/linux-4.4.14/security/keys/encrypted-keys/ |
D | ecryptfs_format.c | 23 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 59 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 61 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 69 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 75 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 76 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
/linux-4.4.14/fs/ecryptfs/ |
D | debug.c | 43 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 47 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 51 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
D | keystore.c | 743 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 744 s->auth_tok->token.password.session_key_encryption_key_bytes); in ecryptfs_write_tag_70_packet() 764 s->auth_tok->token.password.session_key_encryption_key_bytes); in ecryptfs_write_tag_70_packet() 841 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 849 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1049 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1057 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1123 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1482 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 1486 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet() [all …]
|
/linux-4.4.14/fs/cifs/ |
D | misc.c | 102 if (buf_to_free->password) { in sesInfoFree() 103 memset(buf_to_free->password, 0, strlen(buf_to_free->password)); in sesInfoFree() 104 kfree(buf_to_free->password); in sesInfoFree() 139 if (buf_to_free->password) { in tconInfoFree() 140 memset(buf_to_free->password, 0, strlen(buf_to_free->password)); in tconInfoFree() 141 kfree(buf_to_free->password); in tconInfoFree()
|
D | connect.c | 1665 kfree(vol->password); in cifs_parse_mount_options() 1666 vol->password = NULL; in cifs_parse_mount_options() 1703 kfree(vol->password); in cifs_parse_mount_options() 1706 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options() 1707 if (vol->password == NULL) { in cifs_parse_mount_options() 1713 vol->password[j] = value[i]; in cifs_parse_mount_options() 1719 vol->password[j] = '\0'; in cifs_parse_mount_options() 2285 ses->password != NULL && in match_session() 2286 strncmp(ses->password, in match_session() 2287 vol->password ? vol->password : "", in match_session() [all …]
|
D | cifsencrypt.c | 280 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response() 288 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response() 304 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument 312 if (password) in calc_lanman_hash() 313 strncpy(password_with_pad, password, CIFS_ENCPWD_SIZE); in calc_lanman_hash() 505 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
|
D | cifsglob.h | 447 char *password; member 804 char *password; member 833 char *password; /* for share-level security */ member
|
D | cifsproto.h | 445 extern int calc_lanman_hash(const char *password, const char *cryptkey,
|
D | Kconfig | 65 security mechanisms. These hash the password more securely
|
D | sess.c | 690 rc = calc_lanman_hash(ses->password, ses->server->cryptkey, in sess_auth_lanman()
|
/linux-4.4.14/drivers/of/unittest-data/ |
D | tests-phandle.dtsi | 8 security-password = "password";
|
/linux-4.4.14/sound/isa/opti9xx/ |
D | opti92x-ad1848.c | 131 unsigned char password; member 216 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init() 222 chip->password = 0xe5; in snd_opti9xx_init() 233 chip->password = 0xe4; in snd_opti9xx_init() 252 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 260 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 275 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 294 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 302 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 317 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() [all …]
|
D | miro.c | 109 unsigned char password; member 805 chip->password = 0xe3; in snd_miro_init() 809 chip->password = 0xe5; in snd_miro_init() 827 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 833 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 856 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write() 862 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
|
/linux-4.4.14/Documentation/scsi/ |
D | arcmsr_spec.txt | 131 ** no password checking is needed and should be implemented in separate 133 ** Command code 0x20--0x?? always check the password, 134 ** password must be entered to enable these command. 185 ** byte 3 : password length (should be 0x0f) 191 ** byte 3 : password length (should be 0x08) 197 ** byte 3 : password length (should be 0x08) 204 ** GUI_CHECK_PASSWORD : Verify password 207 ** byte 3 : password length 208 ** byte 4-0x?? : user password to be checked 209 ** GUI_LOGOUT : Logout GUI (force password checking on next command) [all …]
|
/linux-4.4.14/Documentation/ABI/testing/ |
D | sysfs-ibft | 15 contain the CHAP name (and password), the reverse CHAP 16 name (and password)
|
/linux-4.4.14/drivers/input/mouse/ |
D | elan_i2c_smbus.c | 344 u16 password; in elan_smbus_prepare_fw_update() local 387 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 388 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 389 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
|
D | elan_i2c_i2c.c | 453 u16 password; in elan_i2c_prepare_fw_update() local 503 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 504 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 505 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
/linux-4.4.14/Documentation/filesystems/cifs/ |
D | README | 203 pass=<password> 226 password=your_password 227 2) By specifying the password in the PASSWD environment variable (similarly 229 3) By specifying the password in a file by name via PASSWD_FILE 230 4) By specifying the password in a file by file descriptor via PASSWD_FD 232 If no password is provided, mount.cifs will prompt for password entry 257 password The user password. If the mount helper is 258 installed, the user will be prompted for password 357 -o user=myname,password=mypassword,domain=mydom 359 -o sep=.user=myname.password=mypassword.domain=mydom [all …]
|
D | CHANGES | 116 on dns_upcall (resolving DFS referralls). Fix plain text password 245 (win9x, os/2 etc.) when null password. Do not send listxattr 257 NTLMv2 authentication support (now can use stronger password hashing 298 directio. Recognize share mode security and send NTLM encrypted password 433 from Samba server to DC (Samba required dummy LM password). 558 Fix PPC64 build error. Reduce excessive stack usage in smb password 634 Allow passwords longer than 16 bytes. Allow null password string. 671 Fix unsafe global variable usage and password hash failure on gcc 3.3.1 874 Fix temporary socket leak when bad userid or password specified 1051 5) Removed logging of password field.
|
/linux-4.4.14/drivers/scsi/qla4xxx/ |
D | ql4_glbl.h | 85 char *password, int bidi, uint16_t *chap_index); 86 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 171 char *password, uint16_t idx); 270 char *password, uint16_t chap_index);
|
D | ql4_mbx.c | 1581 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument 1623 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1644 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument 1665 chap_table->secret_len = strlen(password); in qla4xxx_set_chap() 1666 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap() 1702 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument 1714 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1745 strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1769 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument 1788 if (!username || !password) { in qla4xxx_get_chap_index() [all …]
|
D | ql4_os.c | 755 strlcpy(chap_rec->password, chap_table->secret, in qla4xxx_get_chap_list() 942 size = min_t(size_t, sizeof(chap_rec.password), in qla4xxx_set_chap_entry() 944 memcpy(chap_rec.password, param_info->value, size); in qla4xxx_set_chap_entry() 1001 rc = qla4xxx_set_chap(ha, chap_rec.username, chap_rec.password, in qla4xxx_set_chap_entry() 2834 sess->password, in qla4xxx_session_get_param() 2850 !sess->username && !sess->password) { in qla4xxx_session_get_param() 5995 char *password) in qla4xxx_get_bidi_chap() argument 6026 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_bidi_chap()
|
/linux-4.4.14/drivers/target/iscsi/ |
D | iscsi_target_auth.c | 271 sg_init_one(&sg, &auth->password, strlen(auth->password)); in chap_server_compute_md5() 272 ret = crypto_hash_update(&desc, &sg, strlen(auth->password)); in chap_server_compute_md5()
|
D | iscsi_target_configfs.c | 466 DEF_NACL_AUTH_STR(password, NAF_PASSWORD_SET); 953 DEF_TPG_AUTH_STR(password, NAF_PASSWORD_SET); 1351 DEF_DISC_AUTH_STR(password, NAF_PASSWORD_SET);
|
/linux-4.4.14/include/linux/ |
D | ecryptfs.h | 100 struct ecryptfs_password password; member
|
/linux-4.4.14/Documentation/i2c/busses/ |
D | i2c-ali15x3 | 63 full data sheets on the web site are password protected, however if you 64 contact the ALI office in San Jose they may give you the password.
|
/linux-4.4.14/Documentation/ |
D | SAK.txt | 5 provided as protection against trojan password capturing programs. It
|
D | sysrq.txt | 139 trojan program running at console which could grab your password
|
/linux-4.4.14/include/scsi/ |
D | libiscsi.h | 308 char *password; member
|
D | scsi_transport_iscsi.h | 376 char *password; member
|
D | iscsi_if.h | 850 uint8_t password[ISCSI_CHAP_AUTH_SECRET_MAX_LEN]; member
|
/linux-4.4.14/include/target/iscsi/ |
D | iscsi_target_core.h | 735 char password[MAX_PASS_LEN]; member
|
/linux-4.4.14/Documentation/filesystems/ |
D | afs.txt | 203 Currently the username, realm, password and proposed ticket lifetime are
|
/linux-4.4.14/Documentation/crypto/ |
D | descore-readme.txt | 57 and password cracking, i haven't really bothered yet to speed up 90 password-cracking applications, he also used the same ideas to
|
/linux-4.4.14/drivers/net/ethernet/via/ |
D | via-velocity.h | 1226 u8 password[6]; member
|
/linux-4.4.14/Documentation/networking/ |
D | README.sb1000 | 87 to specify your login name and password and any site-specific information
|
/linux-4.4.14/drivers/scsi/ |
D | libiscsi.c | 2846 kfree(session->password); in iscsi_session_teardown() 3263 return iscsi_switch_str_param(&session->password, buf); in iscsi_set_param() 3369 len = sprintf(buf, "%s\n", session->password); in iscsi_session_get_param()
|
D | scsi_transport_iscsi.c | 866 iscsi_flashnode_sess_attr(fnode, password, ISCSI_FLASHNODE_PASSWORD); 3971 iscsi_session_attr(password, ISCSI_PARAM_PASSWORD, 1);
|
/linux-4.4.14/Documentation/s390/ |
D | 3270.txt | 243 invisible (such as for password entry) and it is not identical to the
|
D | Debugging390.txt | 1566 LINK userid devno1 devno2 mode password
|
/linux-4.4.14/drivers/firewire/ |
D | sbp2.c | 291 struct sbp2_pointer password; member
|
/linux-4.4.14/drivers/staging/speakup/ |
D | spkguide.txt | 149 At this point, you'll need to type in your user id and password, as 151 letters of your user id as you type it, but not the password. This is 152 because the password is not displayed on the screen for security
|
/linux-4.4.14/Documentation/virtual/uml/ |
D | UserModeLinux-HOWTO.txt | 461 The prepackaged filesystems have a root account with password 'root' 462 and a user account with password 'user'. The login banner will 2975 Give root password for maintenance 3437 Give root password for maintenance
|