Home
last modified time | relevance | path

Searched refs:password (Results 1 – 15 of 15) sorted by relevance

/drivers/platform/x86/
Dthink-lmi.c332 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument
335 password); in tlmi_save_bios_settings()
412 strscpy(setting->password, buf, setting->maxlen); in current_password_store()
414 strip_cr(setting->password); in current_password_store()
477 tlmi_priv.pwd_admin->password); in new_password_store()
481 ret = tlmi_opcode_setting("WmiOpcodePasswordCurrent01", setting->password); in new_password_store()
491 setting->pwd_type, setting->password, new_pwd, in new_password_store()
786 if (!setting->valid || !setting->password[0]) { in certificate_store()
793 new_cert, setting->password); in certificate_store()
1015 if (tlmi_priv.pwd_admin->valid && tlmi_priv.pwd_admin->password[0]) { in current_value_store()
[all …]
Dthink-lmi.h56 char password[TLMI_PWD_BUFSIZE]; member
/drivers/of/unittest-data/
Dtests-phandle.dtsi9 security-password = "password";
/drivers/input/mouse/
Delan_i2c_smbus.c352 u16 password; in elan_smbus_prepare_fw_update() local
395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update()
396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update()
397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
Delan_i2c_i2c.c562 u16 password; in elan_i2c_prepare_fw_update() local
618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update()
619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update()
620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
/drivers/scsi/qla4xxx/
Dql4_glbl.h84 char *password, int bidi, uint16_t *chap_index);
85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
168 char *password, uint16_t idx);
267 char *password, uint16_t chap_index);
Dql4_mbx.c1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument
1614 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap()
1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument
1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap()
1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap()
1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument
1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index()
1735 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index()
1759 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument
1778 if (!username || !password) { in qla4xxx_get_chap_index()
[all …]
Dql4_os.c803 strlcpy(chap_rec->password, chap_table->secret, in qla4xxx_get_chap_list()
991 size = min_t(size_t, sizeof(chap_rec.password), in qla4xxx_set_chap_entry()
993 memcpy(chap_rec.password, param_info->value, size); in qla4xxx_set_chap_entry()
1050 rc = qla4xxx_set_chap(ha, chap_rec.username, chap_rec.password, in qla4xxx_set_chap_entry()
2885 sess->password, in qla4xxx_session_get_param()
2901 !sess->username && !sess->password) { in qla4xxx_session_get_param()
6034 char *password) in qla4xxx_get_bidi_chap() argument
6065 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_bidi_chap()
/drivers/target/iscsi/
Discsi_target_auth.c383 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash()
384 strlen(auth->password)); in chap_server_compute_hash()
Discsi_target_configfs.c424 DEF_NACL_AUTH_STR(password, NAF_PASSWORD_SET);
876 DEF_TPG_AUTH_STR(password, NAF_PASSWORD_SET);
1265 DEF_DISC_AUTH_STR(password, NAF_PASSWORD_SET);
/drivers/net/ethernet/via/
Dvia-velocity.h1216 u8 password[6]; member
/drivers/scsi/
Dlibiscsi.c3135 kfree(session->password); in iscsi_session_free()
3567 return iscsi_switch_str_param(&session->password, buf); in iscsi_set_param()
3673 len = sysfs_emit(buf, "%s\n", session->password); in iscsi_session_get_param()
Dscsi_transport_iscsi.c866 iscsi_flashnode_sess_attr(fnode, password, ISCSI_FLASHNODE_PASSWORD);
4388 iscsi_session_attr(password, ISCSI_PARAM_PASSWORD, 1);
/drivers/firewire/
Dsbp2.c278 struct sbp2_pointer password; member
/drivers/mfd/
DKconfig2136 It provides multiple boot control features like password check,