/kernel/linux/linux-5.10/security/keys/encrypted-keys/ |
D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
/kernel/linux/linux-5.10/fs/ecryptfs/ |
D | debug.c | 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
D | keystore.c | 760 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 761 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet() 815 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 823 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1031 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1039 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1104 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1463 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 1467 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet() 1483 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet() [all …]
|
/kernel/linux/linux-5.10/sound/isa/opti9xx/ |
D | opti92x-ad1848.c | 119 unsigned char password; member 204 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init() 210 chip->password = 0xe5; in snd_opti9xx_init() 221 chip->password = 0xe4; in snd_opti9xx_init() 240 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 248 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 264 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 283 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 291 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 307 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() [all …]
|
D | miro.c | 96 unsigned char password; member 795 chip->password = 0xe3; in snd_miro_init() 799 chip->password = 0xe5; in snd_miro_init() 817 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 823 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 847 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write() 853 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
|
/kernel/linux/linux-5.10/Documentation/scsi/ |
D | arcmsr_spec.rst | 228 no password checking is needed and should be implemented in separate 230 Command code 0x20--0x?? always check the password, 231 password must be entered to enable these command:: 289 byte 3 password length (should be 0x0f) 300 byte 3 password length (should be 0x08) 311 byte 3 password length (should be 0x08) 326 Verify password 331 byte 3 password length 332 byte 4-0x?? user password to be checked 336 Logout GUI (force password checking on next command) [all …]
|
/kernel/linux/linux-5.10/drivers/of/unittest-data/ |
D | tests-phandle.dtsi | 9 security-password = "password";
|
/kernel/linux/linux-5.10/Documentation/ABI/testing/ |
D | sysfs-ibft | 15 contain the CHAP name (and password), the reverse CHAP 16 name (and password)
|
/kernel/linux/linux-5.10/fs/cifs/ |
D | cifsencrypt.c | 281 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response() 289 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response() 305 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument 312 if (password) { in calc_lanman_hash() 314 if (!password[len]) in calc_lanman_hash() 317 memcpy(password_with_pad, password, len); in calc_lanman_hash() 512 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
|
D | connect.c | 1984 kfree_sensitive(vol->password); in cifs_parse_mount_options() 1985 vol->password = NULL; in cifs_parse_mount_options() 2022 kfree_sensitive(vol->password); in cifs_parse_mount_options() 2025 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options() 2026 if (vol->password == NULL) { in cifs_parse_mount_options() 2032 vol->password[j] = value[i]; in cifs_parse_mount_options() 2038 vol->password[j] = '\0'; in cifs_parse_mount_options() 2712 ses->password != NULL && in match_session() 2713 strncmp(ses->password, in match_session() 2714 vol->password ? vol->password : "", in match_session() [all …]
|
D | dfs_cache.c | 1153 if (vol->password) { in dup_vol() 1154 new->password = kstrndup(vol->password, strlen(vol->password), in dup_vol() 1156 if (!new->password) in dup_vol() 1194 kfree_sensitive(new->password); in dup_vol()
|
D | cifsglob.h | 538 char *password; member 998 char *password; member 1100 char *password; /* for share-level security */ member
|
/kernel/linux/linux-5.10/drivers/input/mouse/ |
D | elan_i2c_smbus.c | 352 u16 password; in elan_smbus_prepare_fw_update() local 395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
|
D | elan_i2c_i2c.c | 562 u16 password; in elan_i2c_prepare_fw_update() local 618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
/kernel/linux/linux-5.10/Documentation/admin-guide/cifs/ |
D | usage.rst | 210 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword 218 password=<password> 243 password=your_password 245 2) By specifying the password in the PASSWD environment variable (similarly 247 3) By specifying the password in a file by name via PASSWD_FILE 248 4) By specifying the password in a file by file descriptor via PASSWD_FD 250 If no password is provided, mount.cifs will prompt for password entry 281 password 282 The user password. If the mount helper is 283 installed, the user will be prompted for password [all …]
|
/kernel/linux/linux-5.10/drivers/scsi/qla4xxx/ |
D | ql4_glbl.h | 84 char *password, int bidi, uint16_t *chap_index); 85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 169 char *password, uint16_t idx); 268 char *password, uint16_t chap_index);
|
D | ql4_mbx.c | 1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument 1614 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument 1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap() 1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap() 1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument 1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1735 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1759 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument 1778 if (!username || !password) { in qla4xxx_get_chap_index() [all …]
|
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
D | nettest.c | 78 const char *password; member 212 int keylen = strlen(args->password); in tcp_md5sig() 218 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig() 1215 if (args->password && tcp_md5_remote(lsd, args)) { in do_server() 1336 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock() 1692 args.password = optarg; in main() 1761 if (args.password && in main() 1767 if (args.prefix_len && !args.password) { in main()
|
/kernel/linux/linux-5.10/include/linux/ |
D | ecryptfs.h | 101 struct ecryptfs_password password; member
|
/kernel/linux/linux-5.10/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 340 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash() 341 strlen(auth->password)); in chap_server_compute_hash()
|
D | iscsi_target_configfs.c | 398 DEF_NACL_AUTH_STR(password, NAF_PASSWORD_SET); 857 DEF_TPG_AUTH_STR(password, NAF_PASSWORD_SET); 1242 DEF_DISC_AUTH_STR(password, NAF_PASSWORD_SET);
|
/kernel/linux/linux-5.10/Documentation/i2c/busses/ |
D | i2c-ali15x3.rst | 71 full data sheets on the web site are password protected, however if you 72 contact the ALI office in San Jose they may give you the password.
|
/kernel/linux/linux-5.10/Documentation/filesystems/cifs/ |
D | cifsroot.rst | 102 …-append "root=/dev/cifs rw ip=dhcp cifsroot=//10.0.2.2/linux,username=foo,password=bar console=tty…
|
/kernel/linux/linux-5.10/Documentation/security/ |
D | sak.rst | 9 provided as protection against trojan password capturing programs. It
|
/kernel/linux/linux-5.10/include/scsi/ |
D | libiscsi.h | 299 char *password; member
|