Home
last modified time | relevance | path

Searched refs:password (Results 1 – 9 of 9) sorted by relevance

/fs/ecryptfs/
Ddebug.c43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
47 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
51 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
Dkeystore.c784 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
785 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet()
839 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
847 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
1060 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1068 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1135 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig()
1494 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
1498 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet()
1514 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet()
[all …]
/fs/cifs/
Dconnect.c1670 kzfree(vol->password); in cifs_parse_mount_options()
1671 vol->password = NULL; in cifs_parse_mount_options()
1708 kzfree(vol->password); in cifs_parse_mount_options()
1711 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options()
1712 if (vol->password == NULL) { in cifs_parse_mount_options()
1718 vol->password[j] = value[i]; in cifs_parse_mount_options()
1724 vol->password[j] = '\0'; in cifs_parse_mount_options()
2316 ses->password != NULL && in match_session()
2317 strncmp(ses->password, in match_session()
2318 vol->password ? vol->password : "", in match_session()
[all …]
Dcifsencrypt.c292 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response()
300 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response()
316 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument
323 if (password) in calc_lanman_hash()
324 strncpy(password_with_pad, password, CIFS_ENCPWD_SIZE); in calc_lanman_hash()
516 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
Dmisc.c102 kzfree(buf_to_free->password); in sesInfoFree()
137 kzfree(buf_to_free->password); in tconInfoFree()
Dcifsglob.h466 char *password; member
829 char *password; member
863 char *password; /* for share-level security */ member
Dcifsproto.h449 extern int calc_lanman_hash(const char *password, const char *cryptkey,
DKconfig65 security mechanisms. These hash the password more securely
Dsess.c708 rc = calc_lanman_hash(ses->password, ses->server->cryptkey, in sess_auth_lanman()