/Linux-v4.19/security/keys/encrypted-keys/ |
D | ecryptfs_format.c | 23 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 59 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 61 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 69 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 75 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 76 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
/Linux-v4.19/fs/ecryptfs/ |
D | debug.c | 43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 47 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 51 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
D | keystore.c | 775 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 776 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet() 830 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 838 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1046 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1054 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1118 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1477 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 1481 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet() 1497 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet() [all …]
|
/Linux-v4.19/sound/isa/opti9xx/ |
D | opti92x-ad1848.c | 131 unsigned char password; member 216 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init() 222 chip->password = 0xe5; in snd_opti9xx_init() 233 chip->password = 0xe4; in snd_opti9xx_init() 252 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 260 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 276 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 295 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 303 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 319 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() [all …]
|
D | miro.c | 109 unsigned char password; member 808 chip->password = 0xe3; in snd_miro_init() 812 chip->password = 0xe5; in snd_miro_init() 830 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 836 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 860 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write() 866 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
|
/Linux-v4.19/drivers/of/unittest-data/ |
D | tests-phandle.dtsi | 9 security-password = "password";
|
/Linux-v4.19/Documentation/scsi/ |
D | arcmsr_spec.txt | 131 ** no password checking is needed and should be implemented in separate 133 ** Command code 0x20--0x?? always check the password, 134 ** password must be entered to enable these command. 185 ** byte 3 : password length (should be 0x0f) 191 ** byte 3 : password length (should be 0x08) 197 ** byte 3 : password length (should be 0x08) 204 ** GUI_CHECK_PASSWORD : Verify password 207 ** byte 3 : password length 208 ** byte 4-0x?? : user password to be checked 209 ** GUI_LOGOUT : Logout GUI (force password checking on next command) [all …]
|
/Linux-v4.19/drivers/input/mouse/ |
D | elan_i2c_smbus.c | 354 u16 password; in elan_smbus_prepare_fw_update() local 397 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 398 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 399 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
|
D | elan_i2c_i2c.c | 519 u16 password; in elan_i2c_prepare_fw_update() local 569 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 570 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 571 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
/Linux-v4.19/Documentation/ABI/testing/ |
D | sysfs-ibft | 15 contain the CHAP name (and password), the reverse CHAP 16 name (and password)
|
/Linux-v4.19/Documentation/filesystems/cifs/ |
D | README | 191 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword 199 password=<password> 222 password=your_password 223 2) By specifying the password in the PASSWD environment variable (similarly 225 3) By specifying the password in a file by name via PASSWD_FILE 226 4) By specifying the password in a file by file descriptor via PASSWD_FD 228 If no password is provided, mount.cifs will prompt for password entry 256 password The user password. If the mount helper is 257 installed, the user will be prompted for password 356 -o user=myname,password=mypassword,domain=mydom [all …]
|
/Linux-v4.19/fs/cifs/ |
D | cifsencrypt.c | 280 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response() 288 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response() 304 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument 311 if (password) in calc_lanman_hash() 312 strncpy(password_with_pad, password, CIFS_ENCPWD_SIZE); in calc_lanman_hash() 506 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
|
D | connect.c | 1825 kzfree(vol->password); in cifs_parse_mount_options() 1826 vol->password = NULL; in cifs_parse_mount_options() 1863 kzfree(vol->password); in cifs_parse_mount_options() 1866 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options() 1867 if (vol->password == NULL) { in cifs_parse_mount_options() 1873 vol->password[j] = value[i]; in cifs_parse_mount_options() 1879 vol->password[j] = '\0'; in cifs_parse_mount_options() 2515 ses->password != NULL && in match_session() 2516 strncmp(ses->password, in match_session() 2517 vol->password ? vol->password : "", in match_session() [all …]
|
D | cifsglob.h | 496 char *password; member 876 char *password; member 932 char *password; /* for share-level security */ member
|
D | misc.c | 102 kzfree(buf_to_free->password); in sesInfoFree() 139 kzfree(buf_to_free->password); in tconInfoFree()
|
/Linux-v4.19/drivers/scsi/qla4xxx/ |
D | ql4_glbl.h | 85 char *password, int bidi, uint16_t *chap_index); 86 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 170 char *password, uint16_t idx); 269 char *password, uint16_t chap_index);
|
D | ql4_mbx.c | 1578 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument 1619 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1640 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument 1660 chap_table->secret_len = strlen(password); in qla4xxx_set_chap() 1661 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap() 1697 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument 1709 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1740 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1764 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument 1783 if (!username || !password) { in qla4xxx_get_chap_index() [all …]
|
/Linux-v4.19/include/linux/ |
D | ecryptfs.h | 101 struct ecryptfs_password password; member
|
/Linux-v4.19/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 269 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_md5() 270 strlen(auth->password)); in chap_server_compute_md5()
|
D | iscsi_target_configfs.c | 406 DEF_NACL_AUTH_STR(password, NAF_PASSWORD_SET); 865 DEF_TPG_AUTH_STR(password, NAF_PASSWORD_SET); 1250 DEF_DISC_AUTH_STR(password, NAF_PASSWORD_SET);
|
/Linux-v4.19/Documentation/i2c/busses/ |
D | i2c-ali15x3 | 63 full data sheets on the web site are password protected, however if you 64 contact the ALI office in San Jose they may give you the password.
|
/Linux-v4.19/Documentation/ |
D | SAK.txt | 9 provided as protection against trojan password capturing programs. It
|
/Linux-v4.19/include/scsi/ |
D | libiscsi.h | 310 char *password; member
|
D | scsi_transport_iscsi.h | 376 char *password; member
|
D | iscsi_if.h | 852 uint8_t password[ISCSI_CHAP_AUTH_SECRET_MAX_LEN]; member
|