/linux-6.6.21/security/keys/encrypted-keys/ ! |
D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
/linux-6.6.21/Documentation/ABI/testing/ ! |
D | sysfs-class-firmware-attributes | 159 For example a "BIOS Admin" password and "System" Password can be set, 162 - An "Admin" password is used for preventing modification to the BIOS 164 - A "System" password is required to boot a machine. 180 Representing BIOS administrator password 182 Representing a password required to use 185 Representing System Management password. 188 Representing HDD password 191 Representing NVMe password 196 Only supported type currently is "password". 208 setting attributes when a system or admin password is set [all …]
|
D | sysfs-ibft | 15 contain the CHAP name (and password), the reverse CHAP 16 name (and password)
|
/linux-6.6.21/arch/powerpc/platforms/pseries/ ! |
D | plpks.c | 48 u8 password[]; member 132 u8 *password, consumer = PLPKS_OS_OWNER; in plpks_gen_password() local 142 password = kzalloc(roundup_pow_of_two(maxpwsize), GFP_KERNEL); in plpks_gen_password() 143 if (!password) in plpks_gen_password() 147 virt_to_phys(password), maxpwsize); in plpks_gen_password() 153 kfree(password); in plpks_gen_password() 156 memcpy(ospassword, password, ospasswordlength); in plpks_gen_password() 166 kfree(password); in plpks_gen_password() 180 auth = kzalloc(roundup_pow_of_two(struct_size(auth, password, maxpwsize)), GFP_KERNEL); in construct_auth() 190 memcpy(auth->password, ospassword, ospasswordlength); in construct_auth() [all …]
|
/linux-6.6.21/fs/ecryptfs/ ! |
D | debug.c | 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
D | keystore.c | 761 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 762 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet() 816 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 824 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1032 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1040 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1105 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1464 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 1468 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet() 1484 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet() [all …]
|
/linux-6.6.21/sound/isa/opti9xx/ ! |
D | opti92x-ad1848.c | 113 unsigned char password; member 198 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init() 204 chip->password = 0xe5; in snd_opti9xx_init() 215 chip->password = 0xe4; in snd_opti9xx_init() 234 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 242 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 258 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 277 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 285 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 301 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() [all …]
|
D | miro.c | 93 unsigned char password; member 800 chip->password = 0xe3; in snd_miro_init() 804 chip->password = 0xe5; in snd_miro_init() 822 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 828 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 852 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write() 858 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
|
/linux-6.6.21/Documentation/scsi/ ! |
D | arcmsr_spec.rst | 229 no password checking is needed and should be implemented in separate 231 Command code 0x20--0x?? always check the password, 232 password must be entered to enable these command:: 290 byte 3 password length (should be 0x0f) 301 byte 3 password length (should be 0x08) 312 byte 3 password length (should be 0x08) 327 Verify password 332 byte 3 password length 333 byte 4-0x?? user password to be checked 337 Logout GUI (force password checking on next command) [all …]
|
/linux-6.6.21/fs/smb/client/ ! |
D | fs_context.c | 316 new_ctx->password = NULL; in smb3_fs_context_dup() 328 DUP_CTX_STR(password); in smb3_fs_context_dup() 798 if (new_ctx->password && in smb3_verify_reconfigure_ctx() 799 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx() 860 STEAL_STRING_SENSITIVE(cifs_sb, ctx, password); in smb3_reconfigure() 1246 kfree_sensitive(ctx->password); in smb3_fs_context_parse_param() 1247 ctx->password = NULL; in smb3_fs_context_parse_param() 1251 ctx->password = kstrdup(param->string, GFP_KERNEL); in smb3_fs_context_parse_param() 1252 if (ctx->password == NULL) { in smb3_fs_context_parse_param() 1554 kfree_sensitive(ctx->password); in smb3_fs_context_parse_param() [all …]
|
D | connect.c | 1876 ses->password != NULL && in match_session() 1877 strncmp(ses->password, in match_session() 1878 ctx->password ? ctx->password : "", in match_session() 2188 ctx->password = kstrndup(delim, len, GFP_KERNEL); in cifs_set_cifscreds() 2189 if (!ctx->password) { in cifs_set_cifscreds() 2210 kfree_sensitive(ctx->password); in cifs_set_cifscreds() 2211 ctx->password = NULL; in cifs_set_cifscreds() 2317 if (ctx->password) { in cifs_get_smb_ses() 2318 ses->password = kstrdup(ctx->password, GFP_KERNEL); in cifs_get_smb_ses() 2319 if (!ses->password) in cifs_get_smb_ses() [all …]
|
/linux-6.6.21/drivers/platform/x86/ ! |
D | think-lmi.c | 332 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument 335 password); in tlmi_save_bios_settings() 412 strscpy(setting->password, buf, setting->maxlen); in current_password_store() 414 strip_cr(setting->password); in current_password_store() 477 tlmi_priv.pwd_admin->password); in new_password_store() 481 ret = tlmi_opcode_setting("WmiOpcodePasswordCurrent01", setting->password); in new_password_store() 491 setting->pwd_type, setting->password, new_pwd, in new_password_store() 786 if (!setting->valid || !setting->password[0]) { in certificate_store() 793 new_cert, setting->password); in certificate_store() 1036 if (tlmi_priv.pwd_admin->valid && tlmi_priv.pwd_admin->password[0]) { in current_value_store() [all …]
|
D | think-lmi.h | 56 char password[TLMI_PWD_BUFSIZE]; member
|
/linux-6.6.21/drivers/of/unittest-data/ ! |
D | tests-phandle.dtsi | 9 security-password = "password";
|
/linux-6.6.21/drivers/platform/x86/hp/hp-bioscfg/ ! |
D | passwdobj-attributes.c | 12 GET_INSTANCE_ID(password); 82 ATTRIBUTE_N_PROPERTY_SHOW(is_enabled, password); 136 ATTRIBUTE_N_PROPERTY_SHOW(min_password_length, password); 139 ATTRIBUTE_N_PROPERTY_SHOW(max_password_length, password); 171 ATTRIBUTE_VALUES_PROPERTY_SHOW(encodings, password, SEMICOLON_SEP);
|
/linux-6.6.21/Documentation/admin-guide/cifs/ ! |
D | usage.rst | 210 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword 218 password=<password> 243 password=your_password 245 2) By specifying the password in the PASSWD environment variable (similarly 247 3) By specifying the password in a file by name via PASSWD_FILE 248 4) By specifying the password in a file by file descriptor via PASSWD_FD 250 If no password is provided, mount.cifs will prompt for password entry 281 password 282 The user password. If the mount helper is 283 installed, the user will be prompted for password [all …]
|
/linux-6.6.21/drivers/input/mouse/ ! |
D | elan_i2c_smbus.c | 352 u16 password; in elan_smbus_prepare_fw_update() local 395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
|
D | elan_i2c_i2c.c | 562 u16 password; in elan_i2c_prepare_fw_update() local 618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
/linux-6.6.21/drivers/scsi/qla4xxx/ ! |
D | ql4_glbl.h | 84 char *password, int bidi, uint16_t *chap_index); 85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 168 char *password, uint16_t idx); 267 char *password, uint16_t chap_index);
|
D | ql4_mbx.c | 1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument 1614 strscpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument 1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap() 1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap() 1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument 1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1735 strscpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1759 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument 1778 if (!username || !password) { in qla4xxx_get_chap_index() [all …]
|
/linux-6.6.21/include/linux/ ! |
D | ecryptfs.h | 101 struct ecryptfs_password password; member
|
/linux-6.6.21/tools/testing/selftests/net/ ! |
D | nettest.c | 100 const char *password; member 267 int keylen = strlen(args->password); in tcp_md5sig() 273 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig() 1611 if (args->password && tcp_md5_remote(lsd, args)) { in do_server() 1741 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock() 1822 args->password = args->client_pw; in do_client() 2109 args.password = optarg; in main() 2188 if (args.password && in main() 2195 if (args.md5_prefix_str && !args.password) { in main()
|
/linux-6.6.21/Documentation/hwmon/ ! |
D | ftsteutates.rst | 39 … the `Kontron FTP Server <http://ftp.kontron.com/>`_ (username = "anonymous", no password required)
|
/linux-6.6.21/Documentation/i2c/busses/ ! |
D | i2c-ali15x3.rst | 71 full data sheets on the web site are password protected, however if you 72 contact the ALI office in San Jose they may give you the password.
|
/linux-6.6.21/drivers/target/iscsi/ ! |
D | iscsi_target_auth.c | 383 ret = crypto_shash_update(desc, (char *)&auth->password, in chap_server_compute_hash() 384 strlen(auth->password)); in chap_server_compute_hash()
|