Home
last modified time | relevance | path

Searched refs:password (Results 1 – 25 of 71) sorted by relevance

123

/linux/Documentation/ABI/testing/
H A Dsysfs-bus-i2c-devices-m24lr6 Write-only attribute used to present a password and unlock
9 (SSS) bytes. A valid password must be written to enable write
13 - Hexadecimal string representing a 32-bit (4-byte) password
19 - If the password matches the internal stored value,
21 - If the password does not match the internally stored value,
29 Write-only attribute used to update the password required to
33 - Hexadecimal string representing a new 32-bit password
39 - Overwrites the current password stored in the I2C password
42 password
86 RF access through protection bits and optional password
[all …]
H A Dsysfs-class-firmware-attributes159 For example a "BIOS Admin" password and "System" Password can be set,
162 - An "Admin" password is used for preventing modification to the BIOS
164 - A "System" password is required to boot a machine.
180 Representing BIOS administrator password
182 Representing a password required to use
185 Representing System Management password.
188 Representing HDD password
191 Representing NVMe password
196 Supported types are "password" or "certificate".
208 setting attributes when a system or admin password is set
[all …]
H A Dsysfs-ibft15 contain the CHAP name (and password), the reverse CHAP
16 name (and password)
/linux/security/keys/encrypted-keys/
H A Decryptfs_format.c21 return auth_tok->token.password.session_key_encryption_key; in ecryptfs_get_auth_tok_key()
57 strscpy_pad(auth_tok->token.password.signature, key_desc); in ecryptfs_fill_auth_tok()
58 auth_tok->token.password.session_key_encryption_key_bytes = in ecryptfs_fill_auth_tok()
66 auth_tok->token.password.flags |= in ecryptfs_fill_auth_tok()
72 auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; in ecryptfs_fill_auth_tok()
73 auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); in ecryptfs_fill_auth_tok()
/linux/fs/smb/client/
H A Dfs_context.c438 new_ctx->password = NULL; in smb3_fs_context_dup()
453 DUP_CTX_STR(password); in smb3_fs_context_dup()
979 if (new_ctx->password && in smb3_verify_reconfigure_ctx()
980 (!old_ctx->password || strcmp(new_ctx->password, old_ctx->password))) { in smb3_verify_reconfigure_ctx()
1038 if (ses->password && in smb3_sync_session_ctx_passwords()
1039 cifs_sb->ctx->password && in smb3_sync_session_ctx_passwords()
1040 strcmp(ses->password, cifs_sb->ctx->password)) { in smb3_sync_session_ctx_passwords()
1041 kfree_sensitive(cifs_sb->ctx->password); in smb3_sync_session_ctx_passwords()
1042 cifs_sb->ctx->password = kstrdup(ses->password, GFP_KERNEL); in smb3_sync_session_ctx_passwords()
1043 if (!cifs_sb->ctx->password) in smb3_sync_session_ctx_passwords()
[all …]
H A Dconnect.c1979 ses->password != NULL) { in match_session()
1988 if (!((strncmp(ses->password, ctx->password ? in match_session()
1989 ctx->password : "", CIFS_MAX_PASSWORD_LEN) == 0 && in match_session()
1992 (strncmp(ses->password, ctx->password2, in match_session()
1994 strncmp(ses->password2, ctx->password ? in match_session()
1995 ctx->password : "", CIFS_MAX_PASSWORD_LEN) == 0))) in match_session()
2003 if (strncmp(ses->password, ctx->password ? in match_session()
2004 ctx->password : "", CIFS_MAX_PASSWORD_LEN)) in match_session()
2278 ctx->password = kstrndup(delim, len, GFP_KERNEL); in cifs_set_cifscreds()
2279 if (!ctx->password) { in cifs_set_cifscreds()
[all …]
/linux/tools/testing/selftests/net/tcp_ao/lib/
H A Dkconfig.c48 const char *password = DEFAULT_TEST_PASSWORD; in has_tcp_ao() local
59 tmp.keylen = strlen(password); in has_tcp_ao()
60 memcpy(tmp.key, password, strlen(password)); in has_tcp_ao()
/linux/arch/powerpc/platforms/pseries/
H A Dplpks.c77 u8 password[]; member
161 u8 *password, consumer = PLPKS_OS_OWNER; in plpks_gen_password() local
171 password = kzalloc(roundup_pow_of_two(maxpwsize), GFP_KERNEL); in plpks_gen_password()
172 if (!password) in plpks_gen_password()
176 virt_to_phys(password), maxpwsize); in plpks_gen_password()
182 kfree_sensitive(password); in plpks_gen_password()
185 memcpy(ospassword, password, ospasswordlength); in plpks_gen_password()
195 kfree_sensitive(password); in plpks_gen_password()
209 auth = kzalloc(roundup_pow_of_two(struct_size(auth, password, maxpwsize)), GFP_KERNEL); in construct_auth()
219 memcpy(auth->password, ospassword, ospasswordlength); in construct_auth()
[all …]
/linux/fs/ecryptfs/
H A Ddebug.c29 ecryptfs_to_hex(salt, auth_tok->token.password.salt, in ecryptfs_dump_auth_tok()
32 if (auth_tok->token.password.flags & in ecryptfs_dump_auth_tok()
36 memcpy(sig, auth_tok->token.password.signature, in ecryptfs_dump_auth_tok()
H A Dkeystore.c741 md5(s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
742 s->auth_tok->token.password.session_key_encryption_key_bytes, in ecryptfs_write_tag_70_packet()
778 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
786 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_write_tag_70_packet()
992 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1000 s->auth_tok->token.password.session_key_encryption_key, in ecryptfs_parse_tag_70_packet()
1065 (*sig) = auth_tok->token.password.signature; in ecryptfs_get_auth_tok_sig()
1427 memcpy((*new_auth_tok)->token.password.salt, in parse_tag_3_packet()
1431 (*new_auth_tok)->token.password.hash_iterations = in parse_tag_3_packet()
1447 (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ in parse_tag_3_packet()
[all …]
/linux/drivers/platform/x86/lenovo/
H A Dthink-lmi.c365 static int tlmi_save_bios_settings(const char *password) in tlmi_save_bios_settings() argument
368 password); in tlmi_save_bios_settings()
446 strscpy(setting->password, buf, setting->maxlen); in current_password_store()
448 strreplace(setting->password, '\n', '\0'); in current_password_store()
512 if (tlmi_priv.pwd_admin->pwd_enabled && strlen(tlmi_priv.pwd_admin->password)) { in new_password_store()
514 tlmi_priv.pwd_admin->password); in new_password_store()
518 ret = tlmi_opcode_setting("WmiOpcodePasswordCurrent01", setting->password); in new_password_store()
528 setting->pwd_type, setting->password, new_pwd, in new_password_store()
889 (!setting->pwd_enabled || !setting->password[0])) { in certificate_store()
897 setting->password, in certificate_store()
[all …]
/linux/sound/isa/opti9xx/
H A Dopti92x-ad1848.c114 unsigned char password; member
199 chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; in snd_opti9xx_init()
205 chip->password = 0xe5; in snd_opti9xx_init()
216 chip->password = 0xe4; in snd_opti9xx_init()
234 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
242 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
258 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_read()
274 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
282 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
298 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_opti9xx_write()
[all …]
H A Dmiro.c93 unsigned char password; member
807 chip->password = 0xe3; in snd_miro_init()
811 chip->password = 0xe5; in snd_miro_init()
828 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
834 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_read()
855 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
861 outb(chip->password, chip->mc_base + chip->pwd_reg); in snd_miro_write()
/linux/Documentation/scsi/
H A Darcmsr_spec.rst229 no password checking is needed and should be implemented in separate
231 Command code 0x20--0x?? always check the password,
232 password must be entered to enable these command::
290 byte 3 password length (should be 0x0f)
301 byte 3 password length (should be 0x08)
312 byte 3 password length (should be 0x08)
327 Verify password
332 byte 3 password length
333 byte 4-0x?? user password to be checked
337 Logout GUI (force password checking on next command)
[all …]
/linux/drivers/platform/x86/hp/hp-bioscfg/
H A Dpasswdobj-attributes.c11 GET_INSTANCE_ID(password);
81 ATTRIBUTE_N_PROPERTY_SHOW(is_enabled, password);
131 ATTRIBUTE_N_PROPERTY_SHOW(min_password_length, password);
134 ATTRIBUTE_N_PROPERTY_SHOW(max_password_length, password);
166 ATTRIBUTE_VALUES_PROPERTY_SHOW(encodings, password, SEMICOLON_SEP);
/linux/drivers/of/unittest-data/
H A Dtests-phandle.dtsi9 security-password = "password";
/linux/drivers/input/mouse/
H A Delan_i2c_smbus.c352 u16 password; in elan_smbus_prepare_fw_update() local
395 password = be16_to_cpup((__be16 *)val); in elan_smbus_prepare_fw_update()
396 if (password != ETP_SMBUS_IAP_PASSWORD) { in elan_smbus_prepare_fw_update()
397 dev_err(dev, "wrong iap password = 0x%X\n", password); in elan_smbus_prepare_fw_update()
H A Delan_i2c_i2c.c562 u16 password; in elan_i2c_prepare_fw_update() local
618 password = le16_to_cpup((__le16 *)val); in elan_i2c_prepare_fw_update()
619 if (password != ETP_I2C_IAP_PASSWORD) { in elan_i2c_prepare_fw_update()
620 dev_err(dev, "wrong iap password: 0x%X\n", password); in elan_i2c_prepare_fw_update()
/linux/Documentation/admin-guide/cifs/
H A Dusage.rst210 mount -t cifs //9.53.216.11/e$ /mnt -o username=myname,password=mypassword
218 password=<password>
243 password=your_password
245 2) By specifying the password in the PASSWD environment variable (similarly
247 3) By specifying the password in a file by name via PASSWD_FILE
248 4) By specifying the password in a file by file descriptor via PASSWD_FD
250 If no password is provided, mount.cifs will prompt for password entry
283 password
284 The user password. If the mount helper is
285 installed, the user will be prompted for password
[all …]
/linux/drivers/scsi/qla4xxx/
H A Dql4_glbl.h84 char *password, int bidi, uint16_t *chap_index);
85 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
168 char *password, uint16_t idx);
267 char *password, uint16_t chap_index);
H A Dql4_mbx.c1573 int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_get_chap() argument
1614 strscpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); in qla4xxx_get_chap()
1635 int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, in qla4xxx_set_chap() argument
1657 secret_len = strscpy(chap_table->secret, password, in qla4xxx_set_chap()
1699 char *password, uint16_t chap_index) in qla4xxx_get_uni_chap_at_index() argument
1711 if (!username || !password) { in qla4xxx_get_uni_chap_at_index()
1742 strscpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); in qla4xxx_get_uni_chap_at_index()
1766 char *password, int bidi, uint16_t *chap_index) in qla4xxx_get_chap_index() argument
1785 if (!username || !password) { in qla4xxx_get_chap_index()
1806 if (!strncmp(chap_table->secret, password, in qla4xxx_get_chap_index()
[all …]
/linux/tools/testing/selftests/net/
H A Dnettest.c100 const char *password; member
267 int keylen = strlen(args->password); in tcp_md5sig()
273 memcpy(md5sig.tcpm_key, args->password, keylen); in tcp_md5sig()
1611 if (args->password && tcp_md5_remote(lsd, args)) { in do_server()
1741 if (args->password && tcp_md5sig(sd, addr, alen, args)) in connectsock()
1822 args->password = args->client_pw; in do_client()
2110 args.password = optarg; in main()
2189 if (args.password && in main()
2196 if (args.md5_prefix_str && !args.password) { in main()
/linux/net/ethtool/
H A Dmodule_fw.h25 __be32 password; member
/linux/tools/testing/selftests/net/tcp_ao/
H A Dkey-management.c409 char password[TCP_AO_MAXKEYLEN]; member
466 randomize_buffer(key->password, key->len); in init_key_in_collection()
616 if (test_add_key_cr(sk, key->password, key->len, in key_collection_socket()
771 memcmp(dump_key->key, key->password, key->len)) { in verify_keys()
982 err = test_add_key_cr(sk, key->password, key->len, wrong_addr, in try_unmatched_keys()
994 err = test_add_key_cr(sk, key->password, key->len, this_ip_dest, in try_unmatched_keys()
/linux/include/linux/
H A Decryptfs.h101 struct ecryptfs_password password; member

123