/linux-master/security/keys/encrypted-keys/ |
H A D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; 57 strncpy((char *)auth_tok->token.password.signature, key_desc, 59 auth_tok->token.password.session_key_encryption_key_bytes = 62 * Removed auth_tok->token.password.salt and 63 * auth_tok->token.password.session_key_encryption_key 67 auth_tok->token.password.flags |= 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD);
|
/linux-master/fs/ecryptfs/ |
H A D | debug.c | 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, 33 if (auth_tok->token.password.flags & 37 memcpy(sig, auth_tok->token.password.signature,
|
H A D | keystore.c | 739 "password tokens\n", __func__); 761 (u8 *)s->auth_tok->token.password.session_key_encryption_key, 762 s->auth_tok->token.password.session_key_encryption_key_bytes, 816 s->auth_tok->token.password.session_key_encryption_key, 820 "rc = [%d]. s->auth_tok->token.password.session_key_" 824 s->auth_tok->token.password.session_key_encryption_key, 1027 "password tokens\n", __func__); 1032 s->auth_tok->token.password.session_key_encryption_key, 1036 "rc = [%d]. s->auth_tok->token.password.session_key_" 1040 s->auth_tok->token.password [all...] |
/linux-master/tools/testing/selftests/net/tcp_ao/lib/ |
H A D | kconfig.c | 48 const char *password = DEFAULT_TEST_PASSWORD; local 59 tmp.keylen = strlen(password); 60 memcpy(tmp.key, password, strlen(password));
|
H A D | aolib.h | 256 * the password should be loger than 14 bytes, see hmac_setkey() 306 uint8_t prefix, int vrf, const char *password); 308 uint8_t prefix, int vrf, const char *password) 317 prefix, vrf, password); 307 test_set_md5(int sk, const union tcp_addr in_addr, uint8_t prefix, int vrf, const char *password) argument
|
H A D | sock.c | 117 int vrf, const char *password) 119 size_t pwd_len = strlen(password); 123 memcpy(md5sig.tcpm_key, password, pwd_len); 116 __test_set_md5(int sk, void *addr, size_t addr_sz, uint8_t prefix, int vrf, const char *password) argument
|
/linux-master/arch/powerpc/platforms/pseries/ |
H A D | plpks.c | 48 u8 password[]; member in struct:plpks_auth 132 u8 *password, consumer = PLPKS_OS_OWNER; local 135 // If we booted from kexec, we could be reusing an existing password already 141 // The password must not cross a page boundary, so we align to the next power of 2 142 password = kzalloc(roundup_pow_of_two(maxpwsize), GFP_KERNEL); 143 if (!password) 147 virt_to_phys(password), maxpwsize); 153 kfree_sensitive(password); 156 memcpy(ospassword, password, ospasswordlength); 166 kfree_sensitive(password); 662 const u8 *password; local [all...] |
/linux-master/drivers/platform/x86/ |
H A D | think-lmi.h | 43 /* password configuration details */ 65 /* password setting details */ 69 char password[TLMI_PWD_BUFSIZE]; member in struct:tlmi_pwd_setting
|
H A D | think-lmi.c | 71 * Description: Change a specific password. 76 * - A password cannot be set using this method when one does not already 141 * Description: Switch from certificate to password authentication. 279 /* Get password settings from BIOS */ 324 static int tlmi_save_bios_settings(const char *password) argument 327 password); 400 /* pwdlen == 0 is allowed to clear the password */ 404 strscpy(setting->password, buf, setting->maxlen); 405 /* Strip out CR if one is present, setting password won't work if it is present */ 406 strreplace(setting->password, '\ [all...] |
/linux-master/include/linux/ |
H A D | ecryptfs.h | 92 /* May be a password or a private key */ 101 struct ecryptfs_password password; member in union:ecryptfs_auth_tok::__anon10833
|
/linux-master/drivers/platform/x86/hp/hp-bioscfg/ |
H A D | passwdobj-attributes.c | 3 * Functions corresponding to password object type attributes under 11 GET_INSTANCE_ID(password); variable 81 ATTRIBUTE_N_PROPERTY_SHOW(is_enabled, password); 135 ATTRIBUTE_N_PROPERTY_SHOW(min_password_length, password); 138 ATTRIBUTE_N_PROPERTY_SHOW(max_password_length, password); 170 ATTRIBUTE_VALUES_PROPERTY_SHOW(encodings, password, SEMICOLON_SEP); 389 * Populate all properties for an instance under password attribute 391 * @password_obj: ACPI object with password data 498 * Populate all properties for an instance under password object attribute
|
/linux-master/sound/isa/opti9xx/ |
H A D | opti92x-ad1848.c | 113 unsigned char password; member in struct:snd_opti9xx 198 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; 204 chip->password = 0xe5; 215 chip->password = 0xe4; 234 outb(chip->password, chip->mc_base + chip->pwd_reg); 242 outb(chip->password, chip->mc_base + chip->pwd_reg); 258 outb(chip->password, chip->mc_base + chip->pwd_reg); 277 outb(chip->password, chip->mc_base + chip->pwd_reg); 285 outb(chip->password, chip->mc_base + chip->pwd_reg); 301 outb(chip->password, chi [all...] |
H A D | miro.c | 93 unsigned char password; member in struct:snd_miro 800 chip->password = 0xe3; 804 chip->password = 0xe5; 822 outb(chip->password, chip->mc_base + chip->pwd_reg); 828 outb(chip->password, chip->mc_base + chip->pwd_reg); 852 outb(chip->password, chip->mc_base + chip->pwd_reg); 858 outb(chip->password, chip->mc_base + chip->pwd_reg);
|
/linux-master/fs/smb/client/ |
H A D | fs_context.c | 164 fsparam_string("password", Opt_pass), 348 new_ctx->password = NULL; 361 DUP_CTX_STR(password); 842 if (new_ctx->password && 843 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { 846 "can not change password of active session during remount\n"); 850 "can not change password for Kerberos via remount\n"); 908 * We can not change UNC/username/password/domainnam [all...] |
H A D | fs_context.h | 182 char *password; member in struct:smb3_fs_context
|
H A D | connect.c | 1894 /* anything else takes username/password */ 1900 ses->password != NULL && 1901 strncmp(ses->password, 1902 ctx->password ? ctx->password : "", 2178 cifs_dbg(FYI, "Bad len for password search (len=%zd)\n", len); 2187 ctx->password = kstrndup(delim, len, GFP_KERNEL); 2188 if (!ctx->password) { 2189 cifs_dbg(FYI, "Unable to allocate %zd bytes for password\n", 2209 kfree_sensitive(ctx->password); [all...] |
H A D | cifs_swn.c | 56 if (tcon->ses->password != NULL) { 57 ret = nla_put_string(skb, CIFS_GENL_ATTR_SWN_PASSWORD, tcon->ses->password);
|
/linux-master/drivers/input/mouse/ |
H A D | elan_i2c_smbus.c | 352 u16 password; local 366 /* write iap password */ 369 dev_err(dev, "cannot write iap password\n"); 376 dev_err(dev, "failed to write iap password: %d\n", 382 * Read back password to make sure we enabled flash 390 dev_err(dev, "failed to read iap password: %d\n", 395 password = be16_to_cpup((__be16 *)val); 396 if (password != ETP_SMBUS_IAP_PASSWORD) { 397 dev_err(dev, "wrong iap password = 0x%X\n", password); [all...] |
H A D | elan_i2c_i2c.c | 562 u16 password; local 613 dev_err(dev, "cannot read iap password: %d\n", 618 password = le16_to_cpup((__le16 *)val); 619 if (password != ETP_I2C_IAP_PASSWORD) { 620 dev_err(dev, "wrong iap password: 0x%X\n", password);
|
/linux-master/drivers/scsi/qla4xxx/ |
H A D | ql4_glbl.h | 84 char *password, int bidi, uint16_t *chap_index); 85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 168 char *password, uint16_t idx); 267 char *password, uint16_t chap_index);
|
H A D | ql4_mbx.c | 1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, argument 1614 strscpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); 1627 * @password: CHAP password to set 1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, argument 1655 chap_table->secret_len = strlen(password); 1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); 1692 char *password, uint16_t chap_index) 1704 if (!username || !password) { 1735 strscpy(password, chap_tabl 1691 qla4xxx_get_uni_chap_at_index(struct scsi_qla_host *ha, char *username, char *password, uint16_t chap_index) argument 1758 qla4xxx_get_chap_index(struct scsi_qla_host *ha, char *username, char *password, int bidi, uint16_t *chap_index) argument [all...] |
/linux-master/tools/testing/selftests/net/tcp_ao/ |
H A D | key-management.c | 409 char password[TCP_AO_MAXKEYLEN]; member in struct:test_key 466 randomize_buffer(key->password, key->len); 616 if (test_add_key_cr(sk, key->password, key->len, 764 test_fail("%s: key %u:%u changed password len %u != %u", 771 memcmp(dump_key->key, key->password, key->len)) { 772 test_fail("%s: key %u:%u has different password", 982 err = test_add_key_cr(sk, key->password, key->len, wrong_addr, 994 err = test_add_key_cr(sk, key->password, key->len, this_ip_dest,
|
/linux-master/tools/testing/selftests/net/ |
H A D | nettest.c | 100 const char *password; member in struct:sock_args 102 /* prefix for MD5 password */ 267 int keylen = strlen(args->password); 273 memcpy(md5sig.tcpm_key, args->password, keylen); 296 /* ENOENT is harmless. Returned when a password is cleared */ 1611 if (args->password && tcp_md5_remote(lsd, args)) { 1741 if (args->password && tcp_md5sig(sd, addr, alen, args)) 1822 args->password = args->client_pw; 1984 " -M password use MD5 sum protection\n" 1985 " -X password MD [all...] |
/linux-master/drivers/target/iscsi/ |
H A D | iscsi_target_auth.c | 149 pr_err("CHAP user or password not set for" 383 ret = crypto_shash_update(desc, (char *)&auth->password, 384 strlen(auth->password)); 386 pr_err("crypto_shash_update() failed for password\n");
|
/linux-master/include/scsi/ |
H A D | libiscsi.h | 319 char *password; member in struct:iscsi_session
|