| /Linux-v5.15/security/keys/encrypted-keys/ |
| D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
| /Linux-v5.15/Documentation/ABI/testing/ |
| D | sysfs-class-firmware-attributes | 139 For example a "BIOS Admin" password and "System" Password can be set, 142 - An "Admin" password is used for preventing modification to the BIOS 144 - A "System" password is required to boot a machine. 160 Representing BIOS administrator password 162 Representing a password required to use 167 Only supported type currently is "password". 179 setting attributes when a system or admin password is set 180 or resetting to a new password 182 This attribute is mandatory when mechanism == "password". 186 current_password will reset a system or admin password. [all …]
|
| D | sysfs-ibft | 15 contain the CHAP name (and password), the reverse CHAP 16 name (and password)
|
| /Linux-v5.15/fs/ecryptfs/ |
| D | debug.c | 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
| D | keystore.c | 761 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 762 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet() 816 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 824 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1032 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1040 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1105 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1464 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 1468 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet() 1484 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet() [all …]
|
| /Linux-v5.15/sound/isa/opti9xx/ |
| D | opti92x-ad1848.c | 113 unsigned char password; member 198 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init() 204 chip->password = 0xe5; in snd_opti9xx_init() 215 chip->password = 0xe4; in snd_opti9xx_init() 234 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 242 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 258 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 277 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 285 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 301 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() [all …]
|
| D | miro.c | 93 unsigned char password; member 800 chip->password = 0xe3; in snd_miro_init() 804 chip->password = 0xe5; in snd_miro_init() 822 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 828 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 852 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write() 858 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
|
| /Linux-v5.15/Documentation/scsi/ |
| D | arcmsr_spec.rst | 228 no password checking is needed and should be implemented in separate 230 Command code 0x20--0x?? always check the password, 231 password must be entered to enable these command:: 289 byte 3 password length (should be 0x0f) 300 byte 3 password length (should be 0x08) 311 byte 3 password length (should be 0x08) 326 Verify password 331 byte 3 password length 332 byte 4-0x?? user password to be checked 336 Logout GUI (force password checking on next command) [all …]
|
| /Linux-v5.15/drivers/of/unittest-data/ |
| D | tests-phandle.dtsi | 9 security-password = "password";
|
| /Linux-v5.15/fs/cifs/ |
| D | fs_context.c | 309 new_ctx->password = NULL; in smb3_fs_context_dup() 320 DUP_CTX_STR(password); in smb3_fs_context_dup() 706 if (new_ctx->password && in smb3_verify_reconfigure_ctx() 707 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx() 756 STEAL_STRING(cifs_sb, ctx, password); in smb3_reconfigure() 1097 kfree(ctx->password); in smb3_fs_context_parse_param() 1098 ctx->password = NULL; in smb3_fs_context_parse_param() 1102 ctx->password = kstrdup(param->string, GFP_KERNEL); in smb3_fs_context_parse_param() 1103 if (ctx->password == NULL) { in smb3_fs_context_parse_param() 1497 kfree_sensitive(ctx->password); in smb3_cleanup_fs_context_contents() [all …]
|
| D | connect.c | 1541 ses->password != NULL && in match_session() 1542 strncmp(ses->password, in match_session() 1543 ctx->password ? ctx->password : "", in match_session() 1814 ctx->password = kstrndup(delim, len, GFP_KERNEL); in cifs_set_cifscreds() 1815 if (!ctx->password) { in cifs_set_cifscreds() 1836 kfree_sensitive(ctx->password); in cifs_set_cifscreds() 1837 ctx->password = NULL; in cifs_set_cifscreds() 1932 if (ctx->password) { in cifs_get_smb_ses() 1933 ses->password = kstrdup(ctx->password, GFP_KERNEL); in cifs_get_smb_ses() 1934 if (!ses->password) in cifs_get_smb_ses() [all …]
|
| D | fs_context.h | 166 char *password; member
|
| /Linux-v5.15/drivers/platform/x86/ |
| D | think-lmi.c | 267 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument 270 password); in tlmi_save_bios_settings() 334 strscpy(setting->password, buf, setting->maxlen); in current_password_store() 336 p = strchrnul(setting->password, '\n'); in current_password_store() 375 setting->pwd_type, setting->password, new_pwd, in new_password_store() 555 if (tlmi_priv.pwd_admin->valid && tlmi_priv.pwd_admin->password[0]) { in current_value_store() 557 tlmi_priv.pwd_admin->password, in current_value_store() 695 if (tlmi_priv.pwd_admin->valid && tlmi_priv.pwd_admin->password[0]) { in debug_cmd_store() 697 tlmi_priv.pwd_admin->password, in debug_cmd_store()
|
| D | think-lmi.h | 38 char password[TLMI_PWD_BUFSIZE]; member
|
| /Linux-v5.15/Documentation/admin-guide/cifs/ |
| D | usage.rst | 210 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword 218 password=<password> 243 password=your_password 245 2) By specifying the password in the PASSWD environment variable (similarly 247 3) By specifying the password in a file by name via PASSWD_FILE 248 4) By specifying the password in a file by file descriptor via PASSWD_FD 250 If no password is provided, mount.cifs will prompt for password entry 281 password 282 The user password. If the mount helper is 283 installed, the user will be prompted for password [all …]
|
| /Linux-v5.15/drivers/input/mouse/ |
| D | elan_i2c_smbus.c | 352 u16 password; in elan_smbus_prepare_fw_update() local 395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
|
| D | elan_i2c_i2c.c | 562 u16 password; in elan_i2c_prepare_fw_update() local 618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
| /Linux-v5.15/drivers/scsi/qla4xxx/ |
| D | ql4_glbl.h | 84 char *password, int bidi, uint16_t *chap_index); 85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 168 char *password, uint16_t idx); 267 char *password, uint16_t chap_index);
|
| D | ql4_mbx.c | 1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument 1614 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument 1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap() 1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap() 1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument 1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1735 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1759 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument 1778 if (!username || !password) { in qla4xxx_get_chap_index() [all …]
|
| /Linux-v5.15/tools/testing/selftests/net/ |
| D | nettest.c | 96 const char *password; member 260 int keylen = strlen(args->password); in tcp_md5sig() 266 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig() 1514 if (args->password && tcp_md5_remote(lsd, args)) { in do_server() 1638 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock() 1719 args->password = args->client_pw; in do_client() 1985 args.password = optarg; in main() 2052 if (args.password && in main() 2059 if (args.md5_prefix_str && !args.password) { in main()
|
| /Linux-v5.15/include/linux/ |
| D | ecryptfs.h | 101 struct ecryptfs_password password; member
|
| /Linux-v5.15/Documentation/i2c/busses/ |
| D | i2c-ali15x3.rst | 71 full data sheets on the web site are password protected, however if you 72 contact the ALI office in San Jose they may give you the password.
|
| /Linux-v5.15/drivers/target/iscsi/ |
| D | iscsi_target_auth.c | 340 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash() 341 strlen(auth->password)); in chap_server_compute_hash()
|
| /Linux-v5.15/Documentation/filesystems/cifs/ |
| D | ksmbd.rst | 52 ksmbd.mountd is userspace process to, transfer user account and password that 124 2. Create user/password for SMB share.
|
| D | cifsroot.rst | 102 …-append "root=/dev/cifs rw ip=dhcp cifsroot=//10.0.2.2/linux,username=foo,password=bar console=tty…
|