/kernel/linux/linux-5.10/security/keys/encrypted-keys/ |
H A D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 62 * Removed auth_tok->token.password.salt and in ecryptfs_fill_auth_tok() 63 * auth_tok->token.password.session_key_encryption_key in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
/kernel/linux/linux-6.6/security/keys/encrypted-keys/ |
H A D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strncpy((char *)auth_tok->token.password.signature, key_desc, in ecryptfs_fill_auth_tok() 59 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 62 * Removed auth_tok->token.password.salt and in ecryptfs_fill_auth_tok() 63 * auth_tok->token.password.session_key_encryption_key in ecryptfs_fill_auth_tok() 67 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 74 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
/kernel/linux/linux-6.6/arch/powerpc/platforms/pseries/ |
H A D | plpks.c | 48 u8 password[]; member 132 u8 *password, consumer = PLPKS_OS_OWNER; in plpks_gen_password() local 135 // If we booted from kexec, we could be reusing an existing password already in plpks_gen_password() 141 // The password must not cross a page boundary, so we align to the next power of 2 in plpks_gen_password() 142 password = kzalloc(roundup_pow_of_two(maxpwsize), GFP_KERNEL); in plpks_gen_password() 143 if (!password) in plpks_gen_password() 147 virt_to_phys(password), maxpwsize); in plpks_gen_password() 153 kfree(password); in plpks_gen_password() 156 memcpy(ospassword, password, ospasswordlength); in plpks_gen_password() 166 kfree(password); in plpks_gen_password() 662 const u8 *password; plpks_early_init_devtree() local [all...] |
/kernel/linux/linux-5.10/fs/ecryptfs/ |
H A D | debug.c | 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
H A D | keystore.c | 738 "password tokens\n", __func__); in ecryptfs_write_tag_70_packet() 760 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 761 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet() 815 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 819 "rc = [%d]. s->auth_tok->token.password.session_key_" in ecryptfs_write_tag_70_packet() 823 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1026 "password tokens\n", __func__); in ecryptfs_parse_tag_70_packet() 1031 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1035 "rc = [%d]. s->auth_tok->token.password.session_key_" in ecryptfs_parse_tag_70_packet() 1039 s->auth_tok->token.password in ecryptfs_parse_tag_70_packet() [all...] |
/kernel/linux/linux-6.6/fs/ecryptfs/ |
H A D | debug.c | 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 33 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 37 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
H A D | keystore.c | 739 "password tokens\n", __func__); in ecryptfs_write_tag_70_packet() 761 (u8 *)s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 762 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet() 816 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 820 "rc = [%d]. s->auth_tok->token.password.session_key_" in ecryptfs_write_tag_70_packet() 824 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 1027 "password tokens\n", __func__); in ecryptfs_parse_tag_70_packet() 1032 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1036 "rc = [%d]. s->auth_tok->token.password.session_key_" in ecryptfs_parse_tag_70_packet() 1040 s->auth_tok->token.password in ecryptfs_parse_tag_70_packet() [all...] |
/kernel/linux/linux-6.6/fs/smb/client/ |
H A D | fs_context.c | 163 fsparam_string("password", Opt_pass), 316 new_ctx->password = NULL; in smb3_fs_context_dup() 328 DUP_CTX_STR(password); in smb3_fs_context_dup() 798 if (new_ctx->password && in smb3_verify_reconfigure_ctx() 799 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx() 802 "can not change password of active session during remount\n"); in smb3_verify_reconfigure_ctx() 806 "can not change password for Kerberos via remount\n"); in smb3_verify_reconfigure_ctx() 864 * We can not change UNC/username/password/domainnam in smb3_reconfigure() [all...] |
/kernel/linux/linux-5.10/sound/isa/opti9xx/ |
H A D | opti92x-ad1848.c | 119 unsigned char password; member 204 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init() 210 chip->password = 0xe5; in snd_opti9xx_init() 221 chip->password = 0xe4; in snd_opti9xx_init() 240 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 248 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 264 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 283 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 291 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 307 outb(chip->password, chi in snd_opti9xx_write() [all...] |
H A D | miro.c | 96 unsigned char password; member 795 chip->password = 0xe3; in snd_miro_init() 799 chip->password = 0xe5; in snd_miro_init() 817 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 823 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 847 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write() 853 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
|
/kernel/linux/linux-6.6/sound/isa/opti9xx/ |
H A D | opti92x-ad1848.c | 113 unsigned char password; member 198 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init() 204 chip->password = 0xe5; in snd_opti9xx_init() 215 chip->password = 0xe4; in snd_opti9xx_init() 234 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 242 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 258 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 277 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 285 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 301 outb(chip->password, chi in snd_opti9xx_write() [all...] |
/kernel/linux/linux-6.6/drivers/platform/x86/ |
H A D | think-lmi.c | 71 * Description: Change a specific password. 76 * - A password cannot be set using this method when one does not already 141 * Description: Switch from certificate to password authentication. 287 /* Get password settings from BIOS */ 332 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument 335 password); in tlmi_save_bios_settings() 408 /* pwdlen == 0 is allowed to clear the password */ in current_password_store() 412 strscpy(setting->password, buf, setting->maxlen); in current_password_store() 413 /* Strip out CR if one is present, setting password won't work if it is present */ in current_password_store() 414 strip_cr(setting->password); in current_password_store() [all...] |
H A D | think-lmi.h | 30 /* password configuration details */ 52 /* password setting details */ 56 char password[TLMI_PWD_BUFSIZE]; member
|
/kernel/linux/linux-6.6/drivers/platform/x86/hp/hp-bioscfg/ |
H A D | passwdobj-attributes.c | 3 * Functions corresponding to password object type attributes under 12 GET_INSTANCE_ID(password); variable 82 ATTRIBUTE_N_PROPERTY_SHOW(is_enabled, password); 136 ATTRIBUTE_N_PROPERTY_SHOW(min_password_length, password); 139 ATTRIBUTE_N_PROPERTY_SHOW(max_password_length, password); 171 ATTRIBUTE_VALUES_PROPERTY_SHOW(encodings, password, SEMICOLON_SEP); 390 * Populate all properties for an instance under password attribute 392 * @password_obj: ACPI object with password data 499 * Populate all properties for an instance under password object attribute
|
/kernel/linux/linux-5.10/fs/cifs/ |
H A D | cifsencrypt.c | 281 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response() 289 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response() 305 int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, in calc_lanman_hash() argument 312 if (password) { in calc_lanman_hash() 314 if (!password[len]) in calc_lanman_hash() 317 memcpy(password_with_pad, password, len); in calc_lanman_hash() 511 /* calculate md4 hash of password */ in calc_ntlmv2_hash() 512 E_md4hash(ses->password, nt_hash, nls_cp); in calc_ntlmv2_hash()
|
H A D | connect.c | 237 { Opt_blank_pass, "password=" }, 239 { Opt_pass, "password=%s" }, 1977 * Check if this is a case where the password in cifs_parse_mount_options() 1983 /* No it is not. Set the password to NULL */ in cifs_parse_mount_options() 1984 kfree_sensitive(vol->password); in cifs_parse_mount_options() 1985 vol->password = NULL; in cifs_parse_mount_options() 2022 kfree_sensitive(vol->password); in cifs_parse_mount_options() 2023 /* Now build new password string */ in cifs_parse_mount_options() 2025 vol->password = kzalloc(temp_len+1, GFP_KERNEL); in cifs_parse_mount_options() 2026 if (vol->password in cifs_parse_mount_options() [all...] |
/kernel/linux/linux-5.10/drivers/input/mouse/ |
H A D | elan_i2c_smbus.c | 352 u16 password; in elan_smbus_prepare_fw_update() local 366 /* write iap password */ in elan_smbus_prepare_fw_update() 369 dev_err(dev, "cannot write iap password\n"); in elan_smbus_prepare_fw_update() 376 dev_err(dev, "failed to write iap password: %d\n", in elan_smbus_prepare_fw_update() 382 * Read back password to make sure we enabled flash in elan_smbus_prepare_fw_update() 390 dev_err(dev, "failed to read iap password: %d\n", in elan_smbus_prepare_fw_update() 395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update() [all...] |
H A D | elan_i2c_i2c.c | 562 u16 password; in elan_i2c_prepare_fw_update() local 613 dev_err(dev, "cannot read iap password: %d\n", in elan_i2c_prepare_fw_update() 618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
/kernel/linux/linux-5.10/drivers/scsi/qla4xxx/ |
H A D | ql4_glbl.h | 84 char *password, int bidi, uint16_t *chap_index); 85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 169 char *password, uint16_t idx); 268 char *password, uint16_t chap_index);
|
H A D | ql4_mbx.c | 1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument 1614 strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1627 * @password: CHAP password to set 1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument 1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap() 1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap() 1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() 1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1735 strlcpy(password, chap_tabl in qla4xxx_get_uni_chap_at_index() 1691 qla4xxx_get_uni_chap_at_index(struct scsi_qla_host *ha, char *username, char *password, uint16_t chap_index) qla4xxx_get_uni_chap_at_index() argument 1758 qla4xxx_get_chap_index(struct scsi_qla_host *ha, char *username, char *password, int bidi, uint16_t *chap_index) qla4xxx_get_chap_index() argument [all...] |
/kernel/linux/linux-6.6/drivers/scsi/qla4xxx/ |
H A D | ql4_glbl.h | 84 char *password, int bidi, uint16_t *chap_index); 85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 168 char *password, uint16_t idx); 267 char *password, uint16_t chap_index);
|
H A D | ql4_mbx.c | 1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument 1614 strscpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1627 * @password: CHAP password to set 1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument 1655 chap_table->secret_len = strlen(password); in qla4xxx_set_chap() 1656 strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); in qla4xxx_set_chap() 1692 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() 1704 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1735 strscpy(password, chap_tabl in qla4xxx_get_uni_chap_at_index() 1691 qla4xxx_get_uni_chap_at_index(struct scsi_qla_host *ha, char *username, char *password, uint16_t chap_index) qla4xxx_get_uni_chap_at_index() argument 1758 qla4xxx_get_chap_index(struct scsi_qla_host *ha, char *username, char *password, int bidi, uint16_t *chap_index) qla4xxx_get_chap_index() argument [all...] |
/kernel/linux/linux-6.6/drivers/input/mouse/ |
H A D | elan_i2c_smbus.c | 352 u16 password; in elan_smbus_prepare_fw_update() local 366 /* write iap password */ in elan_smbus_prepare_fw_update() 369 dev_err(dev, "cannot write iap password\n"); in elan_smbus_prepare_fw_update() 376 dev_err(dev, "failed to write iap password: %d\n", in elan_smbus_prepare_fw_update() 382 * Read back password to make sure we enabled flash in elan_smbus_prepare_fw_update() 390 dev_err(dev, "failed to read iap password: %d\n", in elan_smbus_prepare_fw_update() 395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update() [all...] |
H A D | elan_i2c_i2c.c | 562 u16 password; in elan_i2c_prepare_fw_update() local 613 dev_err(dev, "cannot read iap password: %d\n", in elan_i2c_prepare_fw_update() 618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
H A D | nettest.c | 78 const char *password; member 79 /* prefix for MD5 password */ 212 int keylen = strlen(args->password); in tcp_md5sig() 218 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig() 238 /* ENOENT is harmless. Returned when a password is cleared */ in tcp_md5sig() 1215 if (args->password && tcp_md5_remote(lsd, args)) { in do_server() 1336 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock() 1599 " -M password use MD5 sum protection\n" in print_usage() 1692 args.password = optarg; in main() 1761 if (args.password in main() [all...] |