Lines Matching refs:password
237 { Opt_blank_pass, "password=" },
239 { Opt_pass, "password=%s" },
1977 * Check if this is a case where the password
1983 /* No it is not. Set the password to NULL */
1984 kfree_sensitive(vol->password);
1985 vol->password = NULL;
2022 kfree_sensitive(vol->password);
2023 /* Now build new password string */
2025 vol->password = kzalloc(temp_len+1, GFP_KERNEL);
2026 if (vol->password == NULL) {
2027 pr_warn("no memory for password\n");
2032 vol->password[j] = value[i];
2038 vol->password[j] = '\0';
2706 /* anything else takes username/password */
2712 ses->password != NULL &&
2713 strncmp(ses->password,
2714 vol->password ? vol->password : "",
2976 cifs_dbg(FYI, "Bad len for password search (len=%zd)\n", len);
2984 vol->password = kstrndup(delim, len, GFP_KERNEL);
2985 if (!vol->password) {
2986 cifs_dbg(FYI, "Unable to allocate %zd bytes for password\n",
3008 kfree_sensitive(vol->password);
3009 vol->password = NULL;
3103 /* volume_info->password freed at unmount */
3104 if (volume_info->password) {
3105 ses->password = kstrdup(volume_info->password, GFP_KERNEL);
3106 if (!ses->password)
3302 if (volume_info->password) {
3303 tcon->password = kstrdup(volume_info->password, GFP_KERNEL);
3304 if (!tcon->password) {
4044 kfree_sensitive(volume_info->password);
4868 *bcc_ptr = 0; /* password is null byte */
4869 bcc_ptr++; /* skip password */
4878 NTLMv2 password here) */
4882 calc_lanman_hash(tcon->password, ses->server->cryptkey,
4888 rc = SMBNTencrypt(tcon->password, ses->server->cryptkey,
4900 *bcc_ptr = 0; /* null byte password */
5160 kfree_sensitive(vol_info->password);