| /linux/security/keys/encrypted-keys/ |
| A D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
| /linux/Documentation/ABI/testing/ |
| A D | sysfs-class-firmware-attributes | 180 Representing BIOS administrator password 182 Representing a password required to use 188 Representing HDD password 191 Representing NVMe password 209 or resetting to a new password 217 Note, password management is session specific. If Admin password is set, 222 echo "password" > current_password 230 require password validation. 231 On Lenovo systems if you change the Admin password the new password is not active until 260 then either can be used. If a master password is set a user password [all …]
|
| A D | sysfs-ibft | 15 contain the CHAP name (and password), the reverse CHAP 16 name (and password)
|
| /linux/arch/powerpc/platforms/pseries/ |
| A D | plpks.c | 48 u8 password[]; member 132 u8 *password, consumer = PLPKS_OS_OWNER; in plpks_gen_password() local 142 password = kzalloc(roundup_pow_of_two(maxpwsize), GFP_KERNEL); in plpks_gen_password() 143 if (!password) in plpks_gen_password() 147 virt_to_phys(password), maxpwsize); in plpks_gen_password() 153 kfree_sensitive(password); in plpks_gen_password() 156 memcpy(ospassword, password, ospasswordlength); in plpks_gen_password() 166 kfree_sensitive(password); in plpks_gen_password() 190 memcpy(auth->password, ospassword, ospasswordlength); in construct_auth() 662 const u8 *password; in plpks_early_init_devtree() local [all …]
|
| /linux/tools/testing/selftests/net/tcp_ao/lib/ |
| A D | kconfig.c | 48 const char *password = DEFAULT_TEST_PASSWORD; in has_tcp_ao() local 59 tmp.keylen = strlen(password); in has_tcp_ao() 60 memcpy(tmp.key, password, strlen(password)); in has_tcp_ao()
|
| /linux/fs/ecryptfs/ |
| A D | debug.c | 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
| A D | keystore.c | 818 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1034 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1107 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1466 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 1470 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet() 1663 auth_tok->token.password.session_key_encryption_key, in decrypt_passphrase_encrypted_session_key() 1823 new_auth_tok->token.password.signature[ in ecryptfs_parse_packet_set() 1909 memcpy(&(candidate_auth_tok->token.password), in ecryptfs_parse_packet_set() 1910 &(matching_auth_tok->token.password), in ecryptfs_parse_packet_set() 2242 if (auth_tok->token.password.flags & in write_tag_3_packet() [all …]
|
| /linux/fs/smb/client/ |
| A D | fs_context.c | 350 new_ctx->password = NULL; in smb3_fs_context_dup() 363 DUP_CTX_STR(password); in smb3_fs_context_dup() 844 if (new_ctx->password && in smb3_verify_reconfigure_ctx() 845 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx() 922 ses->password = kstrdup(ctx->password, GFP_KERNEL); in smb3_reconfigure() 923 if (!ses->password) in smb3_reconfigure() 929 ses->password = NULL; in smb3_reconfigure() 1310 ctx->password = NULL; in smb3_fs_context_parse_param() 1315 if (ctx->password == NULL) { in smb3_fs_context_parse_param() 1634 ctx->password = NULL; in smb3_fs_context_parse_param() [all …]
|
| /linux/drivers/platform/x86/ |
| A D | think-lmi.c | 334 password); in tlmi_save_bios_settings() 411 strscpy(setting->password, buf, setting->maxlen); in current_password_store() 413 strreplace(setting->password, '\n', '\0'); in current_password_store() 474 tlmi_priv.pwd_admin->password); in new_password_store() 780 if (!setting->valid || !setting->password[0]) { in certificate_store() 787 new_cert, setting->password); in certificate_store() 1024 tlmi_priv.pwd_admin->password); in current_value_store() 1047 tlmi_priv.pwd_admin->password, in current_value_store() 1220 tlmi_priv.pwd_admin->password); in save_settings_store() 1228 tlmi_priv.pwd_admin->password, in save_settings_store() [all …]
|
| A D | think-lmi.h | 69 char password[TLMI_PWD_BUFSIZE]; member
|
| /linux/sound/isa/opti9xx/ |
| A D | opti92x-ad1848.c | 114 unsigned char password; member 199 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init() 205 chip->password = 0xe5; in snd_opti9xx_init() 216 chip->password = 0xe4; in snd_opti9xx_init() 235 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 243 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 259 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 278 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 286 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 302 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() [all …]
|
| A D | miro.c | 93 unsigned char password; member 807 chip->password = 0xe3; in snd_miro_init() 811 chip->password = 0xe5; in snd_miro_init() 829 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 835 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 859 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write() 865 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
|
| /linux/Documentation/scsi/ |
| A D | arcmsr_spec.rst | 231 Command code 0x20--0x?? always check the password, 232 password must be entered to enable these command:: 290 byte 3 password length (should be 0x0f) 301 byte 3 password length (should be 0x08) 312 byte 3 password length (should be 0x08) 327 Verify password 332 byte 3 password length 333 byte 4-0x?? user password to be checked 353 byte 3 password length (should be 0x08) 605 Change password [all …]
|
| /linux/drivers/of/unittest-data/ |
| A D | tests-phandle.dtsi | 9 security-password = "password";
|
| /linux/drivers/platform/x86/hp/hp-bioscfg/ |
| A D | passwdobj-attributes.c | 11 GET_INSTANCE_ID(password); 81 ATTRIBUTE_N_PROPERTY_SHOW(is_enabled, password); 131 ATTRIBUTE_N_PROPERTY_SHOW(min_password_length, password); 134 ATTRIBUTE_N_PROPERTY_SHOW(max_password_length, password); 166 ATTRIBUTE_VALUES_PROPERTY_SHOW(encodings, password, SEMICOLON_SEP);
|
| /linux/drivers/input/mouse/ |
| A D | elan_i2c_smbus.c | 352 u16 password; in elan_smbus_prepare_fw_update() local 395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
|
| A D | elan_i2c_i2c.c | 562 u16 password; in elan_i2c_prepare_fw_update() local 618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
| /linux/Documentation/admin-guide/cifs/ |
| A D | usage.rst | 218 password=<password> 243 password=your_password 250 If no password is provided, mount.cifs will prompt for password entry 281 password 282 The user password. If the mount helper is 283 installed, the user will be prompted for password 404 -o user=myname,password=mypassword,domain=mydom 443 password is specified a null password will be used. 675 Use NTLM password hashing (default) 677 Use NTLM password hashing with signing (if [all …]
|
| /linux/drivers/scsi/qla4xxx/ |
| A D | ql4_glbl.h | 84 char *password, int bidi, uint16_t *chap_index); 85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 168 char *password, uint16_t idx); 267 char *password, uint16_t chap_index);
|
| A D | ql4_mbx.c | 1657 secret_len = strscpy(chap_table->secret, password, in qla4xxx_set_chap() 1699 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument 1711 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1742 strscpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1766 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument 1785 if (!username || !password) { in qla4xxx_get_chap_index() 1806 if (!strncmp(chap_table->secret, password, in qla4xxx_get_chap_index() 1820 rval = qla4xxx_set_chap(ha, username, password, in qla4xxx_get_chap_index() 2078 if (sess->username != NULL && sess->password != NULL) { in qla4xxx_set_param_ddbentry() 2079 if (strlen(sess->username) && strlen(sess->password)) { in qla4xxx_set_param_ddbentry() [all …]
|
| /linux/net/ethtool/ |
| A D | module_fw.h | 25 __be32 password; member
|
| A D | cmis_cdb.c | 139 __be32 password; member 177 pe_pl.password = params->password; in cmis_cdb_validate_password()
|
| /linux/include/linux/ |
| A D | ecryptfs.h | 101 struct ecryptfs_password password; member
|
| /linux/tools/testing/selftests/net/ |
| A D | nettest.c | 100 const char *password; member 267 int keylen = strlen(args->password); in tcp_md5sig() 273 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig() 1611 if (args->password && tcp_md5_remote(lsd, args)) { in do_server() 1741 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock() 1822 args->password = args->client_pw; in do_client() 2110 args.password = optarg; in main() 2189 if (args.password && in main() 2196 if (args.md5_prefix_str && !args.password) { in main()
|
| /linux/tools/testing/selftests/net/tcp_ao/ |
| A D | key-management.c | 409 char password[TCP_AO_MAXKEYLEN]; member 466 randomize_buffer(key->password, key->len); in init_key_in_collection() 616 if (test_add_key_cr(sk, key->password, key->len, in key_collection_socket() 771 memcmp(dump_key->key, key->password, key->len)) { in verify_keys() 982 err = test_add_key_cr(sk, key->password, key->len, wrong_addr, in try_unmatched_keys() 994 err = test_add_key_cr(sk, key->password, key->len, this_ip_dest, in try_unmatched_keys()
|