Home
last modified time | relevance | path

Searched refs:password (Results 1 – 43 of 43) sorted by relevance

/linux-4.4.14/security/keys/encrypted-keys/
Decryptfs_format.c23 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
59 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
61 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
69 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
75 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
76 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/linux-4.4.14/fs/ecryptfs/
Ddebug.c43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
47 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
51 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
Dkeystore.c743 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
744 s->auth_tok->token.password.session_key_encryption_key_bytes); in ecryptfs_write_tag_70_packet()
764 s->auth_tok->token.password.session_key_encryption_key_bytes); in ecryptfs_write_tag_70_packet()
841 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
849 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
1049 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1057 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1123 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig()
1482 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
1486 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet()
[all …]
/linux-4.4.14/fs/cifs/
Dmisc.c102 if (buf_to_free->password) { in sesInfoFree()
103 memset(buf_to_free->password, 0, strlen(buf_to_free->password)); in sesInfoFree()
104 kfree(buf_to_free->password); in sesInfoFree()
139 if (buf_to_free->password) { in tconInfoFree()
140 memset(buf_to_free->password, 0, strlen(buf_to_free->password)); in tconInfoFree()
141 kfree(buf_to_free->password); in tconInfoFree()
Dconnect.c1665 kfree(vol->password); in cifs_parse_mount_options()
1666 vol->password = NULL; in cifs_parse_mount_options()
1703 kfree(vol->password); in cifs_parse_mount_options()
1706 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options()
1707 if (vol->password == NULL) { in cifs_parse_mount_options()
1713 vol->password[j] = value[i]; in cifs_parse_mount_options()
1719 vol->password[j] = '\0'; in cifs_parse_mount_options()
2285 ses->password != NULL && in match_session()
2286 strncmp(ses->password, in match_session()
2287 vol->password ? vol->password : "", in match_session()
[all …]
Dcifsencrypt.c280 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response()
288 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response()
304 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument
312 if (password) in calc_lanman_hash()
313 strncpy(password_with_pad, password, CIFS_ENCPWD_SIZE); in calc_lanman_hash()
505 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
Dcifsglob.h447 char *password; member
804 char *password; member
833 char *password; /* for share-level security */ member
Dcifsproto.h445 extern int calc_lanman_hash(const char *password, const char *cryptkey,
DKconfig65 security mechanisms. These hash the password more securely
Dsess.c690 rc = calc_lanman_hash(ses->password, ses->server->cryptkey, in sess_auth_lanman()
/linux-4.4.14/drivers/of/unittest-data/
Dtests-phandle.dtsi8 security-password = "password";
/linux-4.4.14/sound/isa/opti9xx/
Dopti92x-ad1848.c131 unsigned char password; member
216 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init()
222 chip->password = 0xe5; in snd_opti9xx_init()
233 chip->password = 0xe4; in snd_opti9xx_init()
252 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
260 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
275 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
294 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
302 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
317 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
[all …]
Dmiro.c109 unsigned char password; member
805 chip->password = 0xe3; in snd_miro_init()
809 chip->password = 0xe5; in snd_miro_init()
827 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
833 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
856 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
862 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
/linux-4.4.14/Documentation/scsi/
Darcmsr_spec.txt131 ** no password checking is needed and should be implemented in separate
133 ** Command code 0x20--0x?? always check the password,
134 ** password must be entered to enable these command.
185 ** byte 3 : password length (should be 0x0f)
191 ** byte 3 : password length (should be 0x08)
197 ** byte 3 : password length (should be 0x08)
204 ** GUI_CHECK_PASSWORD : Verify password
207 ** byte 3 : password length
208 ** byte 4-0x?? : user password to be checked
209 ** GUI_LOGOUT : Logout GUI (force password checking on next command)
[all …]
/linux-4.4.14/Documentation/ABI/testing/
Dsysfs-ibft15 contain the CHAP name (and password), the reverse CHAP
16 name (and password)
/linux-4.4.14/drivers/input/mouse/
Delan_i2c_smbus.c344 u16 password; in elan_smbus_prepare_fw_update() local
387 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update()
388 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update()
389 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
Delan_i2c_i2c.c453 u16 password; in elan_i2c_prepare_fw_update() local
503 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update()
504 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update()
505 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
/linux-4.4.14/Documentation/filesystems/cifs/
DREADME203 pass=<password>
226 password=your_password
227 2) By specifying the password in the PASSWD environment variable (similarly
229 3) By specifying the password in a file by name via PASSWD_FILE
230 4) By specifying the password in a file by file descriptor via PASSWD_FD
232 If no password is provided, mount.cifs will prompt for password entry
257 password The user password. If the mount helper is
258 installed, the user will be prompted for password
357 -o user=myname,password=mypassword,domain=mydom
359 -o sep=.user=myname.password=mypassword.domain=mydom
[all …]
DCHANGES116 on dns_upcall (resolving DFS referralls). Fix plain text password
245 (win9x, os/2 etc.) when null password. Do not send listxattr
257 NTLMv2 authentication support (now can use stronger password hashing
298 directio. Recognize share mode security and send NTLM encrypted password
433 from Samba server to DC (Samba required dummy LM password).
558 Fix PPC64 build error. Reduce excessive stack usage in smb password
634 Allow passwords longer than 16 bytes. Allow null password string.
671 Fix unsafe global variable usage and password hash failure on gcc 3.3.1
874 Fix temporary socket leak when bad userid or password specified
1051 5) Removed logging of password field.
/linux-4.4.14/drivers/scsi/qla4xxx/
Dql4_glbl.h85 char *password, int bidi, uint16_t *chap_index);
86 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
171 char *password, uint16_t idx);
270 char *password, uint16_t chap_index);
Dql4_mbx.c1581 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument
1623 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap()
1644 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument
1665 chap_table->secret_len = strlen(password); in qla4xxx_set_chap()
1666 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap()
1702 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument
1714 if (!username || !password) { in qla4xxx_get_uni_chap_at_index()
1745 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index()
1769 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument
1788 if (!username || !password) { in qla4xxx_get_chap_index()
[all …]
Dql4_os.c755 strlcpy(chap_rec->password, chap_table->secret, in qla4xxx_get_chap_list()
942 size = min_t(size_t, sizeof(chap_rec.password), in qla4xxx_set_chap_entry()
944 memcpy(chap_rec.password, param_info->value, size); in qla4xxx_set_chap_entry()
1001 rc = qla4xxx_set_chap(ha, chap_rec.username, chap_rec.password, in qla4xxx_set_chap_entry()
2834 sess->password, in qla4xxx_session_get_param()
2850 !sess->username && !sess->password) { in qla4xxx_session_get_param()
5995 char *password) in qla4xxx_get_bidi_chap() argument
6026 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_bidi_chap()
/linux-4.4.14/drivers/target/iscsi/
Discsi_target_auth.c271 sg_init_one(&sg, &auth->password, strlen(auth->password)); in chap_server_compute_md5()
272 ret = crypto_hash_update(&desc, &sg, strlen(auth->password)); in chap_server_compute_md5()
Discsi_target_configfs.c466 DEF_NACL_AUTH_STR(password, NAF_PASSWORD_SET);
953 DEF_TPG_AUTH_STR(password, NAF_PASSWORD_SET);
1351 DEF_DISC_AUTH_STR(password, NAF_PASSWORD_SET);
/linux-4.4.14/include/linux/
Decryptfs.h100 struct ecryptfs_password password; member
/linux-4.4.14/Documentation/i2c/busses/
Di2c-ali15x363 full data sheets on the web site are password protected, however if you
64 contact the ALI office in San Jose they may give you the password.
/linux-4.4.14/Documentation/
DSAK.txt5 provided as protection against trojan password capturing programs. It
Dsysrq.txt139 trojan program running at console which could grab your password
/linux-4.4.14/include/scsi/
Dlibiscsi.h308 char *password; member
Dscsi_transport_iscsi.h376 char *password; member
Discsi_if.h850 uint8_t password[ISCSI_CHAP_AUTH_SECRET_MAX_LEN]; member
/linux-4.4.14/include/target/iscsi/
Discsi_target_core.h735 char password[MAX_PASS_LEN]; member
/linux-4.4.14/Documentation/filesystems/
Dafs.txt203 Currently the username, realm, password and proposed ticket lifetime are
/linux-4.4.14/Documentation/crypto/
Ddescore-readme.txt57 and password cracking, i haven't really bothered yet to speed up
90 password-cracking applications, he also used the same ideas to
/linux-4.4.14/drivers/net/ethernet/via/
Dvia-velocity.h1226 u8 password[6]; member
/linux-4.4.14/Documentation/networking/
DREADME.sb100087 to specify your login name and password and any site-specific information
/linux-4.4.14/drivers/scsi/
Dlibiscsi.c2846 kfree(session->password); in iscsi_session_teardown()
3263 return iscsi_switch_str_param(&session->password, buf); in iscsi_set_param()
3369 len = sprintf(buf, "%s\n", session->password); in iscsi_session_get_param()
Dscsi_transport_iscsi.c866 iscsi_flashnode_sess_attr(fnode, password, ISCSI_FLASHNODE_PASSWORD);
3971 iscsi_session_attr(password, ISCSI_PARAM_PASSWORD, 1);
/linux-4.4.14/Documentation/s390/
D3270.txt243 invisible (such as for password entry) and it is not identical to the
DDebugging390.txt1566 LINK userid devno1 devno2 mode password
/linux-4.4.14/drivers/firewire/
Dsbp2.c291 struct sbp2_pointer password; member
/linux-4.4.14/drivers/staging/speakup/
Dspkguide.txt149 At this point, you'll need to type in your user id and password, as
151 letters of your user id as you type it, but not the password. This is
152 because the password is not displayed on the screen for security
/linux-4.4.14/Documentation/virtual/uml/
DUserModeLinux-HOWTO.txt461 The prepackaged filesystems have a root account with password 'root'
462 and a user account with password 'user'. The login banner will
2975 Give root password for maintenance
3437 Give root password for maintenance