Home
last modified time | relevance | path

Searched refs:password (Results 1 – 9 of 9) sorted by relevance

/fs/ecryptfs/
Ddebug.c43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
47 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
51 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
Dkeystore.c750 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
751 s->auth_tok->token.password.session_key_encryption_key_bytes); in ecryptfs_write_tag_70_packet()
771 s->auth_tok->token.password.session_key_encryption_key_bytes); in ecryptfs_write_tag_70_packet()
848 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
856 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
1056 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1064 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1130 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig()
1489 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
1493 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet()
[all …]
/fs/cifs/
Dconnect.c1762 kzfree(vol->password); in cifs_parse_mount_options()
1763 vol->password = NULL; in cifs_parse_mount_options()
1800 kzfree(vol->password); in cifs_parse_mount_options()
1803 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options()
1804 if (vol->password == NULL) { in cifs_parse_mount_options()
1810 vol->password[j] = value[i]; in cifs_parse_mount_options()
1816 vol->password[j] = '\0'; in cifs_parse_mount_options()
2399 ses->password != NULL && in match_session()
2400 strncmp(ses->password, in match_session()
2401 vol->password ? vol->password : "", in match_session()
[all …]
Dcifsencrypt.c280 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response()
288 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response()
304 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument
311 if (password) in calc_lanman_hash()
312 strncpy(password_with_pad, password, CIFS_ENCPWD_SIZE); in calc_lanman_hash()
504 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
Dmisc.c102 kzfree(buf_to_free->password); in sesInfoFree()
137 kzfree(buf_to_free->password); in tconInfoFree()
Dcifsglob.h450 char *password; member
809 char *password; member
840 char *password; /* for share-level security */ member
Dcifsproto.h449 extern int calc_lanman_hash(const char *password, const char *cryptkey,
DKconfig65 security mechanisms. These hash the password more securely
Dsess.c714 rc = calc_lanman_hash(ses->password, ses->server->cryptkey, in sess_auth_lanman()