Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 55) sorted by relevance

123

/Linux-v6.1/security/keys/encrypted-keys/
Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/Linux-v6.1/Documentation/ABI/testing/
Dsysfs-class-firmware-attributes139 For example a "BIOS Admin" password and "System" Password can be set,
142 - An "Admin" password is used for preventing modification to the BIOS
144 - A "System" password is required to boot a machine.
160 Representing BIOS administrator password
162 Representing a password required to use
165 Representing System Management password.
168 Representing HDD password
171 Representing NVMe password
176 Only supported type currently is "password".
188 setting attributes when a system or admin password is set
[all …]
Dsysfs-ibft15 contain the CHAP name (and password), the reverse CHAP
16 name (and password)
/Linux-v6.1/arch/powerpc/platforms/pseries/
Dplpks.c50 u8 password[]; member
126 u8 *password, consumer = PKS_OS_OWNER; in plpks_gen_password() local
129 password = kzalloc(maxpwsize, GFP_KERNEL); in plpks_gen_password()
130 if (!password) in plpks_gen_password()
134 virt_to_phys(password), maxpwsize); in plpks_gen_password()
140 kfree(password); in plpks_gen_password()
143 memcpy(ospassword, password, ospasswordlength); in plpks_gen_password()
153 kfree(password); in plpks_gen_password()
165 auth = kmalloc(struct_size(auth, password, maxpwsize), GFP_KERNEL); in construct_auth()
179 memcpy(auth->password, ospassword, ospasswordlength); in construct_auth()
/Linux-v6.1/fs/ecryptfs/
Ddebug.c29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
Dkeystore.c761 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
762 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet()
816 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
824 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
1032 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1040 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1105 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig()
1464 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
1468 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet()
1484 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet()
[all …]
/Linux-v6.1/sound/isa/opti9xx/
Dopti92x-ad1848.c113 unsigned char password; member
198 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init()
204 chip->password = 0xe5; in snd_opti9xx_init()
215 chip->password = 0xe4; in snd_opti9xx_init()
234 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
242 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
258 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
277 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
285 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
301 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
[all …]
Dmiro.c93 unsigned char password; member
800 chip->password = 0xe3; in snd_miro_init()
804 chip->password = 0xe5; in snd_miro_init()
822 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
828 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
852 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
858 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
/Linux-v6.1/Documentation/scsi/
Darcmsr_spec.rst228 no password checking is needed and should be implemented in separate
230 Command code 0x20--0x?? always check the password,
231 password must be entered to enable these command::
289 byte 3 password length (should be 0x0f)
300 byte 3 password length (should be 0x08)
311 byte 3 password length (should be 0x08)
326 Verify password
331 byte 3 password length
332 byte 4-0x?? user password to be checked
336 Logout GUI (force password checking on next command)
[all …]
/Linux-v6.1/drivers/of/unittest-data/
Dtests-phandle.dtsi9 security-password = "password";
/Linux-v6.1/fs/cifs/
Dfs_context.c314 new_ctx->password = NULL; in smb3_fs_context_dup()
326 DUP_CTX_STR(password); in smb3_fs_context_dup()
759 if (new_ctx->password && in smb3_verify_reconfigure_ctx()
760 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx()
821 STEAL_STRING_SENSITIVE(cifs_sb, ctx, password); in smb3_reconfigure()
1172 kfree_sensitive(ctx->password); in smb3_fs_context_parse_param()
1173 ctx->password = NULL; in smb3_fs_context_parse_param()
1177 ctx->password = kstrdup(param->string, GFP_KERNEL); in smb3_fs_context_parse_param()
1178 if (ctx->password == NULL) { in smb3_fs_context_parse_param()
1480 kfree_sensitive(ctx->password); in smb3_fs_context_parse_param()
[all …]
Dconnect.c1812 ses->password != NULL && in match_session()
1813 strncmp(ses->password, in match_session()
1814 ctx->password ? ctx->password : "", in match_session()
2101 ctx->password = kstrndup(delim, len, GFP_KERNEL); in cifs_set_cifscreds()
2102 if (!ctx->password) { in cifs_set_cifscreds()
2123 kfree_sensitive(ctx->password); in cifs_set_cifscreds()
2124 ctx->password = NULL; in cifs_set_cifscreds()
2228 if (ctx->password) { in cifs_get_smb_ses()
2229 ses->password = kstrdup(ctx->password, GFP_KERNEL); in cifs_get_smb_ses()
2230 if (!ses->password) in cifs_get_smb_ses()
[all …]
Dfs_context.h169 char *password; member
Dcifs_swn.c56 if (tcon->ses->password != NULL) { in cifs_swn_auth_info_ntlm()
57 ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_PASSWORD, tcon->ses->password); in cifs_swn_auth_info_ntlm()
/Linux-v6.1/drivers/platform/x86/
Dthink-lmi.c330 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument
333 password); in tlmi_save_bios_settings()
410 strscpy(setting->password, buf, setting->maxlen); in current_password_store()
412 strip_cr(setting->password); in current_password_store()
472 tlmi_priv.pwd_admin->password); in new_password_store()
476 ret = tlmi_opcode_setting("WmiOpcodePasswordCurrent01", setting->password); in new_password_store()
486 setting->pwd_type, setting->password, new_pwd, in new_password_store()
780 if (!setting->valid || !setting->password[0]) { in certificate_store()
787 new_cert, setting->password); in certificate_store()
990 if (tlmi_priv.pwd_admin->valid && tlmi_priv.pwd_admin->password[0]) { in current_value_store()
[all …]
Dthink-lmi.h56 char password[TLMI_PWD_BUFSIZE]; member
/Linux-v6.1/Documentation/admin-guide/cifs/
Dusage.rst210 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword
218 password=<password>
243 password=your_password
245 2) By specifying the password in the PASSWD environment variable (similarly
247 3) By specifying the password in a file by name via PASSWD_FILE
248 4) By specifying the password in a file by file descriptor via PASSWD_FD
250 If no password is provided, mount.cifs will prompt for password entry
281 password
282 The user password. If the mount helper is
283 installed, the user will be prompted for password
[all …]
/Linux-v6.1/drivers/input/mouse/
Delan_i2c_smbus.c352 u16 password; in elan_smbus_prepare_fw_update() local
395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update()
396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update()
397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
Delan_i2c_i2c.c562 u16 password; in elan_i2c_prepare_fw_update() local
618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update()
619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update()
620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
/Linux-v6.1/drivers/scsi/qla4xxx/
Dql4_glbl.h84 char *password, int bidi, uint16_t *chap_index);
85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
168 char *password, uint16_t idx);
267 char *password, uint16_t chap_index);
Dql4_mbx.c1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument
1614 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap()
1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument
1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap()
1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap()
1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument
1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index()
1735 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index()
1759 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument
1778 if (!username || !password) { in qla4xxx_get_chap_index()
[all …]
/Linux-v6.1/tools/testing/selftests/net/
Dnettest.c97 const char *password; member
264 int keylen = strlen(args->password); in tcp_md5sig()
270 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig()
1549 if (args->password && tcp_md5_remote(lsd, args)) { in do_server()
1673 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock()
1754 args->password = args->client_pw; in do_client()
2022 args.password = optarg; in main()
2095 if (args.password && in main()
2102 if (args.md5_prefix_str && !args.password) { in main()
/Linux-v6.1/include/linux/
Decryptfs.h101 struct ecryptfs_password password; member
/Linux-v6.1/Documentation/i2c/busses/
Di2c-ali15x3.rst71 full data sheets on the web site are password protected, however if you
72 contact the ALI office in San Jose they may give you the password.
/Linux-v6.1/drivers/target/iscsi/
Discsi_target_auth.c383 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash()
384 strlen(auth->password)); in chap_server_compute_hash()

123