/linux-6.3-rc2/security/keys/encrypted-keys/ |
A D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
/linux-6.3-rc2/Documentation/ABI/testing/ |
A D | sysfs-class-firmware-attributes | 160 Representing BIOS administrator password 162 Representing a password required to use 168 Representing HDD password 171 Representing NVMe password 189 or resetting to a new password 197 Note, password management is session specific. If Admin password is set, 202 echo "password" > current_password 210 require password validation. 211 On Lenovo systems if you change the Admin password the new password is not active until 240 then either can be used. If a master password is set a user password [all …]
|
A D | sysfs-ibft | 15 contain the CHAP name (and password), the reverse CHAP 16 name (and password)
|
/linux-6.3-rc2/arch/powerpc/platforms/pseries/ |
A D | plpks.c | 48 u8 password[]; member 132 u8 *password, consumer = PLPKS_OS_OWNER; in plpks_gen_password() local 142 password = kzalloc(roundup_pow_of_two(maxpwsize), GFP_KERNEL); in plpks_gen_password() 143 if (!password) in plpks_gen_password() 147 virt_to_phys(password), maxpwsize); in plpks_gen_password() 153 kfree(password); in plpks_gen_password() 156 memcpy(ospassword, password, ospasswordlength); in plpks_gen_password() 166 kfree(password); in plpks_gen_password() 190 memcpy(auth->password, ospassword, ospasswordlength); in construct_auth() 662 const u8 *password; in plpks_early_init_devtree() local [all …]
|
/linux-6.3-rc2/fs/ecryptfs/ |
A D | debug.c | 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
A D | keystore.c | 816 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1032 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1105 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1464 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 1468 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet() 1661 auth_tok->token.password.session_key_encryption_key, in decrypt_passphrase_encrypted_session_key() 1821 new_auth_tok->token.password.signature[ in ecryptfs_parse_packet_set() 1907 memcpy(&(candidate_auth_tok->token.password), in ecryptfs_parse_packet_set() 1908 &(matching_auth_tok->token.password), in ecryptfs_parse_packet_set() 2240 if (auth_tok->token.password.flags & in write_tag_3_packet() [all …]
|
/linux-6.3-rc2/sound/isa/opti9xx/ |
A D | opti92x-ad1848.c | 113 unsigned char password; member 198 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init() 204 chip->password = 0xe5; in snd_opti9xx_init() 215 chip->password = 0xe4; in snd_opti9xx_init() 234 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 242 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 258 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 277 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 285 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 301 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() [all …]
|
A D | miro.c | 93 unsigned char password; member 800 chip->password = 0xe3; in snd_miro_init() 804 chip->password = 0xe5; in snd_miro_init() 822 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 828 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 852 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write() 858 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
|
/linux-6.3-rc2/Documentation/scsi/ |
A D | arcmsr_spec.rst | 230 Command code 0x20--0x?? always check the password, 231 password must be entered to enable these command:: 289 byte 3 password length (should be 0x0f) 300 byte 3 password length (should be 0x08) 311 byte 3 password length (should be 0x08) 326 Verify password 331 byte 3 password length 332 byte 4-0x?? user password to be checked 352 byte 3 password length (should be 0x08) 604 Change password [all …]
|
/linux-6.3-rc2/drivers/of/unittest-data/ |
A D | tests-phandle.dtsi | 9 security-password = "password";
|
/linux-6.3-rc2/fs/cifs/ |
A D | fs_context.c | 313 new_ctx->password = NULL; in smb3_fs_context_dup() 325 DUP_CTX_STR(password); in smb3_fs_context_dup() 754 if (new_ctx->password && in smb3_verify_reconfigure_ctx() 755 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx() 816 STEAL_STRING_SENSITIVE(cifs_sb, ctx, password); in smb3_reconfigure() 1172 kfree_sensitive(ctx->password); in smb3_fs_context_parse_param() 1173 ctx->password = NULL; in smb3_fs_context_parse_param() 1178 if (ctx->password == NULL) { in smb3_fs_context_parse_param() 1480 kfree_sensitive(ctx->password); in smb3_fs_context_parse_param() 1581 kfree_sensitive(ctx->password); in smb3_cleanup_fs_context_contents() [all …]
|
A D | connect.c | 1761 ses->password != NULL && in match_session() 1762 strncmp(ses->password, in match_session() 1763 ctx->password ? ctx->password : "", in match_session() 2054 if (!ctx->password) { in cifs_set_cifscreds() 2076 ctx->password = NULL; in cifs_set_cifscreds() 2182 if (ctx->password) { in cifs_get_smb_ses() 2183 ses->password = kstrdup(ctx->password, GFP_KERNEL); in cifs_get_smb_ses() 2184 if (!ses->password) in cifs_get_smb_ses() 2413 if (ctx->password) { in cifs_get_tcon() 2414 tcon->password = kstrdup(ctx->password, GFP_KERNEL); in cifs_get_tcon() [all …]
|
A D | fs_context.h | 169 char *password; member
|
A D | cifs_swn.c | 56 if (tcon->ses->password != NULL) { in cifs_swn_auth_info_ntlm() 57 ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_PASSWORD, tcon->ses->password); in cifs_swn_auth_info_ntlm()
|
/linux-6.3-rc2/drivers/platform/x86/ |
A D | think-lmi.c | 330 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument 333 password); in tlmi_save_bios_settings() 410 strscpy(setting->password, buf, setting->maxlen); in current_password_store() 412 strip_cr(setting->password); in current_password_store() 472 tlmi_priv.pwd_admin->password); in new_password_store() 486 setting->pwd_type, setting->password, new_pwd, in new_password_store() 780 if (!setting->valid || !setting->password[0]) { in certificate_store() 787 new_cert, setting->password); in certificate_store() 992 tlmi_priv.pwd_admin->password, in current_value_store() 1128 if (tlmi_priv.pwd_admin->valid && tlmi_priv.pwd_admin->password[0]) { in debug_cmd_store() [all …]
|
A D | think-lmi.h | 56 char password[TLMI_PWD_BUFSIZE]; member
|
/linux-6.3-rc2/Documentation/admin-guide/cifs/ |
A D | usage.rst | 218 password=<password> 243 password=your_password 250 If no password is provided, mount.cifs will prompt for password entry 281 password 282 The user password. If the mount helper is 443 password is specified a null password will be used. 675 Use NTLM password hashing (default) 677 Use NTLM password hashing with signing (if 681 Use NTLMv2 password hashing 754 may use lanman (weak) password hash 0x00010 [all …]
|
/linux-6.3-rc2/drivers/input/mouse/ |
A D | elan_i2c_smbus.c | 352 u16 password; in elan_smbus_prepare_fw_update() local 395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
|
A D | elan_i2c_i2c.c | 562 u16 password; in elan_i2c_prepare_fw_update() local 618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
/linux-6.3-rc2/drivers/scsi/qla4xxx/ |
A D | ql4_glbl.h | 84 char *password, int bidi, uint16_t *chap_index); 85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 168 char *password, uint16_t idx); 267 char *password, uint16_t chap_index);
|
A D | ql4_mbx.c | 1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap() 1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument 1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1735 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1759 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument 1778 if (!username || !password) { in qla4xxx_get_chap_index() 1799 if (!strncmp(chap_table->secret, password, in qla4xxx_get_chap_index() 1813 rval = qla4xxx_set_chap(ha, username, password, in qla4xxx_get_chap_index() 2071 if (sess->username != NULL && sess->password != NULL) { in qla4xxx_set_param_ddbentry() 2072 if (strlen(sess->username) && strlen(sess->password)) { in qla4xxx_set_param_ddbentry() [all …]
|
/linux-6.3-rc2/tools/testing/selftests/net/ |
A D | nettest.c | 98 const char *password; member 265 int keylen = strlen(args->password); in tcp_md5sig() 271 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig() 1586 if (args->password && tcp_md5_remote(lsd, args)) { in do_server() 1713 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock() 1794 args->password = args->client_pw; in do_client() 2071 args.password = optarg; in main() 2144 if (args.password && in main() 2151 if (args.md5_prefix_str && !args.password) { in main()
|
/linux-6.3-rc2/include/linux/ |
A D | ecryptfs.h | 101 struct ecryptfs_password password; member
|
/linux-6.3-rc2/Documentation/i2c/busses/ |
A D | i2c-ali15x3.rst | 71 full data sheets on the web site are password protected, however if you 72 contact the ALI office in San Jose they may give you the password.
|
/linux-6.3-rc2/drivers/target/iscsi/ |
A D | iscsi_target_auth.c | 383 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash() 384 strlen(auth->password)); in chap_server_compute_hash()
|