/systemd-251/src/udev/ |
D | udev-rules.c | 266 static void udev_rule_token_free(UdevRuleToken *token) { in udev_rule_token_free() argument 267 free(token); in udev_rule_token_free() 401 static void rule_line_append_token(UdevRuleLine *rule_line, UdevRuleToken *token) { in rule_line_append_token() argument 403 assert(token); in rule_line_append_token() 406 LIST_APPEND(tokens, rule_line->current_token, token); in rule_line_append_token() 408 LIST_APPEND(tokens, rule_line->tokens, token); in rule_line_append_token() 410 rule_line->current_token = token; in rule_line_append_token() 414 UdevRuleToken *token; in rule_line_add_token() local 487 token = new(UdevRuleToken, 1); in rule_line_add_token() 488 if (!token) in rule_line_add_token() [all …]
|
/systemd-251/src/shared/ |
D | parse-helpers.c | 59 const char *token, in parse_af_token() argument 67 assert(token); in parse_af_token() 70 af = af_from_ipv4_ipv6(token); in parse_af_token() 79 const char *token, in parse_ip_protocol_token() argument 87 assert(token); in parse_ip_protocol_token() 90 proto = ip_protocol_from_tcp_udp(token); in parse_ip_protocol_token() 99 const char *token, in parse_ip_ports_token() argument 105 assert(token); in parse_ip_ports_token() 109 if (streq(token, "any")) in parse_ip_ports_token() 113 int r = parse_ip_port_range(token, &mn, &mx); in parse_ip_ports_token() [all …]
|
D | cryptsetup-util.h | 51 extern int (*sym_crypt_token_json_get)(struct crypt_device *cd, int token, const char **json); 52 extern int (*sym_crypt_token_json_set)(struct crypt_device *cd, int token, const char *json); 64 extern crypt_token_info (*sym_crypt_token_status)(struct crypt_device *cd, int token, const char **…
|
D | cryptsetup-util.c | 45 int (*sym_crypt_token_json_get)(struct crypt_device *cd, int token, const char **json); 46 int (*sym_crypt_token_json_set)(struct crypt_device *cd, int token, const char *json); 50 crypt_token_info (*sym_crypt_token_status)(struct crypt_device *cd, int token, const char **type);
|
/systemd-251/src/cryptsetup/cryptsetup-tokens/ |
D | meson.build | 3 cryptsetup_token_sym = files('cryptsetup-token.sym') 4 cryptsetup_token_sym_path = meson.current_source_dir() / 'cryptsetup-token.sym' 7 'cryptsetup-token-common', 8 'cryptsetup-token.h', 9 'cryptsetup-token-util.h', 10 'cryptsetup-token-util.c', 16 'cryptsetup-token-systemd-tpm2.c', 21 'cryptsetup-token-systemd-fido2.c', 26 'cryptsetup-token-systemd-pkcs11.c',
|
D | cryptsetup-token-systemd-pkcs11.c | 26 int token /* is always >= 0 */, in cryptsetup_token_open_pin() argument 37 assert(token >= 0); in cryptsetup_token_open_pin() 40 r = crypt_token_json_get(cd, token, &json); in cryptsetup_token_open_pin() 41 assert(token == r); in cryptsetup_token_open_pin() 62 int token /* is always >= 0 */, in cryptsetup_token_open() argument 67 return cryptsetup_token_open_pin(cd, token, NULL, 0, password, password_len, usrptr); in cryptsetup_token_open()
|
D | cryptsetup-token-systemd-fido2.c | 26 int token /* is always >= 0 */, in cryptsetup_token_open_pin() argument 38 assert(token >= 0); in cryptsetup_token_open_pin() 41 r = crypt_token_json_get(cd, token, &json); in cryptsetup_token_open_pin() 42 assert(token == r); in cryptsetup_token_open_pin() 74 int token /* is always >= 0 */, in cryptsetup_token_open() argument 79 return cryptsetup_token_open_pin(cd, token, NULL, 0, password, password_len, usrptr); in cryptsetup_token_open()
|
D | cryptsetup-token-systemd-tpm2.c | 53 int token /* is always >= 0 */, in cryptsetup_token_open() argument 73 assert(token >= 0); in cryptsetup_token_open() 76 r = crypt_token_json_get(cd, token, &json); in cryptsetup_token_open() 77 assert(token == r); in cryptsetup_token_open()
|
D | cryptsetup-token.h | 8 int cryptsetup_token_open(struct crypt_device *cd, int token, 11 int cryptsetup_token_open_pin(struct crypt_device *cd, int token,
|
/systemd-251/src/cryptenroll/ |
D | cryptenroll-wipe.c | 102 for (int token = 0; token < sym_crypt_token_max(CRYPT_LUKS2); token++) { in find_slots_by_mask() local 107 r = cryptsetup_get_token_as_json(cd, token, NULL, &v); in find_slots_by_mask() 202 for (int token = 0; token < sym_crypt_token_max(CRYPT_LUKS2); token++) { in find_slot_tokens() local 207 r = cryptsetup_get_token_as_json(cd, token, NULL, &v); in find_slot_tokens() 263 if (set_put(wipe_tokens, INT_TO_PTR(token)) < 0) in find_slot_tokens()
|
D | cryptenroll-list.c | 40 for (int token = 0; token < sym_crypt_token_max(CRYPT_LUKS2); token++) { in list_enrolled() local 46 r = cryptsetup_get_token_as_json(cd, token, NULL, &v); in list_enrolled()
|
D | cryptenroll-tpm2.c | 25 for (int token = 0; token < sym_crypt_token_max(CRYPT_LUKS2); token ++) { in search_policy_hash() local 32 r = cryptsetup_get_token_as_json(cd, token, "systemd-tpm2", &v); in search_policy_hash() 42 … log_warning_errno(keyslot, "Failed to determine keyslot of JSON token %i, skipping: %m", token); in search_policy_hash()
|
D | cryptenroll.c | 420 for (int token = 0; token < crypt_token_max(CRYPT_LUKS2); token ++) { in check_for_homed() local 421 r = cryptsetup_get_token_as_json(cd, token, "systemd-homed", NULL); in check_for_homed()
|
/systemd-251/coccinelle/ |
D | errno.cocci | 51 identifier log_UNIT_LEVEL_errno =~ "^log_(unit|link|netdev|device|token)_(debug|info|notice|warning… 60 identifier log_UNIT_LEVEL_errno =~ "^log_(unit|link|netdev|device|token)_(debug|info|notice|warning… 69 identifier log_UNIT_LEVEL_errno =~ "^log_(unit|link|netdev|device|token)_(debug|info|notice|warning… 79 identifier log_UNIT_LEVEL_errno =~ "^log_(unit|link|netdev|device|token)_(debug|info|notice|warning… 87 identifier log_UNIT_LEVEL_errno =~ "^log_(unit|link|netdev|device|token)_(debug|info|notice|warning… 95 identifier log_UNIT_LEVEL_errno =~ "^log_(unit|link|netdev|device|token)_(debug|info|notice|warning…
|
/systemd-251/src/cryptsetup/ |
D | cryptsetup-tpm2.c | 178 int r, keyslot = -1, token = -1; in find_tpm2_auto_data() local 186 for (token = start_token; token < sym_crypt_token_max(CRYPT_LUKS2); token++) { in find_tpm2_auto_data() 191 r = cryptsetup_get_token_as_json(cd, token, "systemd-tpm2", &v); in find_tpm2_auto_data() 201 …ing_errno(ks, "Failed to extract keyslot index from TPM2 JSON data token %i, skipping: %m", token); in find_tpm2_auto_data() 318 *ret_token = token; in find_tpm2_auto_data()
|
D | cryptsetup-pkcs11.c | 111 for (int token = 0; token < sym_crypt_token_max(CRYPT_LUKS2); token++) { in find_pkcs11_auto_data() local 116 r = cryptsetup_get_token_as_json(cd, token, "systemd-pkcs11", &v); in find_pkcs11_auto_data() 126 …_errno(ks, "Failed to extract keyslot index from PKCS#11 JSON data token %i, skipping: %m", token); in find_pkcs11_auto_data()
|
D | cryptsetup-fido2.c | 150 for (int token = 0; token < sym_crypt_token_max(CRYPT_LUKS2); token ++) { in find_fido2_auto_data() local 155 r = cryptsetup_get_token_as_json(cd, token, "systemd-fido2", &v); in find_fido2_auto_data() 165 …ng_errno(ks, "Failed to extract keyslot index from FIDO2 JSON data token %i, skipping: %m", token); in find_fido2_auto_data()
|
/systemd-251/src/fundamental/ |
D | string-util-fundamental.h | 71 static inline void *memory_startswith(const void *p, size_t sz, const sd_char *token) { in memory_startswith() argument 72 assert(token); in memory_startswith() 74 size_t n = strlen(token) * sizeof(sd_char); in memory_startswith() 80 if (memcmp(p, token, n) != 0) in memory_startswith()
|
/systemd-251/src/core/ |
D | automount.c | 453 static int autofs_send_ready(int dev_autofs_fd, int ioctl_fd, uint32_t token, int status) { in autofs_send_ready() argument 463 param.fail.token = token; in autofs_send_ready() 466 param.ready.token = token; in autofs_send_ready() 473 unsigned token; in automount_send_ready() local 494 while ((token = PTR_TO_UINT(set_steal_first(tokens)))) { in automount_send_ready() 504 token, in automount_send_ready() 918 unsigned token; in automount_deserialize_item() local 920 if (safe_atou(value, &token) < 0) in automount_deserialize_item() 923 r = set_ensure_put(&a->tokens, NULL, UINT_TO_PTR(token)); in automount_deserialize_item() 928 unsigned token; in automount_deserialize_item() local [all …]
|
/systemd-251/src/basic/ |
D | string-util.h | 200 static inline void *memory_startswith_no_case(const void *p, size_t sz, const char *token) { in memory_startswith_no_case() argument 201 assert(token); in memory_startswith_no_case() 203 size_t n = strlen(token); in memory_startswith_no_case() 210 if (ascii_tolower(((char *)p)[i]) != ascii_tolower(token[i])) in memory_startswith_no_case()
|
/systemd-251/rules.d/ |
D | 60-fido-id.rules | 7 # Tag any form of security token as such 11 # Tag any CCID device (i.e. Smartcard Reader) as security token
|
/systemd-251/.github/workflows/ |
D | cflite_pr.yml | 31 github-token: ${{ secrets.GITHUB_TOKEN }} 36 github-token: ${{ secrets.GITHUB_TOKEN }}
|
/systemd-251/src/shared/linux/ |
D | auto_dev-ioctl.h | 41 __u32 token; member 45 __u32 token; member
|
/systemd-251/units/ |
D | systemd-boot-system-token.service | 12 Documentation=man:systemd-boot-system-token.service(8) 25 # Only run this if there is no system token defined yet, or …
|
/systemd-251/src/libsystemd/sd-bus/ |
D | bus-socket.c | 272 _cleanup_free_ char *token = NULL; in verify_anonymous_token() local 288 r = unhexmem(p, l, (void **) &token, &len); in verify_anonymous_token() 292 if (memchr(token, 0, len)) in verify_anonymous_token() 295 return !!utf8_is_valid(token); in verify_anonymous_token() 299 _cleanup_free_ char *token = NULL; in verify_external_token() local 320 r = unhexmem(p, l, (void**) &token, &len); in verify_external_token() 324 if (memchr(token, 0, len)) in verify_external_token() 327 r = parse_uid(token, &u); in verify_external_token()
|