• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/fs/cifs/

Lines Matching defs:password

61 	char *password;
843 vol->password = NULL;
847 since that would mean the password really
851 vol->password = NULL;
856 /* removed password length check, NTLM passwords
859 /* if comma in password, the string will be
860 prematurely null terminated. Commas in password are
866 /* NB: password legally can have multiple commas and
867 the only illegal character in a password is null */
898 vol->password = kzalloc(temp_len, GFP_KERNEL);
899 if(vol->password == NULL) {
904 vol->password[j] = value[i];
911 vol->password[j] = 0;
913 vol->password = kzalloc(temp_len+1, GFP_KERNEL);
914 if(vol->password == NULL) {
918 strcpy(vol->password, value);
1718 kfree(volume_info.password);
1734 kfree(volume_info.password);
1755 kfree(volume_info.password);
1768 kfree(volume_info.password);
1776 kfree(volume_info.password);
1791 kfree(volume_info.password);
1809 kfree(volume_info.password);
1838 kfree(volume_info.password);
1849 kfree(volume_info.password);
1875 kfree(volume_info.password);
1891 kfree(volume_info.password);
1905 /* volume_info.password freed at unmount */
1906 if (volume_info.password)
1907 pSesInfo->password = volume_info.password;
1927 kfree(volume_info.password);
2127 /* volume_info.password is freed above when existing session found
2129 the password ptr is put in the new session structure (in which case the
2130 password will be freed at unmount time) */
3198 *bcc_ptr = 0; /* password is null byte */
3199 bcc_ptr++; /* skip password */
3209 SMBNTencrypt(ses->password,
3216 *bcc_ptr = 0; /* null byte password */
3440 SMBNTencrypt(pSesInfo->password,
3448 pSesInfo->password);
3460 SMBNTencrypt(pSesInfo->password,
3467 ntlm_session_key, pSesInfo->password);