/drivers/platform/x86/ |
D | think-lmi.c | 332 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument 335 password); in tlmi_save_bios_settings() 412 strscpy(setting->password, buf, setting->maxlen); in current_password_store() 414 strip_cr(setting->password); in current_password_store() 477 tlmi_priv.pwd_admin->password); in new_password_store() 481 ret = tlmi_opcode_setting("WmiOpcodePasswordCurrent01", setting->password); in new_password_store() 491 setting->pwd_type, setting->password, new_pwd, in new_password_store() 786 if (!setting->valid || !setting->password[0]) { in certificate_store() 793 new_cert, setting->password); in certificate_store() 1015 if (tlmi_priv.pwd_admin->valid && tlmi_priv.pwd_admin->password[0]) { in current_value_store() [all …]
|
D | think-lmi.h | 56 char password[TLMI_PWD_BUFSIZE]; member
|
/drivers/of/unittest-data/ |
D | tests-phandle.dtsi | 9 security-password = "password";
|
/drivers/input/mouse/ |
D | elan_i2c_smbus.c | 352 u16 password; in elan_smbus_prepare_fw_update() local 395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
|
D | elan_i2c_i2c.c | 562 u16 password; in elan_i2c_prepare_fw_update() local 618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
/drivers/scsi/qla4xxx/ |
D | ql4_glbl.h | 84 char *password, int bidi, uint16_t *chap_index); 85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 168 char *password, uint16_t idx); 267 char *password, uint16_t chap_index);
|
D | ql4_mbx.c | 1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument 1614 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument 1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap() 1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap() 1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument 1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1735 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1759 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument 1778 if (!username || !password) { in qla4xxx_get_chap_index() [all …]
|
D | ql4_os.c | 803 strlcpy(chap_rec->password, chap_table->secret, in qla4xxx_get_chap_list() 991 size = min_t(size_t, sizeof(chap_rec.password), in qla4xxx_set_chap_entry() 993 memcpy(chap_rec.password, param_info->value, size); in qla4xxx_set_chap_entry() 1050 rc = qla4xxx_set_chap(ha, chap_rec.username, chap_rec.password, in qla4xxx_set_chap_entry() 2885 sess->password, in qla4xxx_session_get_param() 2901 !sess->username && !sess->password) { in qla4xxx_session_get_param() 6034 char *password) in qla4xxx_get_bidi_chap() argument 6065 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_bidi_chap()
|
/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 383 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash() 384 strlen(auth->password)); in chap_server_compute_hash()
|
D | iscsi_target_configfs.c | 424 DEF_NACL_AUTH_STR(password, NAF_PASSWORD_SET); 876 DEF_TPG_AUTH_STR(password, NAF_PASSWORD_SET); 1265 DEF_DISC_AUTH_STR(password, NAF_PASSWORD_SET);
|
/drivers/net/ethernet/via/ |
D | via-velocity.h | 1216 u8 password[6]; member
|
/drivers/scsi/ |
D | libiscsi.c | 3135 kfree(session->password); in iscsi_session_free() 3567 return iscsi_switch_str_param(&session->password, buf); in iscsi_set_param() 3673 len = sysfs_emit(buf, "%s\n", session->password); in iscsi_session_get_param()
|
D | scsi_transport_iscsi.c | 866 iscsi_flashnode_sess_attr(fnode, password, ISCSI_FLASHNODE_PASSWORD); 4388 iscsi_session_attr(password, ISCSI_PARAM_PASSWORD, 1);
|
/drivers/firewire/ |
D | sbp2.c | 278 struct sbp2_pointer password; member
|
/drivers/mfd/ |
D | Kconfig | 2136 It provides multiple boot control features like password check,
|