Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 71) sorted by relevance

123

/linux-6.15/security/keys/encrypted-keys/
H A Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok()
59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/linux-6.15/Documentation/ABI/testing/
H A Dsysfs-class-firmware-attributes180 Representing BIOS administrator password
182 Representing a password required to use
188 Representing HDD password
191 Representing NVMe password
209 or resetting to a new password
217 Note, password management is session specific. If Admin password is set,
222 echo "password" > current_password
230 require password validation.
231 On Lenovo systems if you change the Admin password the new password is not active until
260 then either can be used. If a master password is set a user password
[all …]
H A Dsysfs-ibft15 contain the CHAP name (and password), the reverse CHAP
16 name (and password)
/linux-6.15/arch/powerpc/platforms/pseries/
H A Dplpks.c48 u8 password[]; member
132 u8 *password, consumer = PLPKS_OS_OWNER; in plpks_gen_password() local
142 password = kzalloc(roundup_pow_of_two(maxpwsize), GFP_KERNEL); in plpks_gen_password()
143 if (!password) in plpks_gen_password()
147 virt_to_phys(password), maxpwsize); in plpks_gen_password()
153 kfree_sensitive(password); in plpks_gen_password()
156 memcpy(ospassword, password, ospasswordlength); in plpks_gen_password()
166 kfree_sensitive(password); in plpks_gen_password()
190 memcpy(auth->password, ospassword, ospasswordlength); in construct_auth()
662 const u8 *password; in plpks_early_init_devtree() local
[all …]
/linux-6.15/fs/smb/client/
H A Dfs_context.c439 new_ctx->password = NULL; in smb3_fs_context_dup()
454 DUP_CTX_STR(password); in smb3_fs_context_dup()
937 if (new_ctx->password && in smb3_verify_reconfigure_ctx()
938 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx()
996 if (ses->password && in smb3_sync_session_ctx_passwords()
998 strcmp(ses->password, cifs_sb->ctx->password)) { in smb3_sync_session_ctx_passwords()
1000 cifs_sb->ctx->password = kstrdup(ses->password, GFP_KERNEL); in smb3_sync_session_ctx_passwords()
1049 if (ctx->password) { in smb3_reconfigure()
1486 ctx->password = NULL; in smb3_fs_context_parse_param()
1851 ctx->password = NULL; in smb3_fs_context_parse_param()
[all …]
H A Dconnect.c1959 ses->password != NULL) { in match_session()
1968 if (!((strncmp(ses->password, ctx->password ? in match_session()
1983 if (strncmp(ses->password, ctx->password ? in match_session()
2270 if (!ctx->password) { in cifs_set_cifscreds()
2293 ctx->password = NULL; in cifs_set_cifscreds()
2410 if (ctx->password) { in cifs_get_smb_ses()
2411 ses->password = kstrdup(ctx->password, GFP_KERNEL); in cifs_get_smb_ses()
2412 if (!ses->password) in cifs_get_smb_ses()
2717 if (ctx->password) { in cifs_get_tcon()
2718 tcon->password = kstrdup(ctx->password, GFP_KERNEL); in cifs_get_tcon()
[all …]
/linux-6.15/tools/testing/selftests/net/tcp_ao/lib/
H A Dkconfig.c48 const char *password = DEFAULT_TEST_PASSWORD; in has_tcp_ao() local
59 tmp.keylen = strlen(password); in has_tcp_ao()
60 memcpy(tmp.key, password, strlen(password)); in has_tcp_ao()
/linux-6.15/fs/ecryptfs/
H A Ddebug.c29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
H A Dkeystore.c818 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
1034 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1107 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig()
1466 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
1470 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet()
1663 auth_tok->token.password.session_key_encryption_key, in decrypt_passphrase_encrypted_session_key()
1823 new_auth_tok->token.password.signature[ in ecryptfs_parse_packet_set()
1909 memcpy(&(candidate_auth_tok->token.password), in ecryptfs_parse_packet_set()
1910 &(matching_auth_tok->token.password), in ecryptfs_parse_packet_set()
2242 if (auth_tok->token.password.flags & in write_tag_3_packet()
[all …]
/linux-6.15/drivers/platform/x86/
H A Dthink-lmi.c327 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument
330 password); in tlmi_save_bios_settings()
408 strscpy(setting->password, buf, setting->maxlen); in current_password_store()
410 strreplace(setting->password, '\n', '\0'); in current_password_store()
476 tlmi_priv.pwd_admin->password); in new_password_store()
490 setting->pwd_type, setting->password, new_pwd, in new_password_store()
1090 tlmi_priv.pwd_admin->password); in current_value_store()
1113 tlmi_priv.pwd_admin->password, in current_value_store()
1286 tlmi_priv.pwd_admin->password); in save_settings_store()
1294 tlmi_priv.pwd_admin->password, in save_settings_store()
[all …]
H A Dthink-lmi.h74 char password[TLMI_PWD_BUFSIZE]; member
/linux-6.15/sound/isa/opti9xx/
H A Dopti92x-ad1848.c114 unsigned char password; member
199 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init()
205 chip->password = 0xe5; in snd_opti9xx_init()
216 chip->password = 0xe4; in snd_opti9xx_init()
235 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
243 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
259 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
278 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
286 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
302 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
[all …]
H A Dmiro.c93 unsigned char password; member
807 chip->password = 0xe3; in snd_miro_init()
811 chip->password = 0xe5; in snd_miro_init()
829 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
835 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
859 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
865 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
/linux-6.15/Documentation/scsi/
H A Darcmsr_spec.rst231 Command code 0x20--0x?? always check the password,
232 password must be entered to enable these command::
290 byte 3 password length (should be 0x0f)
301 byte 3 password length (should be 0x08)
312 byte 3 password length (should be 0x08)
327 Verify password
332 byte 3 password length
333 byte 4-0x?? user password to be checked
353 byte 3 password length (should be 0x08)
605 Change password
[all …]
/linux-6.15/drivers/of/unittest-data/
H A Dtests-phandle.dtsi9 security-password = "password";
/linux-6.15/drivers/platform/x86/hp/hp-bioscfg/
H A Dpasswdobj-attributes.c11 GET_INSTANCE_ID(password);
81 ATTRIBUTE_N_PROPERTY_SHOW(is_enabled, password);
131 ATTRIBUTE_N_PROPERTY_SHOW(min_password_length, password);
134 ATTRIBUTE_N_PROPERTY_SHOW(max_password_length, password);
166 ATTRIBUTE_VALUES_PROPERTY_SHOW(encodings, password, SEMICOLON_SEP);
/linux-6.15/drivers/input/mouse/
H A Delan_i2c_smbus.c352 u16 password; in elan_smbus_prepare_fw_update() local
395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update()
396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update()
397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
H A Delan_i2c_i2c.c562 u16 password; in elan_i2c_prepare_fw_update() local
618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update()
619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update()
620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
/linux-6.15/Documentation/admin-guide/cifs/
H A Dusage.rst218 password=<password>
243 password=your_password
250 If no password is provided, mount.cifs will prompt for password entry
281 password
282 The user password. If the mount helper is
283 installed, the user will be prompted for password
404 -o user=myname,password=mypassword,domain=mydom
443 password is specified a null password will be used.
675 Use NTLM password hashing (default)
677 Use NTLM password hashing with signing (if
[all …]
/linux-6.15/drivers/scsi/qla4xxx/
H A Dql4_glbl.h84 char *password, int bidi, uint16_t *chap_index);
85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
168 char *password, uint16_t idx);
267 char *password, uint16_t chap_index);
H A Dql4_mbx.c1657 secret_len = strscpy(chap_table->secret, password, in qla4xxx_set_chap()
1699 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument
1711 if (!username || !password) { in qla4xxx_get_uni_chap_at_index()
1742 strscpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index()
1766 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument
1785 if (!username || !password) { in qla4xxx_get_chap_index()
1806 if (!strncmp(chap_table->secret, password, in qla4xxx_get_chap_index()
1820 rval = qla4xxx_set_chap(ha, username, password, in qla4xxx_get_chap_index()
2078 if (sess->username != NULL && sess->password != NULL) { in qla4xxx_set_param_ddbentry()
2079 if (strlen(sess->username) && strlen(sess->password)) { in qla4xxx_set_param_ddbentry()
[all …]
/linux-6.15/net/ethtool/
H A Dmodule_fw.h25 __be32 password; member
/linux-6.15/include/linux/
H A Decryptfs.h101 struct ecryptfs_password password; member
/linux-6.15/tools/testing/selftests/net/
H A Dnettest.c100 const char *password; member
267 int keylen = strlen(args->password); in tcp_md5sig()
273 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig()
1611 if (args->password && tcp_md5_remote(lsd, args)) { in do_server()
1741 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock()
1822 args->password = args->client_pw; in do_client()
2110 args.password = optarg; in main()
2189 if (args.password && in main()
2196 if (args.md5_prefix_str && !args.password) { in main()
/linux-6.15/tools/testing/selftests/net/tcp_ao/
H A Dkey-management.c409 char password[TCP_AO_MAXKEYLEN]; member
466 randomize_buffer(key->password, key->len); in init_key_in_collection()
616 if (test_add_key_cr(sk, key->password, key->len, in key_collection_socket()
771 memcmp(dump_key->key, key->password, key->len)) { in verify_keys()
982 err = test_add_key_cr(sk, key->password, key->len, wrong_addr, in try_unmatched_keys()
994 err = test_add_key_cr(sk, key->password, key->len, this_ip_dest, in try_unmatched_keys()

123