Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 45) sorted by relevance

12

/Linux-v5.4/security/keys/encrypted-keys/
Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/Linux-v5.4/fs/ecryptfs/
Ddebug.c29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
Dkeystore.c760 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
761 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet()
815 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
823 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
1031 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1039 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1104 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig()
1463 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
1467 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet()
1483 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet()
[all …]
/Linux-v5.4/sound/isa/opti9xx/
Dopti92x-ad1848.c119 unsigned char password; member
204 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init()
210 chip->password = 0xe5; in snd_opti9xx_init()
221 chip->password = 0xe4; in snd_opti9xx_init()
240 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
248 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
264 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
283 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
291 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
307 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
[all …]
Dmiro.c96 unsigned char password; member
795 chip->password = 0xe3; in snd_miro_init()
799 chip->password = 0xe5; in snd_miro_init()
817 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
823 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
847 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
853 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
/Linux-v5.4/Documentation/scsi/
Darcmsr_spec.txt131 ** no password checking is needed and should be implemented in separate
133 ** Command code 0x20--0x?? always check the password,
134 ** password must be entered to enable these command.
185 ** byte 3 : password length (should be 0x0f)
191 ** byte 3 : password length (should be 0x08)
197 ** byte 3 : password length (should be 0x08)
204 ** GUI_CHECK_PASSWORD : Verify password
207 ** byte 3 : password length
208 ** byte 4-0x?? : user password to be checked
209 ** GUI_LOGOUT : Logout GUI (force password checking on next command)
[all …]
/Linux-v5.4/drivers/of/unittest-data/
Dtests-phandle.dtsi9 security-password = "password";
/Linux-v5.4/drivers/input/mouse/
Delan_i2c_smbus.c351 u16 password; in elan_smbus_prepare_fw_update() local
394 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update()
395 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update()
396 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
Delan_i2c_i2c.c516 u16 password; in elan_i2c_prepare_fw_update() local
566 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update()
567 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update()
568 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
/Linux-v5.4/tools/testing/selftests/net/
Dnettest.c77 const char *password; member
203 static int tcp_md5sig(int sd, void *addr, socklen_t alen, const char *password) in tcp_md5sig() argument
206 int keylen = password ? strlen(password) : 0; in tcp_md5sig()
214 memcpy(md5sig.tcpm_key, password, keylen); in tcp_md5sig()
257 if (tcp_md5sig(sd, addr, alen, args->password)) in tcp_md5_remote()
1195 if (args->password && tcp_md5_remote(lsd, args)) { in do_server()
1316 if (args->password && tcp_md5sig(sd, addr, alen, args->password)) in connectsock()
1643 args.password = optarg; in main()
1708 if (args.password && in main()
/Linux-v5.4/Documentation/ABI/testing/
Dsysfs-ibft15 contain the CHAP name (and password), the reverse CHAP
16 name (and password)
/Linux-v5.4/fs/cifs/
Dcifsencrypt.c281 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response()
289 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response()
305 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument
312 if (password) { in calc_lanman_hash()
314 if (!password[len]) in calc_lanman_hash()
317 memcpy(password_with_pad, password, len); in calc_lanman_hash()
512 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
Dconnect.c2169 kzfree(vol->password); in cifs_parse_mount_options()
2170 vol->password = NULL; in cifs_parse_mount_options()
2207 kzfree(vol->password); in cifs_parse_mount_options()
2210 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options()
2211 if (vol->password == NULL) { in cifs_parse_mount_options()
2217 vol->password[j] = value[i]; in cifs_parse_mount_options()
2223 vol->password[j] = '\0'; in cifs_parse_mount_options()
2883 ses->password != NULL && in match_session()
2884 strncmp(ses->password, in match_session()
2885 vol->password ? vol->password : "", in match_session()
[all …]
Ddfs_cache.c1092 if (vol->password) { in dup_vol()
1093 new->password = kstrndup(vol->password, strlen(vol->password), in dup_vol()
1095 if (!new->password) in dup_vol()
1133 kzfree(new->password); in dup_vol()
Dmisc.c102 kzfree(buf_to_free->password); in sesInfoFree()
147 kzfree(buf_to_free->password); in tconInfoFree()
Dcifsglob.h531 char *password; member
979 char *password; member
1040 char *password; /* for share-level security */ member
/Linux-v5.4/Documentation/admin-guide/cifs/
Dusage.rst211 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword
219 password=<password>
244 password=your_password
246 2) By specifying the password in the PASSWD environment variable (similarly
248 3) By specifying the password in a file by name via PASSWD_FILE
249 4) By specifying the password in a file by file descriptor via PASSWD_FD
251 If no password is provided, mount.cifs will prompt for password entry
282 password
283 The user password. If the mount helper is
284 installed, the user will be prompted for password
[all …]
/Linux-v5.4/drivers/scsi/qla4xxx/
Dql4_glbl.h85 char *password, int bidi, uint16_t *chap_index);
86 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
170 char *password, uint16_t idx);
269 char *password, uint16_t chap_index);
Dql4_mbx.c1578 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument
1619 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap()
1640 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument
1660 chap_table->secret_len = strlen(password); in qla4xxx_set_chap()
1661 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap()
1697 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument
1709 if (!username || !password) { in qla4xxx_get_uni_chap_at_index()
1740 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index()
1764 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument
1783 if (!username || !password) { in qla4xxx_get_chap_index()
[all …]
/Linux-v5.4/include/linux/
Decryptfs.h101 struct ecryptfs_password password; member
/Linux-v5.4/drivers/target/iscsi/
Discsi_target_auth.c260 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_md5()
261 strlen(auth->password)); in chap_server_compute_md5()
/Linux-v5.4/Documentation/i2c/busses/
Di2c-ali15x3.rst71 full data sheets on the web site are password protected, however if you
72 contact the ALI office in San Jose they may give you the password.
/Linux-v5.4/Documentation/filesystems/cifs/
Dcifsroot.txt94 …-append "root=/dev/cifs rw ip=dhcp cifsroot=//10.0.2.2/linux,username=foo,password=bar console=tty…
/Linux-v5.4/Documentation/security/
Dsak.rst9 provided as protection against trojan password capturing programs. It
/Linux-v5.4/include/scsi/
Dlibiscsi.h297 char *password; member

12