Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 49) sorted by relevance

12

/linux/security/keys/encrypted-keys/
H A Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strscpy_pad(auth_tok->token.password.signature, key_desc); in ecryptfs_fill_auth_tok()
58 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
66 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
72 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/linux/fs/smb/client/
H A Dfs_context.c174 fsparam_string("password", Opt_pass),
438 new_ctx->password = NULL; in smb3_fs_context_dup()
453 DUP_CTX_STR(password); in smb3_fs_context_dup()
975 if (new_ctx->password && in smb3_verify_reconfigure_ctx()
976 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx()
979 "can not change password of active session during remount\n"); in smb3_verify_reconfigure_ctx()
983 "can not change password for Kerberos via remount\n"); in smb3_verify_reconfigure_ctx()
1034 if (ses->password in smb3_sync_session_ctx_passwords()
[all...]
H A Dconnect.c1969 /* anything else takes username/password */ in match_session()
1975 ses->password != NULL) { in match_session()
1978 * 1. Both password and password2 match, or in match_session()
1979 * 2. password2 of the old mount matches password of the new mount in match_session()
1980 * and password of the old mount matches password2 of the new in match_session()
1984 if (!((strncmp(ses->password, ctx->password ? in match_session()
1985 ctx->password : "", CIFS_MAX_PASSWORD_LEN) == 0 && in match_session()
1988 (strncmp(ses->password, ctx->password2, in match_session()
1990 strncmp(ses->password2, ctx->password in match_session()
[all...]
/linux/tools/testing/selftests/net/tcp_ao/lib/
H A Dkconfig.c48 const char *password = DEFAULT_TEST_PASSWORD; in has_tcp_ao() local
59 tmp.keylen = strlen(password); in has_tcp_ao()
60 memcpy(tmp.key, password, strlen(password)); in has_tcp_ao()
H A Dsock.c188 int vrf, const char *password) in __test_set_md5() argument
190 size_t pwd_len = strlen(password); in __test_set_md5()
194 memcpy(md5sig.tcpm_key, password, pwd_len); in __test_set_md5()
/linux/fs/ecryptfs/
H A Ddebug.c29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
32 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
36 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
H A Dkeystore.c737 "password tokens\n", __func__); in ecryptfs_write_tag_70_packet()
741 md5(s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
742 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet()
778 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
782 "rc = [%d]. s->auth_tok->token.password.session_key_" in ecryptfs_write_tag_70_packet()
786 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
987 "password tokens\n", __func__); in ecryptfs_parse_tag_70_packet()
992 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
996 "rc = [%d]. s->auth_tok->token.password.session_key_" in ecryptfs_parse_tag_70_packet()
1000 s->auth_tok->token.password in ecryptfs_parse_tag_70_packet()
[all...]
/linux/drivers/platform/x86/lenovo/
H A Dthink-lmi.c72 * Description: Change a specific password.
77 * - A password cannot be set using this method when one does not already
146 * Description: Switch from certificate to password authentication.
216 {"Set Certificate operation failed with status:Invalid password format.", -EINVAL},
320 /* Get password settings from BIOS */
365 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument
368 password); in tlmi_save_bios_settings()
442 /* pwdlen == 0 is allowed to clear the password */ in current_password_store()
446 strscpy(setting->password, buf, setting->maxlen); in current_password_store()
447 /* Strip out CR if one is present, setting password wo in current_password_store()
[all...]
/linux/Documentation/scsi/
H A Darcmsr_spec.rst229 no password checking is needed and should be implemented in separate
231 Command code 0x20--0x?? always check the password,
232 password must be entered to enable these command::
290 byte 3 password length (should be 0x0f)
301 byte 3 password length (should be 0x08)
312 byte 3 password length (should be 0x08)
327 Verify password
332 byte 3 password length
333 byte 4-0x?? user password to be checked
337 Logout GUI (force password checking on next command)
[all …]
/linux/drivers/platform/x86/hp/hp-bioscfg/
H A Dpasswdobj-attributes.c3 * Functions corresponding to password object type attributes under
11 GET_INSTANCE_ID(password);
81 ATTRIBUTE_N_PROPERTY_SHOW(is_enabled, password);
131 ATTRIBUTE_N_PROPERTY_SHOW(min_password_length, password);
134 ATTRIBUTE_N_PROPERTY_SHOW(max_password_length, password);
166 ATTRIBUTE_VALUES_PROPERTY_SHOW(encodings, password, SEMICOLON_SEP);
385 * Populate all properties for an instance under password attribute
387 * @password_obj: ACPI object with password data
494 * Populate all properties for an instance under password object attribute
/linux/drivers/of/unittest-data/
H A Dtests-phandle.dtsi9 security-password = "password";
/linux/drivers/input/mouse/
H A Delan_i2c_smbus.c352 u16 password; in elan_smbus_prepare_fw_update() local
395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update()
396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update()
397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
H A Delan_i2c_i2c.c562 u16 password; in elan_i2c_prepare_fw_update() local
618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update()
619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update()
620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
/linux/Documentation/ABI/testing/
H A Dsysfs-ibft15 contain the CHAP name (and password), the reverse CHAP
16 name (and password)
/linux/Documentation/admin-guide/cifs/
H A Dusage.rst210 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword
218 password=<password>
243 password=your_password
245 2) By specifying the password in the PASSWD environment variable (similarly
247 3) By specifying the password in a file by name via PASSWD_FILE
248 4) By specifying the password in a file by file descriptor via PASSWD_FD
250 If no password is provided, mount.cifs will prompt for password entry
283 password
284 The user password. If the mount helper is
285 installed, the user will be prompted for password
[all …]
/linux/drivers/scsi/qla4xxx/
H A Dql4_glbl.h84 char *password, int bidi, uint16_t *chap_index);
85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
168 char *password, uint16_t idx);
267 char *password, uint16_t chap_index);
H A Dql4_mbx.c1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument
1614 strscpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap()
1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument
1657 secret_len = strscpy(chap_table->secret, password, in qla4xxx_set_chap()
1699 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument
1711 if (!username || !password) { in qla4xxx_get_uni_chap_at_index()
1742 strscpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index()
1766 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument
1785 if (!username || !password) { in qla4xxx_get_chap_index()
1806 if (!strncmp(chap_table->secret, password, in qla4xxx_get_chap_index()
[all …]
/linux/net/ethtool/
H A Dmodule_fw.h25 __be32 password; member
H A Dcmis_cdb.c143 __be32 password; member
181 pe_pl.password = params->password; in cmis_cdb_validate_password()
/linux/tools/testing/selftests/net/
H A Dnettest.c100 const char *password; member
267 int keylen = strlen(args->password); in tcp_md5sig()
273 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig()
1611 if (args->password && tcp_md5_remote(lsd, args)) { in do_server()
1741 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock()
1822 args->password = args->client_pw; in do_client()
2110 args.password = optarg; in main()
2189 if (args.password && in main()
2196 if (args.md5_prefix_str && !args.password) { in main()
/linux/tools/testing/selftests/net/tcp_ao/
H A Dkey-management.c409 char password[TCP_AO_MAXKEYLEN]; member
466 randomize_buffer(key->password, key->len); in init_key_in_collection()
616 if (test_add_key_cr(sk, key->password, key->len, in key_collection_socket()
771 memcmp(dump_key->key, key->password, key->len)) { in verify_keys()
982 err = test_add_key_cr(sk, key->password, key->len, wrong_addr, in try_unmatched_keys()
994 err = test_add_key_cr(sk, key->password, key->len, this_ip_dest, in try_unmatched_keys()
/linux/include/linux/
H A Decryptfs.h101 struct ecryptfs_password password; member
/linux/Documentation/i2c/busses/
H A Di2c-ali15x3.rst71 full data sheets on the web site are password protected, however if you
72 contact the ALI office in San Jose they may give you the password.
/linux/Documentation/hwmon/
H A Dftsteutates.rst39 … the `Kontron FTP Server <http://ftp.kontron.com/>`_ (username = "anonymous", no password required)
/linux/drivers/target/iscsi/
H A Discsi_target_auth.c150 pr_err("CHAP user or password not set for" in chap_server_open()
384 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash()
385 strlen(auth->password)); in chap_server_compute_hash()
387 pr_err("crypto_shash_update() failed for password\n"); in chap_server_compute_hash()

12