Searched refs:password (Results 1 – 11 of 11) sorted by relevance
/fs/cifs/ |
D | misc.c | 99 if (buf_to_free->password) { in sesInfoFree() 100 memset(buf_to_free->password, 0, strlen(buf_to_free->password)); in sesInfoFree() 101 kfree(buf_to_free->password); in sesInfoFree() 135 if (buf_to_free->password) { in tconInfoFree() 136 memset(buf_to_free->password, 0, strlen(buf_to_free->password)); in tconInfoFree() 137 kfree(buf_to_free->password); in tconInfoFree()
|
D | README | 203 pass=<password> 226 password=your_password 227 2) By specifying the password in the PASSWD environment variable (similarly 229 3) By specifying the password in a file by name via PASSWD_FILE 230 4) By specifying the password in a file by file descriptor via PASSWD_FD 232 If no password is provided, mount.cifs will prompt for password entry 257 password The user password. If the mount helper is 258 installed, the user will be prompted for password 357 -o user=myname,password=mypassword,domain=mydom 359 -o sep=.user=myname.password=mypassword.domain=mydom [all …]
|
D | cifsencrypt.c | 223 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response() 231 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response() 246 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument 254 if (password) in calc_lanman_hash() 255 strncpy(password_with_pad, password, CIFS_ENCPWD_SIZE); in calc_lanman_hash() 407 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
|
D | connect.c | 1594 vol->password = NULL; in cifs_parse_mount_options() 1633 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options() 1634 if (vol->password == NULL) { in cifs_parse_mount_options() 1641 vol->password[j] = value[i]; in cifs_parse_mount_options() 1647 vol->password[j] = '\0'; in cifs_parse_mount_options() 2309 ses->password != NULL && in match_session() 2310 strncmp(ses->password, in match_session() 2311 vol->password ? vol->password : "", in match_session() 2460 vol->password = kstrndup(delim, len, GFP_KERNEL); in cifs_set_cifscreds() 2461 if (!vol->password) { in cifs_set_cifscreds() [all …]
|
D | cifsglob.h | 157 char *password; member 414 char *password; member 438 char *password; /* for share-level security */ member
|
D | CHANGES | 116 on dns_upcall (resolving DFS referralls). Fix plain text password 245 (win9x, os/2 etc.) when null password. Do not send listxattr 257 NTLMv2 authentication support (now can use stronger password hashing 298 directio. Recognize share mode security and send NTLM encrypted password 433 from Samba server to DC (Samba required dummy LM password). 558 Fix PPC64 build error. Reduce excessive stack usage in smb password 634 Allow passwords longer than 16 bytes. Allow null password string. 671 Fix unsafe global variable usage and password hash failure on gcc 3.3.1 874 Fix temporary socket leak when bad userid or password specified 1051 5) Removed logging of password field.
|
D | Kconfig | 58 security mechanisms. These hash the password more securely
|
D | cifsproto.h | 417 extern int calc_lanman_hash(const char *password, const char *cryptkey,
|
D | sess.c | 664 rc = calc_lanman_hash(ses->password, ses->server->cryptkey, in CIFS_SessSetup()
|
/fs/ecryptfs/ |
D | debug.c | 43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 47 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 51 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
D | keystore.c | 744 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 745 s->auth_tok->token.password.session_key_encryption_key_bytes); in ecryptfs_write_tag_70_packet() 765 s->auth_tok->token.password.session_key_encryption_key_bytes); in ecryptfs_write_tag_70_packet() 842 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 850 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1050 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1058 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1124 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1483 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 1487 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet() [all …]
|