/systemd-251/src/home/ |
D | homed-home-bus.c | 148 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in bus_home_method_activate() 155 r = bus_message_read_secret(message, &secret, error); in bus_home_method_activate() 159 r = home_activate(h, secret, error); in bus_home_method_activate() 240 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in bus_home_method_realize() 247 r = bus_message_read_secret(message, &secret, error); in bus_home_method_realize() 265 r = home_create(h, secret, error); in bus_home_method_realize() 326 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in bus_home_method_fixate() 333 r = bus_message_read_secret(message, &secret, error); in bus_home_method_fixate() 337 r = home_fixate(h, secret, error); in bus_home_method_fixate() 356 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in bus_home_method_authenticate() [all …]
|
D | pam_systemd_home.c | 279 UserRecord *secret, in handle_generic_user_record_error() argument 303 assert(secret); in handle_generic_user_record_error() 307 if (strv_isempty(secret->password)) in handle_generic_user_record_error() 321 r = user_record_set_password(secret, STRV_MAKE(newp), true); in handle_generic_user_record_error() 330 assert(secret); in handle_generic_user_record_error() 334 if (strv_isempty(secret->password)) in handle_generic_user_record_error() 348 r = user_record_set_password(secret, STRV_MAKE(newp), true); in handle_generic_user_record_error() 357 assert(secret); in handle_generic_user_record_error() 359 if (strv_isempty(secret->password)) { in handle_generic_user_record_error() 374 r = user_record_set_password(secret, STRV_MAKE(newp), true); in handle_generic_user_record_error() [all …]
|
D | user-record-pwquality.c | 16 UserRecord *secret, in user_record_quality_check_password() argument 25 assert(secret); in user_record_quality_check_password() 38 STRV_FOREACH(pp, secret->password) { in user_record_quality_check_password() 48 STRV_FOREACH(old, secret->password) { in user_record_quality_check_password() 84 UserRecord *secret, in user_record_quality_check_password() argument
|
D | homed-home.h | 134 UserRecord *secret; member 187 int home_fixate(Home *h, UserRecord *secret, sd_bus_error *error); 188 int home_activate(Home *h, UserRecord *secret, sd_bus_error *error); 189 int home_authenticate(Home *h, UserRecord *secret, sd_bus_error *error); 191 int home_create(Home *h, UserRecord *secret, sd_bus_error *error); 194 int home_resize(Home *h, uint64_t disk_size, UserRecord *secret, bool automatic, sd_bus_error *erro… 198 int home_unlock(Home *h, UserRecord *secret, sd_bus_error *error);
|
D | homework-fido2.c | 13 UserRecord *secret, in fido2_use_token() argument 23 assert(secret); in fido2_use_token() 49 if (strv_isempty(secret->token_pin)) in fido2_use_token() 61 secret->token_pin, in fido2_use_token()
|
D | home-util.c | 113 int bus_message_append_secret(sd_bus_message *m, UserRecord *secret) { in bus_message_append_secret() argument 119 assert(secret); in bus_message_append_secret() 121 if (!FLAGS_SET(secret->mask, USER_RECORD_SECRET)) in bus_message_append_secret() 124 v = json_variant_by_key(secret->json, "secret"); in bus_message_append_secret()
|
D | homectl-fido2.c | 70 const void *secret, in add_fido2_salt() argument 80 r = base64mem(secret, secret_size, &base64_encoded); in add_fido2_salt() 126 _cleanup_(erase_and_freep) void *secret = NULL, *salt = NULL; in identity_add_fido2_parameters() 172 &secret, &secret_size, in identity_add_fido2_parameters() 191 secret, in identity_add_fido2_parameters()
|
D | homed-home.c | 54 static int home_start_work(Home *h, const char *verb, UserRecord *hr, UserRecord *secret); 202 user_record_unref(h->secret); in home_free() 670 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in home_fixate_finish() 677 secret = TAKE_PTR(h->secret); /* Take possession */ in home_fixate_finish() 717 r = home_start_work(h, "activate", h->record, secret); in home_fixate_finish() 1137 static int home_start_work(Home *h, const char *verb, UserRecord *hr, UserRecord *secret) { in home_start_work() argument 1156 if (secret) { in home_start_work() 1159 sub = json_variant_by_key(secret->json, "secret"); in home_start_work() 1298 UserRecord *secret, in home_fixate_internal() argument 1307 r = home_start_work(h, "inspect", h->record, secret); in home_fixate_internal() [all …]
|
D | user-record-util.c | 565 int user_record_test_password(UserRecord *h, UserRecord *secret) { in user_record_test_password() argument 575 STRV_FOREACH(i, secret->password) { in user_record_test_password() 586 int user_record_test_recovery_key(UserRecord *h, UserRecord *secret) { in user_record_test_recovery_key() argument 596 STRV_FOREACH(i, secret->password) { in user_record_test_recovery_key() 777 int user_record_make_hashed_password(UserRecord *h, char **secret, bool extend) { in user_record_make_hashed_password() argument 783 assert(secret); in user_record_make_hashed_password() 795 STRV_FOREACH(i, secret) { in user_record_make_hashed_password() 1154 int user_record_merge_secret(UserRecord *h, UserRecord *secret) { in user_record_merge_secret() argument 1161 r = user_record_set_password(h, secret->password, true); in user_record_merge_secret() 1165 r = user_record_set_token_pin(h, secret->token_pin, true); in user_record_merge_secret() [all …]
|
D | user-record-util.h | 44 int user_record_test_password(UserRecord *h, UserRecord *secret); 45 int user_record_test_recovery_key(UserRecord *h, UserRecord *secret); 57 int user_record_merge_secret(UserRecord *h, UserRecord *secret);
|
D | homework-pkcs11.c | 48 if (data->secret->pkcs11_protected_authentication_path_permitted <= 0) in pkcs11_callback() 64 if (strv_isempty(data->secret->token_pin)) in pkcs11_callback() 67 STRV_FOREACH(i, data->secret->token_pin) { in pkcs11_callback()
|
D | homectl.c | 523 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in acquire_passed_secrets() 532 secret = user_record_new(); in acquire_passed_secrets() 533 if (!secret) in acquire_passed_secrets() 538 secret, in acquire_passed_secrets() 546 secret, in acquire_passed_secrets() 553 secret, in acquire_passed_secrets() 558 *ret = TAKE_PTR(secret); in acquire_passed_secrets() 571 _cleanup_(user_record_unrefp) UserRecord *secret = NULL; in activate_home() 573 r = acquire_passed_secrets(*i, &secret); in activate_home() 589 r = bus_message_append_secret(m, secret); in activate_home() [all …]
|
D | homed-manager-bus.c | 704 SD_BUS_ARGS("s", user_name, "s", secret), 737 SD_BUS_ARGS("s", user_name, "s", secret), 751 SD_BUS_ARGS("s", user_name, "s", secret), 758 SD_BUS_ARGS("s", user_name, "s", secret), 771 SD_BUS_ARGS("s", user_name, "t", size, "s", secret), 791 SD_BUS_ARGS("s", user_name, "s", secret), 804 SD_BUS_ARGS("s", user_name, "s", secret, "b", please_suspend),
|
D | user-record-pwquality.h | 7 int user_record_quality_check_password(UserRecord *hr, UserRecord *secret, sd_bus_error *error);
|
D | homework-fido2.h | 6 int fido2_use_token(UserRecord *h, UserRecord *secret, const Fido2HmacSalt *salt, char **ret);
|
D | homework.c | 42 UserRecord *secret, in user_record_authenticate() argument 53 assert(secret); in user_record_authenticate() 67 r = user_record_test_password(h, secret); in user_record_authenticate() 80 r = user_record_test_recovery_key(h, secret); in user_record_authenticate() 129 .secret = secret, in user_record_authenticate() 185 r = fido2_use_token(h, secret, h->fido2_hmac_salt + n, &decrypted_password); in user_record_authenticate() 1182 .secret = h, in user_record_compile_effective_passwords()
|
D | homework-pkcs11.h | 11 UserRecord *secret; member
|
D | home-util.h | 31 int bus_message_append_secret(sd_bus_message *m, UserRecord *secret);
|
D | homed-operation.h | 41 UserRecord *secret; member
|
D | homed-operation.c | 54 user_record_unref(o->secret); in operation_free()
|
/systemd-251/src/cryptenroll/ |
D | cryptenroll-tpm2.c | 136 _cleanup_(erase_and_freep) void *secret = NULL, *secret2 = NULL; in enroll_tpm2() 160 …r = tpm2_seal(device, pcr_mask, pin_str, &secret, &secret_size, &blob, &blob_size, &hash, &hash_si… in enroll_tpm2() 181 if (memcmp_nn(secret, secret_size, secret2, secret2_size) != 0) in enroll_tpm2() 185 r = base64mem(secret, secret_size, &base64_encoded); in enroll_tpm2()
|
D | cryptenroll-fido2.c | 18 _cleanup_(erase_and_freep) void *salt = NULL, *secret = NULL; in enroll_fido2() 49 &secret, &secret_size, in enroll_fido2() 56 r = base64mem(secret, secret_size, &base64_encoded); in enroll_fido2()
|
/systemd-251/src/shared/ |
D | tpm2-util.c | 839 _cleanup_(erase_and_freep) void *secret = NULL; in tpm2_seal() 962 secret = memdup(hmac_sensitive.sensitive.data.buffer, hmac_sensitive.sensitive.data.size); in tpm2_seal() 964 if (!secret) { in tpm2_seal() 1012 *ret_secret = TAKE_PTR(secret); in tpm2_seal() 1048 _cleanup_(erase_and_freep) char *secret = NULL; in tpm2_unseal() 1175 secret = memdup(unsealed->buffer, unsealed->size); in tpm2_unseal() 1177 if (!secret) { in tpm2_unseal() 1185 *ret_secret = TAKE_PTR(secret); in tpm2_unseal()
|
D | libfido2-util.c | 564 const void *cid, *secret; in fido2_generate_hmac_hash() local 893 secret = sym_fido_assert_hmac_secret_ptr(a, 0); in fido2_generate_hmac_hash() 894 if (!secret) in fido2_generate_hmac_hash() 899 secret_copy = memdup(secret, secret_size); in fido2_generate_hmac_hash()
|
/systemd-251/docs/ |
D | USER_RECORD.md | 157 `status`, `signature` itself and `secret` are removed first and thus not 162 7. The `secret` section contains secret user credentials, such as password or 181 | secret | no | no | yes | no … 192 does not need to be concerned with the `secret` section of user records, as 205 disk. Finally the `secret` section is used during authentication operations via 575 decrypt an encrypted secret key that is used to unlock the user's account (see 582 implement the `hmac-secret` extension. The salt to pass to the FIDO2 device is 610 `secret` → An object, which contains the fields of the `secret` section of the 641 as follows: the encrypted secret key is converted from its Base64 654 FIDO2 devices that implement the `hmac-secret` extension. Each element of the [all …]
|