| /Linux-v5.4/security/keys/encrypted-keys/ |
| D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
| /Linux-v5.4/fs/ecryptfs/ |
| D | debug.c | 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
| D | keystore.c | 760 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 761 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet() 815 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 823 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1031 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1039 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1104 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1463 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 1467 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet() 1483 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet() [all …]
|
| /Linux-v5.4/sound/isa/opti9xx/ |
| D | opti92x-ad1848.c | 119 unsigned char password; member 204 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init() 210 chip->password = 0xe5; in snd_opti9xx_init() 221 chip->password = 0xe4; in snd_opti9xx_init() 240 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 248 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 264 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 283 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 291 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 307 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() [all …]
|
| D | miro.c | 96 unsigned char password; member 795 chip->password = 0xe3; in snd_miro_init() 799 chip->password = 0xe5; in snd_miro_init() 817 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 823 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 847 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write() 853 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
|
| /Linux-v5.4/Documentation/scsi/ |
| D | arcmsr_spec.txt | 131 ** no password checking is needed and should be implemented in separate 133 ** Command code 0x20--0x?? always check the password, 134 ** password must be entered to enable these command. 185 ** byte 3 : password length (should be 0x0f) 191 ** byte 3 : password length (should be 0x08) 197 ** byte 3 : password length (should be 0x08) 204 ** GUI_CHECK_PASSWORD : Verify password 207 ** byte 3 : password length 208 ** byte 4-0x?? : user password to be checked 209 ** GUI_LOGOUT : Logout GUI (force password checking on next command) [all …]
|
| /Linux-v5.4/drivers/of/unittest-data/ |
| D | tests-phandle.dtsi | 9 security-password = "password";
|
| /Linux-v5.4/drivers/input/mouse/ |
| D | elan_i2c_smbus.c | 351 u16 password; in elan_smbus_prepare_fw_update() local 394 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 395 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 396 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
|
| D | elan_i2c_i2c.c | 516 u16 password; in elan_i2c_prepare_fw_update() local 566 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 567 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 568 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
| /Linux-v5.4/tools/testing/selftests/net/ |
| D | nettest.c | 77 const char *password; member 203 static int tcp_md5sig(int sd, void *addr, socklen_t alen, const char *password) in tcp_md5sig() argument 206 int keylen = password ? strlen(password) : 0; in tcp_md5sig() 214 memcpy(md5sig.tcpm_key, password, keylen); in tcp_md5sig() 257 if (tcp_md5sig(sd, addr, alen, args->password)) in tcp_md5_remote() 1195 if (args->password && tcp_md5_remote(lsd, args)) { in do_server() 1316 if (args->password && tcp_md5sig(sd, addr, alen, args->password)) in connectsock() 1643 args.password = optarg; in main() 1708 if (args.password && in main()
|
| /Linux-v5.4/Documentation/ABI/testing/ |
| D | sysfs-ibft | 15 contain the CHAP name (and password), the reverse CHAP 16 name (and password)
|
| /Linux-v5.4/fs/cifs/ |
| D | cifsencrypt.c | 281 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response() 289 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response() 305 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument 312 if (password) { in calc_lanman_hash() 314 if (!password[len]) in calc_lanman_hash() 317 memcpy(password_with_pad, password, len); in calc_lanman_hash() 512 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
|
| D | connect.c | 2169 kzfree(vol->password); in cifs_parse_mount_options() 2170 vol->password = NULL; in cifs_parse_mount_options() 2207 kzfree(vol->password); in cifs_parse_mount_options() 2210 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options() 2211 if (vol->password == NULL) { in cifs_parse_mount_options() 2217 vol->password[j] = value[i]; in cifs_parse_mount_options() 2223 vol->password[j] = '\0'; in cifs_parse_mount_options() 2883 ses->password != NULL && in match_session() 2884 strncmp(ses->password, in match_session() 2885 vol->password ? vol->password : "", in match_session() [all …]
|
| D | dfs_cache.c | 1092 if (vol->password) { in dup_vol() 1093 new->password = kstrndup(vol->password, strlen(vol->password), in dup_vol() 1095 if (!new->password) in dup_vol() 1133 kzfree(new->password); in dup_vol()
|
| D | misc.c | 102 kzfree(buf_to_free->password); in sesInfoFree() 147 kzfree(buf_to_free->password); in tconInfoFree()
|
| D | cifsglob.h | 531 char *password; member 979 char *password; member 1040 char *password; /* for share-level security */ member
|
| /Linux-v5.4/Documentation/admin-guide/cifs/ |
| D | usage.rst | 211 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword 219 password=<password> 244 password=your_password 246 2) By specifying the password in the PASSWD environment variable (similarly 248 3) By specifying the password in a file by name via PASSWD_FILE 249 4) By specifying the password in a file by file descriptor via PASSWD_FD 251 If no password is provided, mount.cifs will prompt for password entry 282 password 283 The user password. If the mount helper is 284 installed, the user will be prompted for password [all …]
|
| /Linux-v5.4/drivers/scsi/qla4xxx/ |
| D | ql4_glbl.h | 85 char *password, int bidi, uint16_t *chap_index); 86 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 170 char *password, uint16_t idx); 269 char *password, uint16_t chap_index);
|
| D | ql4_mbx.c | 1578 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument 1619 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1640 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument 1660 chap_table->secret_len = strlen(password); in qla4xxx_set_chap() 1661 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap() 1697 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument 1709 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1740 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1764 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument 1783 if (!username || !password) { in qla4xxx_get_chap_index() [all …]
|
| /Linux-v5.4/include/linux/ |
| D | ecryptfs.h | 101 struct ecryptfs_password password; member
|
| /Linux-v5.4/drivers/target/iscsi/ |
| D | iscsi_target_auth.c | 260 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_md5() 261 strlen(auth->password)); in chap_server_compute_md5()
|
| /Linux-v5.4/Documentation/i2c/busses/ |
| D | i2c-ali15x3.rst | 71 full data sheets on the web site are password protected, however if you 72 contact the ALI office in San Jose they may give you the password.
|
| /Linux-v5.4/Documentation/filesystems/cifs/ |
| D | cifsroot.txt | 94 …-append "root=/dev/cifs rw ip=dhcp cifsroot=//10.0.2.2/linux,username=foo,password=bar console=tty…
|
| /Linux-v5.4/Documentation/security/ |
| D | sak.rst | 9 provided as protection against trojan password capturing programs. It
|
| /Linux-v5.4/include/scsi/ |
| D | libiscsi.h | 297 char *password; member
|