetup/ |
D | cryptsetup-fido2.c | 37 const char *salt; in acquire_fido2_key() local 47 salt = key_data; in acquire_fido2_key() 66 salt = loaded_salt; in acquire_fido2_key() 83 salt, salt_size, in acquire_fido2_key() 134 _cleanup_free_ void *cid = NULL, *salt = NULL; in find_fido2_auto_data() local 191 assert(!salt); in find_fido2_auto_data() 193 r = unbase64mem(json_variant_string(w), SIZE_MAX, &salt, &salt_size); in find_fido2_auto_data() 257 *ret_salt = TAKE_PTR(salt); in find_fido2_auto_data()
|
/systemd-251/src/cryptsetup/cryptsetup-tokens/ |
D | luks2-fido2.c | 23 _cleanup_free_ void *cid = NULL, *salt = NULL; in acquire_luks2_key() local 32 r = parse_luks2_fido2_data(cd, json, &rp_id, &salt, &salt_size, &cid, &cid_size, &required); in acquire_luks2_key() 49 salt, salt_size, in acquire_luks2_key() 82 _cleanup_free_ void *cid = NULL, *salt = NULL; in parse_luks2_fido2_data() local 114 r = unbase64mem(json_variant_string(w), SIZE_MAX, &salt, &salt_size); in parse_luks2_fido2_data() 152 *ret_salt = TAKE_PTR(salt); in parse_luks2_fido2_data()
|
D | cryptsetup-token-systemd-fido2.c | 102 _cleanup_free_ void *cid = NULL, *salt = NULL; in cryptsetup_token_dump() local 107 r = parse_luks2_fido2_data(cd, json, &rp_id, &salt, &salt_size, &cid, &cid_size, &required); in cryptsetup_token_dump() 115 r = crypt_dump_buffer_to_hex_string(salt, salt_size, &salt_str); in cryptsetup_token_dump()
|
/systemd-251/src/cryptenroll/ |
D | cryptenroll-fido2.c | 18 _cleanup_(erase_and_freep) void *salt = NULL, *secret = NULL; in enroll_fido2() 48 &salt, &salt_size, in enroll_fido2() 82 … JSON_BUILD_PAIR("fido2-salt", JSON_BUILD_BASE64(salt, salt_size)), in enroll_fido2()
|
/systemd-251/docs/ |
D | CODE_QUALITY.md | 30 output will show false positives, hence take it with a pinch of salt. 34 of salt, in particular as we generally leave foreign header files we include in 38 `./tools/find-tabs.sh recpatch` to fix them. (Again, grain of salt, foreign
|
D | HOME_DIRECTORY.md | 58 pair of Base64 encoded data fields. The first field contains a salt value, the 61 together with the salt value. The construction is similar to what LUKS does for
|
D | USER_RECORD.md | 582 implement the `hmac-secret` extension. The salt to pass to the FIDO2 device is 656 `salt`, `hashedPassword`, and three boolean fields: `up`, `uv` and 658 data: the FIDO2 credential ID and the salt value to pass to the FIDO2 659 device. During authentication this salt along with the credential ID is sent to 660 the FIDO2 token, which will HMAC hash the salt with its internal secret key and
|
/systemd-251/src/resolve/ |
D | test-dnssec.c | 756 static const uint8_t salt[] = { 0xB0, 0x1D, 0xFA, 0xCE }; in TEST() local 770 rr->nsec3.salt = memdup(salt, sizeof(salt)); in TEST() 771 assert_se(rr->nsec3.salt); in TEST() 772 rr->nsec3.salt_size = sizeof(salt); in TEST()
|
D | resolved-dns-rr.c | 459 free(rr->nsec3.salt); in dns_resource_record_free() 669 FIELD_EQUAL(a->nsec3, b->nsec3, salt) && in dns_resource_record_payload_equal() 1055 _cleanup_free_ char *salt = NULL, *hash = NULL; in dns_resource_record_to_string() local 1058 salt = hexmem(rr->nsec3.salt, rr->nsec3.salt_size); in dns_resource_record_to_string() 1059 if (!salt) in dns_resource_record_to_string() 1076 rr->nsec3.salt_size > 0 ? salt : "-", in dns_resource_record_to_string() 1443 siphash24_compress_safe(rr->nsec3.salt, rr->nsec3.salt_size, state); in dns_resource_record_hash_func() 1632 copy->nsec3.salt = memdup(rr->nsec3.salt, rr->nsec3.salt_size); in dns_resource_record_copy() 1633 if (!copy->nsec3.salt) in dns_resource_record_copy()
|
D | resolved-dns-dnssec.c | 1528 if (EVP_DigestUpdate(ctx, nsec3->nsec3.salt, nsec3->nsec3.salt_size) <= 0) in dnssec_nsec3_hash() 1540 if (EVP_DigestUpdate(ctx, nsec3->nsec3.salt, nsec3->nsec3.salt_size) <= 0) in dnssec_nsec3_hash() 1568 gcry_md_write(md, nsec3->nsec3.salt, nsec3->nsec3.salt_size); in dnssec_nsec3_hash() 1580 gcry_md_write(md, nsec3->nsec3.salt, nsec3->nsec3.salt_size); in dnssec_nsec3_hash() 1642 if (memcmp_safe(rr->nsec3.salt, nsec3->nsec3.salt, rr->nsec3.salt_size) != 0) in nsec3_is_good()
|
D | resolved-dns-rr.h | 225 void *salt; member
|
D | resolved-dns-packet.c | 1134 r = dns_packet_append_blob(p, rr->nsec3.salt, rr->nsec3.salt_size, NULL); in dns_packet_append_rr() 2047 r = dns_packet_read_memdup(p, size, &rr->nsec3.salt, &rr->nsec3.salt_size, NULL); in dns_packet_read_rr()
|