Home
last modified time | relevance | path

Searched refs:secret (Results 1 – 25 of 34) sorted by relevance

12

/systemd-251/src/home/
Dhomed-home-bus.c148 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in bus_home_method_activate()
155 r = bus_message_read_secret(message, &secret, error); in bus_home_method_activate()
159 r = home_activate(h, secret, error); in bus_home_method_activate()
240 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in bus_home_method_realize()
247 r = bus_message_read_secret(message, &secret, error); in bus_home_method_realize()
265 r = home_create(h, secret, error); in bus_home_method_realize()
326 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in bus_home_method_fixate()
333 r = bus_message_read_secret(message, &secret, error); in bus_home_method_fixate()
337 r = home_fixate(h, secret, error); in bus_home_method_fixate()
356 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in bus_home_method_authenticate()
[all …]
Dpam_systemd_home.c279 UserRecord *secret, in handle_generic_user_record_error() argument
303 assert(secret); in handle_generic_user_record_error()
307 if (strv_isempty(secret->password)) in handle_generic_user_record_error()
321 r = user_record_set_password(secret, STRV_MAKE(newp), true); in handle_generic_user_record_error()
330 assert(secret); in handle_generic_user_record_error()
334 if (strv_isempty(secret->password)) in handle_generic_user_record_error()
348 r = user_record_set_password(secret, STRV_MAKE(newp), true); in handle_generic_user_record_error()
357 assert(secret); in handle_generic_user_record_error()
359 if (strv_isempty(secret->password)) { in handle_generic_user_record_error()
374 r = user_record_set_password(secret, STRV_MAKE(newp), true); in handle_generic_user_record_error()
[all …]
Duser-record-pwquality.c16 UserRecord *secret, in user_record_quality_check_password() argument
25 assert(secret); in user_record_quality_check_password()
38 STRV_FOREACH(pp, secret->password) { in user_record_quality_check_password()
48 STRV_FOREACH(old, secret->password) { in user_record_quality_check_password()
84 UserRecord *secret, in user_record_quality_check_password() argument
Dhomed-home.h134 UserRecord *secret; member
187 int home_fixate(Home *h, UserRecord *secret, sd_bus_error *error);
188 int home_activate(Home *h, UserRecord *secret, sd_bus_error *error);
189 int home_authenticate(Home *h, UserRecord *secret, sd_bus_error *error);
191 int home_create(Home *h, UserRecord *secret, sd_bus_error *error);
194 int home_resize(Home *h, uint64_t disk_size, UserRecord *secret, bool automatic, sd_bus_error *erro…
198 int home_unlock(Home *h, UserRecord *secret, sd_bus_error *error);
Dhomework-fido2.c13 UserRecord *secret, in fido2_use_token() argument
23 assert(secret); in fido2_use_token()
49 if (strv_isempty(secret->token_pin)) in fido2_use_token()
61 secret->token_pin, in fido2_use_token()
Dhome-util.c113 int bus_message_append_secret(sd_bus_message *m, UserRecord *secret) { in bus_message_append_secret() argument
119 assert(secret); in bus_message_append_secret()
121 if (!FLAGS_SET(secret->mask, USER_RECORD_SECRET)) in bus_message_append_secret()
124 v = json_variant_by_key(secret->json, "secret"); in bus_message_append_secret()
Dhomectl-fido2.c70 const void *secret, in add_fido2_salt() argument
80 r = base64mem(secret, secret_size, &base64_encoded); in add_fido2_salt()
126 _cleanup_(erase_and_freep) void *secret = NULL, *salt = NULL; in identity_add_fido2_parameters()
172 &secret, &secret_size, in identity_add_fido2_parameters()
191 secret, in identity_add_fido2_parameters()
Dhomed-home.c54 static int home_start_work(Home *h, const char *verb, UserRecord *hr, UserRecord *secret);
202 user_record_unref(h->secret); in home_free()
670 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in home_fixate_finish()
677 secret = TAKE_PTR(h->secret); /* Take possession */ in home_fixate_finish()
717 r = home_start_work(h, "activate", h->record, secret); in home_fixate_finish()
1137 static int home_start_work(Home *h, const char *verb, UserRecord *hr, UserRecord *secret) { in home_start_work() argument
1156 if (secret) { in home_start_work()
1159 sub = json_variant_by_key(secret->json, "secret"); in home_start_work()
1298 UserRecord *secret, in home_fixate_internal() argument
1307 r = home_start_work(h, "inspect", h->record, secret); in home_fixate_internal()
[all …]
Duser-record-util.c565 int user_record_test_password(UserRecord *h, UserRecord *secret) { in user_record_test_password() argument
575 STRV_FOREACH(i, secret->password) { in user_record_test_password()
586 int user_record_test_recovery_key(UserRecord *h, UserRecord *secret) { in user_record_test_recovery_key() argument
596 STRV_FOREACH(i, secret->password) { in user_record_test_recovery_key()
777 int user_record_make_hashed_password(UserRecord *h, char **secret, bool extend) { in user_record_make_hashed_password() argument
783 assert(secret); in user_record_make_hashed_password()
795 STRV_FOREACH(i, secret) { in user_record_make_hashed_password()
1154 int user_record_merge_secret(UserRecord *h, UserRecord *secret) { in user_record_merge_secret() argument
1161 r = user_record_set_password(h, secret->password, true); in user_record_merge_secret()
1165 r = user_record_set_token_pin(h, secret->token_pin, true); in user_record_merge_secret()
[all …]
Duser-record-util.h44 int user_record_test_password(UserRecord *h, UserRecord *secret);
45 int user_record_test_recovery_key(UserRecord *h, UserRecord *secret);
57 int user_record_merge_secret(UserRecord *h, UserRecord *secret);
Dhomework-pkcs11.c48 if (data->secret->pkcs11_protected_authentication_path_permitted <= 0) in pkcs11_callback()
64 if (strv_isempty(data->secret->token_pin)) in pkcs11_callback()
67 STRV_FOREACH(i, data->secret->token_pin) { in pkcs11_callback()
Dhomectl.c523 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in acquire_passed_secrets()
532 secret = user_record_new(); in acquire_passed_secrets()
533 if (!secret) in acquire_passed_secrets()
538 secret, in acquire_passed_secrets()
546 secret, in acquire_passed_secrets()
553 secret, in acquire_passed_secrets()
558 *ret = TAKE_PTR(secret); in acquire_passed_secrets()
571 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in activate_home()
573 r = acquire_passed_secrets(*i, &secret); in activate_home()
589 r = bus_message_append_secret(m, secret); in activate_home()
[all …]
Dhomed-manager-bus.c704 SD_BUS_ARGS("s", user_name, "s", secret),
737 SD_BUS_ARGS("s", user_name, "s", secret),
751 SD_BUS_ARGS("s", user_name, "s", secret),
758 SD_BUS_ARGS("s", user_name, "s", secret),
771 SD_BUS_ARGS("s", user_name, "t", size, "s", secret),
791 SD_BUS_ARGS("s", user_name, "s", secret),
804 SD_BUS_ARGS("s", user_name, "s", secret, "b", please_suspend),
Duser-record-pwquality.h7 int user_record_quality_check_password(UserRecord *hr, UserRecord *secret, sd_bus_error *error);
Dhomework-fido2.h6 int fido2_use_token(UserRecord *h, UserRecord *secret, const Fido2HmacSalt *salt, char **ret);
Dhomework.c42 UserRecord *secret, in user_record_authenticate() argument
53 assert(secret); in user_record_authenticate()
67 r = user_record_test_password(h, secret); in user_record_authenticate()
80 r = user_record_test_recovery_key(h, secret); in user_record_authenticate()
129 .secret = secret, in user_record_authenticate()
185 r = fido2_use_token(h, secret, h->fido2_hmac_salt + n, &decrypted_password); in user_record_authenticate()
1182 .secret = h, in user_record_compile_effective_passwords()
Dhomework-pkcs11.h11 UserRecord *secret; member
Dhome-util.h31 int bus_message_append_secret(sd_bus_message *m, UserRecord *secret);
Dhomed-operation.h41 UserRecord *secret; member
Dhomed-operation.c54 user_record_unref(o->secret); in operation_free()
/systemd-251/src/cryptenroll/
Dcryptenroll-tpm2.c136 _cleanup_(erase_and_freep) void *secret = NULL, *secret2 = NULL; in enroll_tpm2()
160 …r = tpm2_seal(device, pcr_mask, pin_str, &secret, &secret_size, &blob, &blob_size, &hash, &hash_si… in enroll_tpm2()
181 if (memcmp_nn(secret, secret_size, secret2, secret2_size) != 0) in enroll_tpm2()
185 r = base64mem(secret, secret_size, &base64_encoded); in enroll_tpm2()
Dcryptenroll-fido2.c18 _cleanup_(erase_and_freep) void *salt = NULL, *secret = NULL; in enroll_fido2()
49 &secret, &secret_size, in enroll_fido2()
56 r = base64mem(secret, secret_size, &base64_encoded); in enroll_fido2()
/systemd-251/src/shared/
Dtpm2-util.c839 _cleanup_(erase_and_freep) void *secret = NULL; in tpm2_seal()
962 secret = memdup(hmac_sensitive.sensitive.data.buffer, hmac_sensitive.sensitive.data.size); in tpm2_seal()
964 if (!secret) { in tpm2_seal()
1012 *ret_secret = TAKE_PTR(secret); in tpm2_seal()
1048 _cleanup_(erase_and_freep) char *secret = NULL; in tpm2_unseal()
1175 secret = memdup(unsealed->buffer, unsealed->size); in tpm2_unseal()
1177 if (!secret) { in tpm2_unseal()
1185 *ret_secret = TAKE_PTR(secret); in tpm2_unseal()
Dlibfido2-util.c564 const void *cid, *secret; in fido2_generate_hmac_hash() local
893 secret = sym_fido_assert_hmac_secret_ptr(a, 0); in fido2_generate_hmac_hash()
894 if (!secret) in fido2_generate_hmac_hash()
899 secret_copy = memdup(secret, secret_size); in fido2_generate_hmac_hash()
/systemd-251/docs/
DUSER_RECORD.md157 `status`, `signature` itself and `secret` are removed first and thus not
162 7. The `secret` section contains secret user credentials, such as password or
181 | secret | no | no | yes | no …
192 does not need to be concerned with the `secret` section of user records, as
205 disk. Finally the `secret` section is used during authentication operations via
575 decrypt an encrypted secret key that is used to unlock the user's account (see
582 implement the `hmac-secret` extension. The salt to pass to the FIDO2 device is
610 `secret` → An object, which contains the fields of the `secret` section of the
641 as follows: the encrypted secret key is converted from its Base64
654 FIDO2 devices that implement the `hmac-secret` extension. Each element of the
[all …]

12