| /linux/security/keys/encrypted-keys/ |
| H A D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strscpy_pad(auth_tok->token.password.signature, key_desc); in ecryptfs_fill_auth_tok() 58 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 66 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 72 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
| /linux/tools/testing/selftests/net/tcp_ao/lib/ |
| H A D | kconfig.c | 48 const char *password = DEFAULT_TEST_PASSWORD; in has_tcp_ao() local 59 tmp.keylen = strlen(password); in has_tcp_ao() 60 memcpy(tmp.key, password, strlen(password)); in has_tcp_ao()
|
| H A D | sock.c | 188 int vrf, const char *password) in __test_set_md5() argument 190 size_t pwd_len = strlen(password); in __test_set_md5() 194 memcpy(md5sig.tcpm_key, password, pwd_len); in __test_set_md5()
|
| /linux/fs/smb/client/ |
| H A D | fs_context.c | 439 new_ctx->password = NULL; in smb3_fs_context_dup() 454 DUP_CTX_STR(password); in smb3_fs_context_dup() 978 if (new_ctx->password && in smb3_verify_reconfigure_ctx() 979 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx() 1037 if (ses->password && in smb3_sync_session_ctx_passwords() 1038 cifs_sb->ctx->password && in smb3_sync_session_ctx_passwords() 1039 strcmp(ses->password, cifs_sb->ctx->password)) { in smb3_sync_session_ctx_passwords() 1040 kfree_sensitive(cifs_sb->ctx->password); in smb3_sync_session_ctx_passwords() 1041 cifs_sb->ctx->password = kstrdup(ses->password, GFP_KERNEL); in smb3_sync_session_ctx_passwords() 1042 if (!cifs_sb->ctx->password) in smb3_sync_session_ctx_passwords() [all …]
|
| H A D | connect.c | 1972 ses->password != NULL) { in match_session() 1981 if (!((strncmp(ses->password, ctx->password ? in match_session() 1982 ctx->password : "", CIFS_MAX_PASSWORD_LEN) == 0 && in match_session() 1985 (strncmp(ses->password, ctx->password2, in match_session() 1987 strncmp(ses->password2, ctx->password ? in match_session() 1988 ctx->password : "", CIFS_MAX_PASSWORD_LEN) == 0))) in match_session() 1996 if (strncmp(ses->password, ctx->password ? in match_session() 1997 ctx->password : "", CIFS_MAX_PASSWORD_LEN)) in match_session() 2272 ctx->password = kstrndup(delim, len, GFP_KERNEL); in cifs_set_cifscreds() 2273 if (!ctx->password) { in cifs_set_cifscreds() [all …]
|
| /linux/fs/ecryptfs/ |
| H A D | debug.c | 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
| H A D | keystore.c | 741 md5(s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 742 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet() 778 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 786 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 991 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 999 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1064 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1423 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 1427 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet() 1443 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet() [all …]
|
| /linux/drivers/platform/x86/lenovo/ |
| H A D | think-lmi.c | 365 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument 368 password); in tlmi_save_bios_settings() 446 strscpy(setting->password, buf, setting->maxlen); in current_password_store() 448 strreplace(setting->password, '\n', '\0'); in current_password_store() 512 if (tlmi_priv.pwd_admin->pwd_enabled && strlen(tlmi_priv.pwd_admin->password)) { in new_password_store() 514 tlmi_priv.pwd_admin->password); in new_password_store() 518 ret = tlmi_opcode_setting("WmiOpcodePasswordCurrent01", setting->password); in new_password_store() 528 setting->pwd_type, setting->password, new_pwd, in new_password_store() 889 (!setting->pwd_enabled || !setting->password[0])) { in certificate_store() 897 setting->password, in certificate_store() [all …]
|
| /linux/Documentation/scsi/ |
| H A D | arcmsr_spec.rst | 229 no password checking is needed and should be implemented in separate 231 Command code 0x20--0x?? always check the password, 232 password must be entered to enable these command:: 290 byte 3 password length (should be 0x0f) 301 byte 3 password length (should be 0x08) 312 byte 3 password length (should be 0x08) 327 Verify password 332 byte 3 password length 333 byte 4-0x?? user password to be checked 337 Logout GUI (force password checking on next command) [all …]
|
| /linux/drivers/platform/x86/hp/hp-bioscfg/ |
| H A D | passwdobj-attributes.c | 11 GET_INSTANCE_ID(password); 81 ATTRIBUTE_N_PROPERTY_SHOW(is_enabled, password); 131 ATTRIBUTE_N_PROPERTY_SHOW(min_password_length, password); 134 ATTRIBUTE_N_PROPERTY_SHOW(max_password_length, password); 166 ATTRIBUTE_VALUES_PROPERTY_SHOW(encodings, password, SEMICOLON_SEP);
|
| /linux/drivers/of/unittest-data/ |
| H A D | tests-phandle.dtsi | 9 security-password = "password";
|
| /linux/drivers/input/mouse/ |
| H A D | elan_i2c_smbus.c | 352 u16 password; in elan_smbus_prepare_fw_update() local 395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
|
| H A D | elan_i2c_i2c.c | 562 u16 password; in elan_i2c_prepare_fw_update() local 618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-ibft | 15 contain the CHAP name (and password), the reverse CHAP 16 name (and password)
|
| /linux/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 210 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword 218 password=<password> 243 password=your_password 245 2) By specifying the password in the PASSWD environment variable (similarly 247 3) By specifying the password in a file by name via PASSWD_FILE 248 4) By specifying the password in a file by file descriptor via PASSWD_FD 250 If no password is provided, mount.cifs will prompt for password entry 283 password 284 The user password. If the mount helper is 285 installed, the user will be prompted for password [all …]
|
| /linux/drivers/scsi/qla4xxx/ |
| H A D | ql4_glbl.h | 84 char *password, int bidi, uint16_t *chap_index); 85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 168 char *password, uint16_t idx); 267 char *password, uint16_t chap_index);
|
| H A D | ql4_mbx.c | 1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument 1614 strscpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument 1657 secret_len = strscpy(chap_table->secret, password, in qla4xxx_set_chap() 1699 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument 1711 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1742 strscpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1766 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument 1785 if (!username || !password) { in qla4xxx_get_chap_index() 1806 if (!strncmp(chap_table->secret, password, in qla4xxx_get_chap_index() [all …]
|
| /linux/net/ethtool/ |
| H A D | module_fw.h | 25 __be32 password; member
|
| H A D | cmis_cdb.c | 143 __be32 password; member 181 pe_pl.password = params->password; in cmis_cdb_validate_password()
|
| /linux/tools/testing/selftests/net/ |
| H A D | nettest.c | 100 const char *password; member 267 int keylen = strlen(args->password); in tcp_md5sig() 273 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig() 1611 if (args->password && tcp_md5_remote(lsd, args)) { in do_server() 1741 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock() 1822 args->password = args->client_pw; in do_client() 2110 args.password = optarg; in main() 2189 if (args.password && in main() 2196 if (args.md5_prefix_str && !args.password) { in main()
|
| /linux/tools/testing/selftests/net/tcp_ao/ |
| H A D | key-management.c | 409 char password[TCP_AO_MAXKEYLEN]; member 466 randomize_buffer(key->password, key->len); in init_key_in_collection() 616 if (test_add_key_cr(sk, key->password, key->len, in key_collection_socket() 771 memcmp(dump_key->key, key->password, key->len)) { in verify_keys() 982 err = test_add_key_cr(sk, key->password, key->len, wrong_addr, in try_unmatched_keys() 994 err = test_add_key_cr(sk, key->password, key->len, this_ip_dest, in try_unmatched_keys()
|
| /linux/include/linux/ |
| H A D | ecryptfs.h | 101 struct ecryptfs_password password; member
|
| /linux/Documentation/i2c/busses/ |
| H A D | i2c-ali15x3.rst | 71 full data sheets on the web site are password protected, however if you 72 contact the ALI office in San Jose they may give you the password.
|
| /linux/Documentation/hwmon/ |
| H A D | ftsteutates.rst | 39 … the `Kontron FTP Server <http://ftp.kontron.com/>`_ (username = "anonymous", no password required)
|
| /linux/drivers/target/iscsi/ |
| H A D | iscsi_target_auth.c | 383 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash() 384 strlen(auth->password)); in chap_server_compute_hash()
|