Searched refs:password (Results 1 – 9 of 9) sorted by relevance
/fs/ecryptfs/ |
D | debug.c | 43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 47 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 51 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
D | keystore.c | 784 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 785 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet() 839 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 847 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1060 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1068 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1135 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1494 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 1498 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet() 1514 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet() [all …]
|
/fs/cifs/ |
D | connect.c | 1670 kzfree(vol->password); in cifs_parse_mount_options() 1671 vol->password = NULL; in cifs_parse_mount_options() 1708 kzfree(vol->password); in cifs_parse_mount_options() 1711 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options() 1712 if (vol->password == NULL) { in cifs_parse_mount_options() 1718 vol->password[j] = value[i]; in cifs_parse_mount_options() 1724 vol->password[j] = '\0'; in cifs_parse_mount_options() 2316 ses->password != NULL && in match_session() 2317 strncmp(ses->password, in match_session() 2318 vol->password ? vol->password : "", in match_session() [all …]
|
D | cifsencrypt.c | 292 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response() 300 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response() 316 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument 323 if (password) in calc_lanman_hash() 324 strncpy(password_with_pad, password, CIFS_ENCPWD_SIZE); in calc_lanman_hash() 516 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
|
D | misc.c | 102 kzfree(buf_to_free->password); in sesInfoFree() 137 kzfree(buf_to_free->password); in tconInfoFree()
|
D | cifsglob.h | 466 char *password; member 829 char *password; member 863 char *password; /* for share-level security */ member
|
D | cifsproto.h | 449 extern int calc_lanman_hash(const char *password, const char *cryptkey,
|
D | Kconfig | 65 security mechanisms. These hash the password more securely
|
D | sess.c | 708 rc = calc_lanman_hash(ses->password, ses->server->cryptkey, in sess_auth_lanman()
|