Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 53) sorted by relevance

123

/linux/security/keys/encrypted-keys/
A Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/linux/Documentation/ABI/testing/
A Dsysfs-class-firmware-attributes144 - A "System" password is required to boot a machine.
160 Representing BIOS administrator password
162 Representing a password required to use
167 Only supported type currently is "password".
179 setting attributes when a system or admin password is set
180 or resetting to a new password
186 current_password will reset a system or admin password.
188 Note, password management is session specific. If Admin password is set,
193 echo "password" > current_password
201 require password validation.
[all …]
A Dsysfs-ibft15 contain the CHAP name (and password), the reverse CHAP
16 name (and password)
/linux/fs/ecryptfs/
A Ddebug.c29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
A Dkeystore.c816 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
1032 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1105 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig()
1464 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
1468 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet()
1661 auth_tok->token.password.session_key_encryption_key, in decrypt_passphrase_encrypted_session_key()
1821 new_auth_tok->token.password.signature[ in ecryptfs_parse_packet_set()
1907 memcpy(&(candidate_auth_tok->token.password), in ecryptfs_parse_packet_set()
1908 &(matching_auth_tok->token.password), in ecryptfs_parse_packet_set()
2240 if (auth_tok->token.password.flags & in write_tag_3_packet()
[all …]
/linux/sound/isa/opti9xx/
A Dopti92x-ad1848.c113 unsigned char password; member
198 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init()
204 chip->password = 0xe5; in snd_opti9xx_init()
215 chip->password = 0xe4; in snd_opti9xx_init()
234 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
242 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
258 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
277 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
285 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
301 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
[all …]
A Dmiro.c93 unsigned char password; member
800 chip->password = 0xe3; in snd_miro_init()
804 chip->password = 0xe5; in snd_miro_init()
822 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
828 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
852 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
858 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
/linux/Documentation/scsi/
A Darcmsr_spec.rst230 Command code 0x20--0x?? always check the password,
231 password must be entered to enable these command::
289 byte 3 password length (should be 0x0f)
300 byte 3 password length (should be 0x08)
311 byte 3 password length (should be 0x08)
326 Verify password
331 byte 3 password length
332 byte 4-0x?? user password to be checked
352 byte 3 password length (should be 0x08)
604 Change password
[all …]
/linux/drivers/platform/x86/
A Dthink-lmi.c267 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument
270 password); in tlmi_save_bios_settings()
334 strscpy(setting->password, buf, setting->maxlen); in current_password_store()
336 p = strchrnul(setting->password, '\n'); in current_password_store()
375 setting->pwd_type, setting->password, new_pwd, in new_password_store()
555 if (tlmi_priv.pwd_admin->valid && tlmi_priv.pwd_admin->password[0]) { in current_value_store()
557 tlmi_priv.pwd_admin->password, in current_value_store()
695 if (tlmi_priv.pwd_admin->valid && tlmi_priv.pwd_admin->password[0]) { in debug_cmd_store()
697 tlmi_priv.pwd_admin->password, in debug_cmd_store()
A Dthink-lmi.h38 char password[TLMI_PWD_BUFSIZE]; member
/linux/fs/cifs/
A Dfs_context.c310 new_ctx->password = NULL; in smb3_fs_context_dup()
323 DUP_CTX_STR(password); in smb3_fs_context_dup()
753 if (new_ctx->password && in smb3_verify_reconfigure_ctx()
754 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx()
809 STEAL_STRING(cifs_sb, ctx, password); in smb3_reconfigure()
1151 kfree(ctx->password); in smb3_fs_context_parse_param()
1152 ctx->password = NULL; in smb3_fs_context_parse_param()
1156 ctx->password = kstrdup(param->string, GFP_KERNEL); in smb3_fs_context_parse_param()
1157 if (ctx->password == NULL) { in smb3_fs_context_parse_param()
1575 kfree_sensitive(ctx->password); in smb3_cleanup_fs_context_contents()
[all …]
A Dconnect.c1634 ses->password != NULL && in match_session()
1635 strncmp(ses->password, in match_session()
1636 ctx->password ? ctx->password : "", in match_session()
1921 if (!ctx->password) { in cifs_set_cifscreds()
1943 ctx->password = NULL; in cifs_set_cifscreds()
2040 if (ctx->password) { in cifs_get_smb_ses()
2041 ses->password = kstrdup(ctx->password, GFP_KERNEL); in cifs_get_smb_ses()
2042 if (!ses->password) in cifs_get_smb_ses()
2258 if (ctx->password) { in cifs_get_tcon()
2259 tcon->password = kstrdup(ctx->password, GFP_KERNEL); in cifs_get_tcon()
[all …]
A Dfs_context.h167 char *password; member
A Dcifs_swn.c56 if (tcon->ses->password != NULL) { in cifs_swn_auth_info_ntlm()
57 ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_PASSWORD, tcon->ses->password); in cifs_swn_auth_info_ntlm()
/linux/drivers/of/unittest-data/
A Dtests-phandle.dtsi9 security-password = "password";
/linux/Documentation/admin-guide/cifs/
A Dusage.rst218 password=<password>
243 password=your_password
250 If no password is provided, mount.cifs will prompt for password entry
281 password
282 The user password. If the mount helper is
443 password is specified a null password will be used.
675 Use NTLM password hashing (default)
677 Use NTLM password hashing with signing (if
681 Use NTLMv2 password hashing
755 may use lanman (weak) password hash 0x00010
[all …]
/linux/drivers/input/mouse/
A Delan_i2c_smbus.c352 u16 password; in elan_smbus_prepare_fw_update() local
395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update()
396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update()
397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
A Delan_i2c_i2c.c562 u16 password; in elan_i2c_prepare_fw_update() local
618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update()
619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update()
620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
/linux/drivers/scsi/qla4xxx/
A Dql4_glbl.h84 char *password, int bidi, uint16_t *chap_index);
85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
168 char *password, uint16_t idx);
267 char *password, uint16_t chap_index);
A Dql4_mbx.c1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap()
1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument
1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index()
1735 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index()
1759 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument
1778 if (!username || !password) { in qla4xxx_get_chap_index()
1799 if (!strncmp(chap_table->secret, password, in qla4xxx_get_chap_index()
1813 rval = qla4xxx_set_chap(ha, username, password, in qla4xxx_get_chap_index()
2071 if (sess->username != NULL && sess->password != NULL) { in qla4xxx_set_param_ddbentry()
2072 if (strlen(sess->username) && strlen(sess->password)) { in qla4xxx_set_param_ddbentry()
[all …]
/linux/tools/testing/selftests/net/
A Dnettest.c96 const char *password; member
260 int keylen = strlen(args->password); in tcp_md5sig()
266 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig()
1514 if (args->password && tcp_md5_remote(lsd, args)) { in do_server()
1638 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock()
1719 args->password = args->client_pw; in do_client()
1985 args.password = optarg; in main()
2052 if (args.password && in main()
2059 if (args.md5_prefix_str && !args.password) { in main()
/linux/include/linux/
A Decryptfs.h101 struct ecryptfs_password password; member
/linux/drivers/target/iscsi/
A Discsi_target_auth.c340 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash()
341 strlen(auth->password)); in chap_server_compute_hash()
/linux/Documentation/i2c/busses/
A Di2c-ali15x3.rst71 full data sheets on the web site are password protected, however if you
72 contact the ALI office in San Jose they may give you the password.
/linux/Documentation/filesystems/cifs/
A Dksmbd.rst52 ksmbd.mountd is userspace process to, transfer user account and password that
124 2. Create user/password for SMB share.

Completed in 59 milliseconds

123