Home
last modified time | relevance | path

Searched refs:password (Results 1 – 11 of 11) sorted by relevance

/fs/cifs/
Dmisc.c99 if (buf_to_free->password) { in sesInfoFree()
100 memset(buf_to_free->password, 0, strlen(buf_to_free->password)); in sesInfoFree()
101 kfree(buf_to_free->password); in sesInfoFree()
135 if (buf_to_free->password) { in tconInfoFree()
136 memset(buf_to_free->password, 0, strlen(buf_to_free->password)); in tconInfoFree()
137 kfree(buf_to_free->password); in tconInfoFree()
DREADME203 pass=<password>
226 password=your_password
227 2) By specifying the password in the PASSWD environment variable (similarly
229 3) By specifying the password in a file by name via PASSWD_FILE
230 4) By specifying the password in a file by file descriptor via PASSWD_FD
232 If no password is provided, mount.cifs will prompt for password entry
257 password The user password. If the mount helper is
258 installed, the user will be prompted for password
357 -o user=myname,password=mypassword,domain=mydom
359 -o sep=.user=myname.password=mypassword.domain=mydom
[all …]
Dcifsencrypt.c223 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response()
231 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response()
246 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument
254 if (password) in calc_lanman_hash()
255 strncpy(password_with_pad, password, CIFS_ENCPWD_SIZE); in calc_lanman_hash()
407 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
Dconnect.c1594 vol->password = NULL; in cifs_parse_mount_options()
1633 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options()
1634 if (vol->password == NULL) { in cifs_parse_mount_options()
1641 vol->password[j] = value[i]; in cifs_parse_mount_options()
1647 vol->password[j] = '\0'; in cifs_parse_mount_options()
2309 ses->password != NULL && in match_session()
2310 strncmp(ses->password, in match_session()
2311 vol->password ? vol->password : "", in match_session()
2460 vol->password = kstrndup(delim, len, GFP_KERNEL); in cifs_set_cifscreds()
2461 if (!vol->password) { in cifs_set_cifscreds()
[all …]
Dcifsglob.h157 char *password; member
414 char *password; member
438 char *password; /* for share-level security */ member
DCHANGES116 on dns_upcall (resolving DFS referralls). Fix plain text password
245 (win9x, os/2 etc.) when null password. Do not send listxattr
257 NTLMv2 authentication support (now can use stronger password hashing
298 directio. Recognize share mode security and send NTLM encrypted password
433 from Samba server to DC (Samba required dummy LM password).
558 Fix PPC64 build error. Reduce excessive stack usage in smb password
634 Allow passwords longer than 16 bytes. Allow null password string.
671 Fix unsafe global variable usage and password hash failure on gcc 3.3.1
874 Fix temporary socket leak when bad userid or password specified
1051 5) Removed logging of password field.
DKconfig58 security mechanisms. These hash the password more securely
Dcifsproto.h417 extern int calc_lanman_hash(const char *password, const char *cryptkey,
Dsess.c664 rc = calc_lanman_hash(ses->password, ses->server->cryptkey, in CIFS_SessSetup()
/fs/ecryptfs/
Ddebug.c43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
47 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
51 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
Dkeystore.c744 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
745 s->auth_tok->token.password.session_key_encryption_key_bytes); in ecryptfs_write_tag_70_packet()
765 s->auth_tok->token.password.session_key_encryption_key_bytes); in ecryptfs_write_tag_70_packet()
842 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
850 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
1050 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1058 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1124 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig()
1483 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
1487 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet()
[all …]