Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 49) sorted by relevance

12

/kernel/linux/linux-5.10/security/keys/encrypted-keys/
Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/kernel/linux/linux-5.10/fs/ecryptfs/
Ddebug.c29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
Dkeystore.c760 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
761 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet()
815 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
823 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
1031 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1039 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1104 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig()
1463 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
1467 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet()
1483 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet()
[all …]
/kernel/linux/linux-5.10/sound/isa/opti9xx/
Dopti92x-ad1848.c119 unsigned char password; member
204 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init()
210 chip->password = 0xe5; in snd_opti9xx_init()
221 chip->password = 0xe4; in snd_opti9xx_init()
240 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
248 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
264 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
283 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
291 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
307 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
[all …]
Dmiro.c96 unsigned char password; member
795 chip->password = 0xe3; in snd_miro_init()
799 chip->password = 0xe5; in snd_miro_init()
817 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
823 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
847 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
853 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
/kernel/linux/linux-5.10/Documentation/scsi/
Darcmsr_spec.rst228 no password checking is needed and should be implemented in separate
230 Command code 0x20--0x?? always check the password,
231 password must be entered to enable these command::
289 byte 3 password length (should be 0x0f)
300 byte 3 password length (should be 0x08)
311 byte 3 password length (should be 0x08)
326 Verify password
331 byte 3 password length
332 byte 4-0x?? user password to be checked
336 Logout GUI (force password checking on next command)
[all …]
/kernel/linux/linux-5.10/drivers/of/unittest-data/
Dtests-phandle.dtsi9 security-password = "password";
/kernel/linux/linux-5.10/Documentation/ABI/testing/
Dsysfs-ibft15 contain the CHAP name (and password), the reverse CHAP
16 name (and password)
/kernel/linux/linux-5.10/fs/cifs/
Dcifsencrypt.c281 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response()
289 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response()
305 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument
312 if (password) { in calc_lanman_hash()
314 if (!password[len]) in calc_lanman_hash()
317 memcpy(password_with_pad, password, len); in calc_lanman_hash()
512 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
Dconnect.c1984 kfree_sensitive(vol->password); in cifs_parse_mount_options()
1985 vol->password = NULL; in cifs_parse_mount_options()
2022 kfree_sensitive(vol->password); in cifs_parse_mount_options()
2025 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options()
2026 if (vol->password == NULL) { in cifs_parse_mount_options()
2032 vol->password[j] = value[i]; in cifs_parse_mount_options()
2038 vol->password[j] = '\0'; in cifs_parse_mount_options()
2712 ses->password != NULL && in match_session()
2713 strncmp(ses->password, in match_session()
2714 vol->password ? vol->password : "", in match_session()
[all …]
Ddfs_cache.c1153 if (vol->password) { in dup_vol()
1154 new->password = kstrndup(vol->password, strlen(vol->password), in dup_vol()
1156 if (!new->password) in dup_vol()
1194 kfree_sensitive(new->password); in dup_vol()
Dcifsglob.h538 char *password; member
998 char *password; member
1100 char *password; /* for share-level security */ member
/kernel/linux/linux-5.10/drivers/input/mouse/
Delan_i2c_smbus.c352 u16 password; in elan_smbus_prepare_fw_update() local
395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update()
396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update()
397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
Delan_i2c_i2c.c562 u16 password; in elan_i2c_prepare_fw_update() local
618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update()
619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update()
620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
/kernel/linux/linux-5.10/Documentation/admin-guide/cifs/
Dusage.rst210 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword
218 password=<password>
243 password=your_password
245 2) By specifying the password in the PASSWD environment variable (similarly
247 3) By specifying the password in a file by name via PASSWD_FILE
248 4) By specifying the password in a file by file descriptor via PASSWD_FD
250 If no password is provided, mount.cifs will prompt for password entry
281 password
282 The user password. If the mount helper is
283 installed, the user will be prompted for password
[all …]
/kernel/linux/linux-5.10/drivers/scsi/qla4xxx/
Dql4_glbl.h84 char *password, int bidi, uint16_t *chap_index);
85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
169 char *password, uint16_t idx);
268 char *password, uint16_t chap_index);
Dql4_mbx.c1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument
1614 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap()
1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument
1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap()
1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap()
1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument
1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index()
1735 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index()
1759 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument
1778 if (!username || !password) { in qla4xxx_get_chap_index()
[all …]
/kernel/linux/linux-5.10/tools/testing/selftests/net/
Dnettest.c78 const char *password; member
212 int keylen = strlen(args->password); in tcp_md5sig()
218 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig()
1215 if (args->password && tcp_md5_remote(lsd, args)) { in do_server()
1336 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock()
1692 args.password = optarg; in main()
1761 if (args.password && in main()
1767 if (args.prefix_len && !args.password) { in main()
/kernel/linux/linux-5.10/include/linux/
Decryptfs.h101 struct ecryptfs_password password; member
/kernel/linux/linux-5.10/drivers/target/iscsi/
Discsi_target_auth.c340 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash()
341 strlen(auth->password)); in chap_server_compute_hash()
Discsi_target_configfs.c398 DEF_NACL_AUTH_STR(password, NAF_PASSWORD_SET);
857 DEF_TPG_AUTH_STR(password, NAF_PASSWORD_SET);
1242 DEF_DISC_AUTH_STR(password, NAF_PASSWORD_SET);
/kernel/linux/linux-5.10/Documentation/i2c/busses/
Di2c-ali15x3.rst71 full data sheets on the web site are password protected, however if you
72 contact the ALI office in San Jose they may give you the password.
/kernel/linux/linux-5.10/Documentation/filesystems/cifs/
Dcifsroot.rst102 …-append "root=/dev/cifs rw ip=dhcp cifsroot=//10.0.2.2/linux,username=foo,password=bar console=tty…
/kernel/linux/linux-5.10/Documentation/security/
Dsak.rst9 provided as protection against trojan password capturing programs. It
/kernel/linux/linux-5.10/include/scsi/
Dlibiscsi.h299 char *password; member

12