• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/

Lines Matching refs:password

63 	char *password;
871 vol->password = NULL;
875 since that would mean the password really
879 vol->password = NULL;
884 /* removed password length check, NTLM passwords
887 /* if comma in password, the string will be
888 prematurely null terminated. Commas in password are
894 /* NB: password legally can have multiple commas and
895 the only illegal character in a password is null */
926 vol->password = kzalloc(temp_len, GFP_KERNEL);
927 if (vol->password == NULL) {
929 "for password\n");
933 vol->password[j] = value[i];
940 vol->password[j] = 0;
942 vol->password = kzalloc(temp_len+1, GFP_KERNEL);
943 if (vol->password == NULL) {
945 "for password\n");
948 strcpy(vol->password, value);
1653 /* anything else takes username/password */
1658 ses->password != NULL &&
1659 strncmp(ses->password,
1660 vol->password ? vol->password : "",
1756 /* volume_info->password freed at unmount */
1757 if (volume_info->password) {
1758 ses->password = kstrdup(volume_info->password, GFP_KERNEL);
1759 if (!ses->password)
1865 if (volume_info->password) {
1866 tcon->password = kstrdup(volume_info->password, GFP_KERNEL);
1867 if (!tcon->password) {
2503 kzfree(volume_info->password);
2765 /* volume_info->password is freed above when existing session found
2767 the password ptr is put in the new session structure (in which case the
2768 password will be freed at unmount time) */
2770 /* zero out password before freeing */
2812 *bcc_ptr = 0; /* password is null byte */
2813 bcc_ptr++; /* skip password */
2820 calc_lanman_hash(tcon->password, ses->server->cryptKey,
2826 SMBNTencrypt(tcon->password, ses->server->cryptKey,
2832 *bcc_ptr = 0; /* null byte password */