| /linux/Documentation/ABI/testing/ |
| H A D | sysfs-bus-i2c-devices-m24lr | 6 Write-only attribute used to present a password and unlock 9 (SSS) bytes. A valid password must be written to enable write 13 - Hexadecimal string representing a 32-bit (4-byte) password 19 - If the password matches the internal stored value, 21 - If the password does not match the internally stored value, 29 Write-only attribute used to update the password required to 33 - Hexadecimal string representing a new 32-bit password 39 - Overwrites the current password stored in the I2C password 42 password 86 RF access through protection bits and optional password [all …]
|
| H A D | sysfs-class-firmware-attributes | 159 For example a "BIOS Admin" password and "System" Password can be set, 162 - An "Admin" password is used for preventing modification to the BIOS 164 - A "System" password is required to boot a machine. 180 Representing BIOS administrator password 182 Representing a password required to use 185 Representing System Management password. 188 Representing HDD password 191 Representing NVMe password 196 Supported types are "password" or "certificate". 208 setting attributes when a system or admin password is set [all …]
|
| H A D | sysfs-ibft | 15 contain the CHAP name (and password), the reverse CHAP 16 name (and password)
|
| /linux/security/keys/encrypted-keys/ |
| H A D | ecryptfs_format.c | 21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key() 57 strscpy_pad(auth_tok->token.password.signature, key_desc); in ecryptfs_fill_auth_tok() 58 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok() 66 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok() 72 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok() 73 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
|
| /linux/fs/smb/client/ |
| H A D | fs_context.c | 438 new_ctx->password = NULL; in smb3_fs_context_dup() 453 DUP_CTX_STR(password); in smb3_fs_context_dup() 979 if (new_ctx->password && in smb3_verify_reconfigure_ctx() 980 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx() 1038 if (ses->password && in smb3_sync_session_ctx_passwords() 1039 cifs_sb->ctx->password && in smb3_sync_session_ctx_passwords() 1040 strcmp(ses->password, cifs_sb->ctx->password)) { in smb3_sync_session_ctx_passwords() 1041 kfree_sensitive(cifs_sb->ctx->password); in smb3_sync_session_ctx_passwords() 1042 cifs_sb->ctx->password = kstrdup(ses->password, GFP_KERNEL); in smb3_sync_session_ctx_passwords() 1043 if (!cifs_sb->ctx->password) in smb3_sync_session_ctx_passwords() [all …]
|
| H A D | connect.c | 1979 ses->password != NULL) { in match_session() 1988 if (!((strncmp(ses->password, ctx->password ? in match_session() 1989 ctx->password : "", CIFS_MAX_PASSWORD_LEN) == 0 && in match_session() 1992 (strncmp(ses->password, ctx->password2, in match_session() 1994 strncmp(ses->password2, ctx->password ? in match_session() 1995 ctx->password : "", CIFS_MAX_PASSWORD_LEN) == 0))) in match_session() 2003 if (strncmp(ses->password, ctx->password ? in match_session() 2004 ctx->password : "", CIFS_MAX_PASSWORD_LEN)) in match_session() 2278 ctx->password = kstrndup(delim, len, GFP_KERNEL); in cifs_set_cifscreds() 2279 if (!ctx->password) { in cifs_set_cifscreds() [all …]
|
| /linux/tools/testing/selftests/net/tcp_ao/lib/ |
| H A D | kconfig.c | 48 const char *password = DEFAULT_TEST_PASSWORD; in has_tcp_ao() local 59 tmp.keylen = strlen(password); in has_tcp_ao() 60 memcpy(tmp.key, password, strlen(password)); in has_tcp_ao()
|
| /linux/arch/powerpc/platforms/pseries/ |
| H A D | plpks.c | 77 u8 password[]; member 161 u8 *password, consumer = PLPKS_OS_OWNER; in plpks_gen_password() local 171 password = kzalloc(roundup_pow_of_two(maxpwsize), GFP_KERNEL); in plpks_gen_password() 172 if (!password) in plpks_gen_password() 176 virt_to_phys(password), maxpwsize); in plpks_gen_password() 182 kfree_sensitive(password); in plpks_gen_password() 185 memcpy(ospassword, password, ospasswordlength); in plpks_gen_password() 195 kfree_sensitive(password); in plpks_gen_password() 209 auth = kzalloc(roundup_pow_of_two(struct_size(auth, password, maxpwsize)), GFP_KERNEL); in construct_auth() 219 memcpy(auth->password, ospassword, ospasswordlength); in construct_auth() [all …]
|
| /linux/fs/ecryptfs/ |
| H A D | debug.c | 29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok() 32 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok() 36 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
|
| H A D | keystore.c | 741 md5(s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 742 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet() 778 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 786 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet() 992 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1000 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet() 1065 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig() 1427 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet() 1431 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet() 1447 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet() [all …]
|
| /linux/drivers/platform/x86/lenovo/ |
| H A D | think-lmi.c | 365 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument 368 password); in tlmi_save_bios_settings() 446 strscpy(setting->password, buf, setting->maxlen); in current_password_store() 448 strreplace(setting->password, '\n', '\0'); in current_password_store() 512 if (tlmi_priv.pwd_admin->pwd_enabled && strlen(tlmi_priv.pwd_admin->password)) { in new_password_store() 514 tlmi_priv.pwd_admin->password); in new_password_store() 518 ret = tlmi_opcode_setting("WmiOpcodePasswordCurrent01", setting->password); in new_password_store() 528 setting->pwd_type, setting->password, new_pwd, in new_password_store() 889 (!setting->pwd_enabled || !setting->password[0])) { in certificate_store() 897 setting->password, in certificate_store() [all …]
|
| /linux/sound/isa/opti9xx/ |
| H A D | opti92x-ad1848.c | 114 unsigned char password; member 199 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init() 205 chip->password = 0xe5; in snd_opti9xx_init() 216 chip->password = 0xe4; in snd_opti9xx_init() 234 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 242 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 258 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read() 274 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 282 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() 298 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write() [all …]
|
| H A D | miro.c | 93 unsigned char password; member 807 chip->password = 0xe3; in snd_miro_init() 811 chip->password = 0xe5; in snd_miro_init() 828 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 834 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read() 855 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write() 861 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
|
| /linux/Documentation/scsi/ |
| H A D | arcmsr_spec.rst | 229 no password checking is needed and should be implemented in separate 231 Command code 0x20--0x?? always check the password, 232 password must be entered to enable these command:: 290 byte 3 password length (should be 0x0f) 301 byte 3 password length (should be 0x08) 312 byte 3 password length (should be 0x08) 327 Verify password 332 byte 3 password length 333 byte 4-0x?? user password to be checked 337 Logout GUI (force password checking on next command) [all …]
|
| /linux/drivers/platform/x86/hp/hp-bioscfg/ |
| H A D | passwdobj-attributes.c | 11 GET_INSTANCE_ID(password); 81 ATTRIBUTE_N_PROPERTY_SHOW(is_enabled, password); 131 ATTRIBUTE_N_PROPERTY_SHOW(min_password_length, password); 134 ATTRIBUTE_N_PROPERTY_SHOW(max_password_length, password); 166 ATTRIBUTE_VALUES_PROPERTY_SHOW(encodings, password, SEMICOLON_SEP);
|
| /linux/drivers/of/unittest-data/ |
| H A D | tests-phandle.dtsi | 9 security-password = "password";
|
| /linux/drivers/input/mouse/ |
| H A D | elan_i2c_smbus.c | 352 u16 password; in elan_smbus_prepare_fw_update() local 395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update() 396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update() 397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
|
| H A D | elan_i2c_i2c.c | 562 u16 password; in elan_i2c_prepare_fw_update() local 618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update() 619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update() 620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
|
| /linux/Documentation/admin-guide/cifs/ |
| H A D | usage.rst | 210 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword 218 password=<password> 243 password=your_password 245 2) By specifying the password in the PASSWD environment variable (similarly 247 3) By specifying the password in a file by name via PASSWD_FILE 248 4) By specifying the password in a file by file descriptor via PASSWD_FD 250 If no password is provided, mount.cifs will prompt for password entry 283 password 284 The user password. If the mount helper is 285 installed, the user will be prompted for password [all …]
|
| /linux/drivers/scsi/qla4xxx/ |
| H A D | ql4_glbl.h | 84 char *password, int bidi, uint16_t *chap_index); 85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, 168 char *password, uint16_t idx); 267 char *password, uint16_t chap_index);
|
| H A D | ql4_mbx.c | 1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument 1614 strscpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap() 1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument 1657 secret_len = strscpy(chap_table->secret, password, in qla4xxx_set_chap() 1699 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument 1711 if (!username || !password) { in qla4xxx_get_uni_chap_at_index() 1742 strscpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index() 1766 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument 1785 if (!username || !password) { in qla4xxx_get_chap_index() 1806 if (!strncmp(chap_table->secret, password, in qla4xxx_get_chap_index() [all …]
|
| /linux/tools/testing/selftests/net/ |
| H A D | nettest.c | 100 const char *password; member 267 int keylen = strlen(args->password); in tcp_md5sig() 273 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig() 1611 if (args->password && tcp_md5_remote(lsd, args)) { in do_server() 1741 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock() 1822 args->password = args->client_pw; in do_client() 2110 args.password = optarg; in main() 2189 if (args.password && in main() 2196 if (args.md5_prefix_str && !args.password) { in main()
|
| /linux/net/ethtool/ |
| H A D | module_fw.h | 25 __be32 password; member
|
| /linux/tools/testing/selftests/net/tcp_ao/ |
| H A D | key-management.c | 409 char password[TCP_AO_MAXKEYLEN]; member 466 randomize_buffer(key->password, key->len); in init_key_in_collection() 616 if (test_add_key_cr(sk, key->password, key->len, in key_collection_socket() 771 memcmp(dump_key->key, key->password, key->len)) { in verify_keys() 982 err = test_add_key_cr(sk, key->password, key->len, wrong_addr, in try_unmatched_keys() 994 err = test_add_key_cr(sk, key->password, key->len, this_ip_dest, in try_unmatched_keys()
|
| /linux/include/linux/ |
| H A D | ecryptfs.h | 101 struct ecryptfs_password password; member
|