Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 42) sorted by relevance

12

/Linux-v4.19/security/keys/encrypted-keys/
Decryptfs_format.c23 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
59 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
61 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
69 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
75 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
76 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/Linux-v4.19/fs/ecryptfs/
Ddebug.c43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
47 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
51 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
Dkeystore.c775 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
776 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet()
830 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
838 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
1046 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1054 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1118 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig()
1477 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
1481 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet()
1497 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet()
[all …]
/Linux-v4.19/sound/isa/opti9xx/
Dopti92x-ad1848.c131 unsigned char password; member
216 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init()
222 chip->password = 0xe5; in snd_opti9xx_init()
233 chip->password = 0xe4; in snd_opti9xx_init()
252 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
260 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
276 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
295 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
303 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
319 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
[all …]
Dmiro.c109 unsigned char password; member
808 chip->password = 0xe3; in snd_miro_init()
812 chip->password = 0xe5; in snd_miro_init()
830 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
836 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
860 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
866 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
/Linux-v4.19/drivers/of/unittest-data/
Dtests-phandle.dtsi9 security-password = "password";
/Linux-v4.19/Documentation/scsi/
Darcmsr_spec.txt131 ** no password checking is needed and should be implemented in separate
133 ** Command code 0x20--0x?? always check the password,
134 ** password must be entered to enable these command.
185 ** byte 3 : password length (should be 0x0f)
191 ** byte 3 : password length (should be 0x08)
197 ** byte 3 : password length (should be 0x08)
204 ** GUI_CHECK_PASSWORD : Verify password
207 ** byte 3 : password length
208 ** byte 4-0x?? : user password to be checked
209 ** GUI_LOGOUT : Logout GUI (force password checking on next command)
[all …]
/Linux-v4.19/drivers/input/mouse/
Delan_i2c_smbus.c354 u16 password; in elan_smbus_prepare_fw_update() local
397 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update()
398 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update()
399 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
Delan_i2c_i2c.c519 u16 password; in elan_i2c_prepare_fw_update() local
569 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update()
570 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update()
571 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
/Linux-v4.19/Documentation/ABI/testing/
Dsysfs-ibft15 contain the CHAP name (and password), the reverse CHAP
16 name (and password)
/Linux-v4.19/Documentation/filesystems/cifs/
DREADME191 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword
199 password=<password>
222 password=your_password
223 2) By specifying the password in the PASSWD environment variable (similarly
225 3) By specifying the password in a file by name via PASSWD_FILE
226 4) By specifying the password in a file by file descriptor via PASSWD_FD
228 If no password is provided, mount.cifs will prompt for password entry
256 password The user password. If the mount helper is
257 installed, the user will be prompted for password
356 -o user=myname,password=mypassword,domain=mydom
[all …]
/Linux-v4.19/fs/cifs/
Dcifsencrypt.c280 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response()
288 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response()
304 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument
311 if (password) in calc_lanman_hash()
312 strncpy(password_with_pad, password, CIFS_ENCPWD_SIZE); in calc_lanman_hash()
506 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
Dconnect.c1825 kzfree(vol->password); in cifs_parse_mount_options()
1826 vol->password = NULL; in cifs_parse_mount_options()
1863 kzfree(vol->password); in cifs_parse_mount_options()
1866 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options()
1867 if (vol->password == NULL) { in cifs_parse_mount_options()
1873 vol->password[j] = value[i]; in cifs_parse_mount_options()
1879 vol->password[j] = '\0'; in cifs_parse_mount_options()
2515 ses->password != NULL && in match_session()
2516 strncmp(ses->password, in match_session()
2517 vol->password ? vol->password : "", in match_session()
[all …]
Dcifsglob.h496 char *password; member
876 char *password; member
932 char *password; /* for share-level security */ member
Dmisc.c102 kzfree(buf_to_free->password); in sesInfoFree()
139 kzfree(buf_to_free->password); in tconInfoFree()
/Linux-v4.19/drivers/scsi/qla4xxx/
Dql4_glbl.h85 char *password, int bidi, uint16_t *chap_index);
86 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
170 char *password, uint16_t idx);
269 char *password, uint16_t chap_index);
Dql4_mbx.c1578 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument
1619 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap()
1640 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument
1660 chap_table->secret_len = strlen(password); in qla4xxx_set_chap()
1661 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap()
1697 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument
1709 if (!username || !password) { in qla4xxx_get_uni_chap_at_index()
1740 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index()
1764 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument
1783 if (!username || !password) { in qla4xxx_get_chap_index()
[all …]
/Linux-v4.19/include/linux/
Decryptfs.h101 struct ecryptfs_password password; member
/Linux-v4.19/drivers/target/iscsi/
Discsi_target_auth.c269 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_md5()
270 strlen(auth->password)); in chap_server_compute_md5()
Discsi_target_configfs.c406 DEF_NACL_AUTH_STR(password, NAF_PASSWORD_SET);
865 DEF_TPG_AUTH_STR(password, NAF_PASSWORD_SET);
1250 DEF_DISC_AUTH_STR(password, NAF_PASSWORD_SET);
/Linux-v4.19/Documentation/i2c/busses/
Di2c-ali15x363 full data sheets on the web site are password protected, however if you
64 contact the ALI office in San Jose they may give you the password.
/Linux-v4.19/Documentation/
DSAK.txt9 provided as protection against trojan password capturing programs. It
/Linux-v4.19/include/scsi/
Dlibiscsi.h310 char *password; member
Dscsi_transport_iscsi.h376 char *password; member
Discsi_if.h852 uint8_t password[ISCSI_CHAP_AUTH_SECRET_MAX_LEN]; member

12