Searched refs:password (Results 1 - 25 of 39) sorted by relevance

12

/linux-master/security/keys/encrypted-keys/
H A Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key;
57 strncpy((char *)auth_tok->token.password.signature, key_desc,
59 auth_tok->token.password.session_key_encryption_key_bytes =
62 * Removed auth_tok->token.password.salt and
63 * auth_tok->token.password.session_key_encryption_key
67 auth_tok->token.password.flags |=
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512;
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD);
/linux-master/fs/ecryptfs/
H A Ddebug.c29 ecryptfs_to_hex(salt, auth_tok->token.password.salt,
33 if (auth_tok->token.password.flags &
37 memcpy(sig, auth_tok->token.password.signature,
H A Dkeystore.c739 "password tokens\n", __func__);
761 (u8 *)s->auth_tok->token.password.session_key_encryption_key,
762 s->auth_tok->token.password.session_key_encryption_key_bytes,
816 s->auth_tok->token.password.session_key_encryption_key,
820 "rc = [%d]. s->auth_tok->token.password.session_key_"
824 s->auth_tok->token.password.session_key_encryption_key,
1027 "password tokens\n", __func__);
1032 s->auth_tok->token.password.session_key_encryption_key,
1036 "rc = [%d]. s->auth_tok->token.password.session_key_"
1040 s->auth_tok->token.password
[all...]
/linux-master/tools/testing/selftests/net/tcp_ao/lib/
H A Dkconfig.c48 const char *password = DEFAULT_TEST_PASSWORD; local
59 tmp.keylen = strlen(password);
60 memcpy(tmp.key, password, strlen(password));
H A Daolib.h256 * the password should be loger than 14 bytes, see hmac_setkey()
306 uint8_t prefix, int vrf, const char *password);
308 uint8_t prefix, int vrf, const char *password)
317 prefix, vrf, password);
307 test_set_md5(int sk, const union tcp_addr in_addr, uint8_t prefix, int vrf, const char *password) argument
H A Dsock.c117 int vrf, const char *password)
119 size_t pwd_len = strlen(password);
123 memcpy(md5sig.tcpm_key, password, pwd_len);
116 __test_set_md5(int sk, void *addr, size_t addr_sz, uint8_t prefix, int vrf, const char *password) argument
/linux-master/arch/powerpc/platforms/pseries/
H A Dplpks.c48 u8 password[]; member in struct:plpks_auth
132 u8 *password, consumer = PLPKS_OS_OWNER; local
135 // If we booted from kexec, we could be reusing an existing password already
141 // The password must not cross a page boundary, so we align to the next power of 2
142 password = kzalloc(roundup_pow_of_two(maxpwsize), GFP_KERNEL);
143 if (!password)
147 virt_to_phys(password), maxpwsize);
153 kfree_sensitive(password);
156 memcpy(ospassword, password, ospasswordlength);
166 kfree_sensitive(password);
662 const u8 *password; local
[all...]
/linux-master/drivers/platform/x86/
H A Dthink-lmi.h43 /* password configuration details */
65 /* password setting details */
69 char password[TLMI_PWD_BUFSIZE]; member in struct:tlmi_pwd_setting
H A Dthink-lmi.c71 * Description: Change a specific password.
76 * - A password cannot be set using this method when one does not already
141 * Description: Switch from certificate to password authentication.
279 /* Get password settings from BIOS */
324 static int tlmi_save_bios_settings(const char *password) argument
327 password);
400 /* pwdlen == 0 is allowed to clear the password */
404 strscpy(setting->password, buf, setting->maxlen);
405 /* Strip out CR if one is present, setting password won't work if it is present */
406 strreplace(setting->password, '\
[all...]
/linux-master/include/linux/
H A Decryptfs.h92 /* May be a password or a private key */
101 struct ecryptfs_password password; member in union:ecryptfs_auth_tok::__anon10833
/linux-master/drivers/platform/x86/hp/hp-bioscfg/
H A Dpasswdobj-attributes.c3 * Functions corresponding to password object type attributes under
11 GET_INSTANCE_ID(password); variable
81 ATTRIBUTE_N_PROPERTY_SHOW(is_enabled, password);
135 ATTRIBUTE_N_PROPERTY_SHOW(min_password_length, password);
138 ATTRIBUTE_N_PROPERTY_SHOW(max_password_length, password);
170 ATTRIBUTE_VALUES_PROPERTY_SHOW(encodings, password, SEMICOLON_SEP);
389 * Populate all properties for an instance under password attribute
391 * @password_obj: ACPI object with password data
498 * Populate all properties for an instance under password object attribute
/linux-master/sound/isa/opti9xx/
H A Dopti92x-ad1848.c113 unsigned char password; member in struct:snd_opti9xx
198 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3;
204 chip->password = 0xe5;
215 chip->password = 0xe4;
234 outb(chip->password, chip->mc_base + chip->pwd_reg);
242 outb(chip->password, chip->mc_base + chip->pwd_reg);
258 outb(chip->password, chip->mc_base + chip->pwd_reg);
277 outb(chip->password, chip->mc_base + chip->pwd_reg);
285 outb(chip->password, chip->mc_base + chip->pwd_reg);
301 outb(chip->password, chi
[all...]
H A Dmiro.c93 unsigned char password; member in struct:snd_miro
800 chip->password = 0xe3;
804 chip->password = 0xe5;
822 outb(chip->password, chip->mc_base + chip->pwd_reg);
828 outb(chip->password, chip->mc_base + chip->pwd_reg);
852 outb(chip->password, chip->mc_base + chip->pwd_reg);
858 outb(chip->password, chip->mc_base + chip->pwd_reg);
/linux-master/fs/smb/client/
H A Dfs_context.c164 fsparam_string("password", Opt_pass),
348 new_ctx->password = NULL;
361 DUP_CTX_STR(password);
842 if (new_ctx->password &&
843 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) {
846 "can not change password of active session during remount\n");
850 "can not change password for Kerberos via remount\n");
908 * We can not change UNC/username/password/domainnam
[all...]
H A Dfs_context.h182 char *password; member in struct:smb3_fs_context
H A Dconnect.c1894 /* anything else takes username/password */
1900 ses->password != NULL &&
1901 strncmp(ses->password,
1902 ctx->password ? ctx->password : "",
2178 cifs_dbg(FYI, "Bad len for password search (len=%zd)\n", len);
2187 ctx->password = kstrndup(delim, len, GFP_KERNEL);
2188 if (!ctx->password) {
2189 cifs_dbg(FYI, "Unable to allocate %zd bytes for password\n",
2209 kfree_sensitive(ctx->password);
[all...]
H A Dcifs_swn.c56 if (tcon->ses->password != NULL) {
57 ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_PASSWORD, tcon->ses->password);
/linux-master/drivers/input/mouse/
H A Delan_i2c_smbus.c352 u16 password; local
366 /* write iap password */
369 dev_err(dev, "cannot write iap password\n");
376 dev_err(dev, "failed to write iap password: %d\n",
382 * Read back password to make sure we enabled flash
390 dev_err(dev, "failed to read iap password: %d\n",
395 password = be16_to_cpup((__be16 *)val);
396 if (password != ETP_SMBUS_IAP_PASSWORD) {
397 dev_err(dev, "wrong iap password = 0x%X\n", password);
[all...]
H A Delan_i2c_i2c.c562 u16 password; local
613 dev_err(dev, "cannot read iap password: %d\n",
618 password = le16_to_cpup((__le16 *)val);
619 if (password != ETP_I2C_IAP_PASSWORD) {
620 dev_err(dev, "wrong iap password: 0x%X\n", password);
/linux-master/drivers/scsi/qla4xxx/
H A Dql4_glbl.h84 char *password, int bidi, uint16_t *chap_index);
85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
168 char *password, uint16_t idx);
267 char *password, uint16_t chap_index);
H A Dql4_mbx.c1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, argument
1614 strscpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN);
1627 * @password: CHAP password to set
1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, argument
1655 chap_table->secret_len = strlen(password);
1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1);
1692 char *password, uint16_t chap_index)
1704 if (!username || !password) {
1735 strscpy(password, chap_tabl
1691 qla4xxx_get_uni_chap_at_index(struct scsi_qla_host *ha, char *username, char *password, uint16_t chap_index) argument
1758 qla4xxx_get_chap_index(struct scsi_qla_host *ha, char *username, char *password, int bidi, uint16_t *chap_index) argument
[all...]
/linux-master/tools/testing/selftests/net/tcp_ao/
H A Dkey-management.c409 char password[TCP_AO_MAXKEYLEN]; member in struct:test_key
466 randomize_buffer(key->password, key->len);
616 if (test_add_key_cr(sk, key->password, key->len,
764 test_fail("%s: key %u:%u changed password len %u != %u",
771 memcmp(dump_key->key, key->password, key->len)) {
772 test_fail("%s: key %u:%u has different password",
982 err = test_add_key_cr(sk, key->password, key->len, wrong_addr,
994 err = test_add_key_cr(sk, key->password, key->len, this_ip_dest,
/linux-master/tools/testing/selftests/net/
H A Dnettest.c100 const char *password; member in struct:sock_args
102 /* prefix for MD5 password */
267 int keylen = strlen(args->password);
273 memcpy(md5sig.tcpm_key, args->password, keylen);
296 /* ENOENT is harmless. Returned when a password is cleared */
1611 if (args->password && tcp_md5_remote(lsd, args)) {
1741 if (args->password && tcp_md5sig(sd, addr, alen, args))
1822 args->password = args->client_pw;
1984 " -M password use MD5 sum protection\n"
1985 " -X password MD
[all...]
/linux-master/drivers/target/iscsi/
H A Discsi_target_auth.c149 pr_err("CHAP user or password not set for"
383 ret = crypto_shash_update(desc, (char *)&auth->password,
384 strlen(auth->password));
386 pr_err("crypto_shash_update() failed for password\n");
/linux-master/include/scsi/
H A Dlibiscsi.h319 char *password; member in struct:iscsi_session

Completed in 202 milliseconds

12