password          278 drivers/firewire/sbp2.c 		struct sbp2_pointer password;
password          516 drivers/input/mouse/elan_i2c_i2c.c 	u16 password;
password          566 drivers/input/mouse/elan_i2c_i2c.c 	password = le16_to_cpup((__le16 *)val);
password          567 drivers/input/mouse/elan_i2c_i2c.c 	if (password != ETP_I2C_IAP_PASSWORD) {
password          568 drivers/input/mouse/elan_i2c_i2c.c 		dev_err(dev, "wrong iap password: 0x%X\n", password);
password          351 drivers/input/mouse/elan_i2c_smbus.c 	u16 password;
password          394 drivers/input/mouse/elan_i2c_smbus.c 		password = be16_to_cpup((__be16 *)val);
password          395 drivers/input/mouse/elan_i2c_smbus.c 		if (password != ETP_SMBUS_IAP_PASSWORD) {
password          396 drivers/input/mouse/elan_i2c_smbus.c 			dev_err(dev, "wrong iap password = 0x%X\n", password);
password         1217 drivers/net/ethernet/via/via-velocity.h 	u8 password[6];
password         2857 drivers/scsi/libiscsi.c 	kfree(session->password);
password         3275 drivers/scsi/libiscsi.c 		return iscsi_switch_str_param(&session->password, buf);
password         3381 drivers/scsi/libiscsi.c 		len = sprintf(buf, "%s\n", session->password);
password           85 drivers/scsi/qla4xxx/ql4_glbl.h 			   char *password, int bidi, uint16_t *chap_index);
password           86 drivers/scsi/qla4xxx/ql4_glbl.h int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
password          170 drivers/scsi/qla4xxx/ql4_glbl.h 		     char *password, uint16_t idx);
password          269 drivers/scsi/qla4xxx/ql4_glbl.h 				  char *password, uint16_t chap_index);
password         1575 drivers/scsi/qla4xxx/ql4_mbx.c int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password,
password         1616 drivers/scsi/qla4xxx/ql4_mbx.c 	strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN);
password         1637 drivers/scsi/qla4xxx/ql4_mbx.c int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password,
password         1657 drivers/scsi/qla4xxx/ql4_mbx.c 	chap_table->secret_len = strlen(password);
password         1658 drivers/scsi/qla4xxx/ql4_mbx.c 	strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1);
password         1694 drivers/scsi/qla4xxx/ql4_mbx.c 				  char *password, uint16_t chap_index)
password         1706 drivers/scsi/qla4xxx/ql4_mbx.c 	if (!username || !password) {
password         1737 drivers/scsi/qla4xxx/ql4_mbx.c 	strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN);
password         1761 drivers/scsi/qla4xxx/ql4_mbx.c 			   char *password, int bidi, uint16_t *chap_index)
password         1780 drivers/scsi/qla4xxx/ql4_mbx.c 	if (!username || !password) {
password         1801 drivers/scsi/qla4xxx/ql4_mbx.c 		if (!strncmp(chap_table->secret, password,
password         1815 drivers/scsi/qla4xxx/ql4_mbx.c 		rval = qla4xxx_set_chap(ha, username, password,
password         2073 drivers/scsi/qla4xxx/ql4_mbx.c 	if (sess->username != NULL && sess->password != NULL) {
password         2074 drivers/scsi/qla4xxx/ql4_mbx.c 		if (strlen(sess->username) && strlen(sess->password)) {
password         2078 drivers/scsi/qla4xxx/ql4_mbx.c 						sess->password,
password          772 drivers/scsi/qla4xxx/ql4_os.c 		strlcpy(chap_rec->password, chap_table->secret,
password          957 drivers/scsi/qla4xxx/ql4_os.c 			size = min_t(size_t, sizeof(chap_rec.password),
password          959 drivers/scsi/qla4xxx/ql4_os.c 			memcpy(chap_rec.password, param_info->value, size);
password         1016 drivers/scsi/qla4xxx/ql4_os.c 	rc = qla4xxx_set_chap(ha, chap_rec.username, chap_rec.password,
password         2848 drivers/scsi/qla4xxx/ql4_os.c 						      sess->password,
password         2864 drivers/scsi/qla4xxx/ql4_os.c 		    !sess->username && !sess->password) {
password         6005 drivers/scsi/qla4xxx/ql4_os.c 			    char *password)
password         6036 drivers/scsi/qla4xxx/ql4_os.c 		strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN);
password          873 drivers/scsi/scsi_transport_iscsi.c iscsi_flashnode_sess_attr(fnode, password, ISCSI_FLASHNODE_PASSWORD);
password         3987 drivers/scsi/scsi_transport_iscsi.c iscsi_session_attr(password, ISCSI_PARAM_PASSWORD, 1);
password          260 drivers/target/iscsi/iscsi_target_auth.c 	ret = crypto_shash_update(desc, (char *)&auth->password,
password          261 drivers/target/iscsi/iscsi_target_auth.c 				  strlen(auth->password));
password          398 drivers/target/iscsi/iscsi_target_configfs.c DEF_NACL_AUTH_STR(password, NAF_PASSWORD_SET);
password          857 drivers/target/iscsi/iscsi_target_configfs.c DEF_TPG_AUTH_STR(password, NAF_PASSWORD_SET);
password         1242 drivers/target/iscsi/iscsi_target_configfs.c DEF_DISC_AUTH_STR(password, NAF_PASSWORD_SET);
password          281 fs/cifs/cifsencrypt.c 	rc = SMBNTencrypt(ses->password, ses->server->cryptkey,
password          289 fs/cifs/cifsencrypt.c 	rc = E_md4hash(ses->password, temp_key, nls_cp);
password          305 fs/cifs/cifsencrypt.c int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt,
password          312 fs/cifs/cifsencrypt.c 	if (password) {
password          314 fs/cifs/cifsencrypt.c 			if (!password[len])
password          317 fs/cifs/cifsencrypt.c 		memcpy(password_with_pad, password, len);
password          512 fs/cifs/cifsencrypt.c 	E_md4hash(ses->password, nt_hash, nls_cp);
password          531 fs/cifs/cifsglob.h 	char *password;
password          979 fs/cifs/cifsglob.h 	char *password;
password         1040 fs/cifs/cifsglob.h 	char *password;		/* for share-level security */
password          487 fs/cifs/cifsproto.h extern int calc_lanman_hash(const char *password, const char *cryptkey,
password         2204 fs/cifs/connect.c 				kzfree(vol->password);
password         2205 fs/cifs/connect.c 				vol->password = NULL;
password         2242 fs/cifs/connect.c 			kzfree(vol->password);
password         2245 fs/cifs/connect.c 			vol->password = kzalloc(temp_len+1, GFP_KERNEL);
password         2246 fs/cifs/connect.c 			if (vol->password == NULL) {
password         2252 fs/cifs/connect.c 				vol->password[j] = value[i];
password         2258 fs/cifs/connect.c 			vol->password[j] = '\0';
password         2918 fs/cifs/connect.c 		    ses->password != NULL &&
password         2919 fs/cifs/connect.c 		    strncmp(ses->password,
password         2920 fs/cifs/connect.c 			    vol->password ? vol->password : "",
password         3179 fs/cifs/connect.c 	vol->password = kstrndup(delim, len, GFP_KERNEL);
password         3180 fs/cifs/connect.c 	if (!vol->password) {
password         3203 fs/cifs/connect.c 			kzfree(vol->password);
password         3204 fs/cifs/connect.c 			vol->password = NULL;
password         3297 fs/cifs/connect.c 	if (volume_info->password) {
password         3298 fs/cifs/connect.c 		ses->password = kstrdup(volume_info->password, GFP_KERNEL);
password         3299 fs/cifs/connect.c 		if (!ses->password)
password         3482 fs/cifs/connect.c 	if (volume_info->password) {
password         3483 fs/cifs/connect.c 		tcon->password = kstrdup(volume_info->password, GFP_KERNEL);
password         3484 fs/cifs/connect.c 		if (!tcon->password) {
password         4208 fs/cifs/connect.c 	kzfree(volume_info->password);
password         5046 fs/cifs/connect.c 			calc_lanman_hash(tcon->password, ses->server->cryptkey,
password         5052 fs/cifs/connect.c 		rc = SMBNTencrypt(tcon->password, ses->server->cryptkey,
password         5321 fs/cifs/connect.c 	kzfree(vol_info->password);
password         1092 fs/cifs/dfs_cache.c 	if (vol->password) {
password         1093 fs/cifs/dfs_cache.c 		new->password = kstrndup(vol->password, strlen(vol->password),
password         1095 fs/cifs/dfs_cache.c 		if (!new->password)
password         1133 fs/cifs/dfs_cache.c 	kzfree(new->password);
password          102 fs/cifs/misc.c 	kzfree(buf_to_free->password);
password          147 fs/cifs/misc.c 	kzfree(buf_to_free->password);
password          724 fs/cifs/sess.c 		rc = calc_lanman_hash(ses->password, ses->server->cryptkey,
password           29 fs/ecryptfs/debug.c 		ecryptfs_to_hex(salt, auth_tok->token.password.salt,
password           33 fs/ecryptfs/debug.c 		if (auth_tok->token.password.flags &
password           37 fs/ecryptfs/debug.c 		memcpy(sig, auth_tok->token.password.signature,
password          760 fs/ecryptfs/keystore.c 				 (u8 *)s->auth_tok->token.password.session_key_encryption_key,
password          761 fs/ecryptfs/keystore.c 				 s->auth_tok->token.password.session_key_encryption_key_bytes,
password          815 fs/ecryptfs/keystore.c 		s->auth_tok->token.password.session_key_encryption_key,
password          823 fs/ecryptfs/keystore.c 		       s->auth_tok->token.password.session_key_encryption_key,
password         1031 fs/ecryptfs/keystore.c 		s->auth_tok->token.password.session_key_encryption_key,
password         1039 fs/ecryptfs/keystore.c 		       s->auth_tok->token.password.session_key_encryption_key,
password         1104 fs/ecryptfs/keystore.c 		(*sig) = auth_tok->token.password.signature;
password         1463 fs/ecryptfs/keystore.c 		memcpy((*new_auth_tok)->token.password.salt,
password         1467 fs/ecryptfs/keystore.c 		(*new_auth_tok)->token.password.hash_iterations =
password         1483 fs/ecryptfs/keystore.c 		(*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */
password         1658 fs/ecryptfs/keystore.c 			auth_tok->token.password.session_key_encryption_key_bytes);
password         1660 fs/ecryptfs/keystore.c 			auth_tok->token.password.session_key_encryption_key,
password         1661 fs/ecryptfs/keystore.c 			auth_tok->token.password.session_key_encryption_key_bytes);
password         1707 fs/ecryptfs/keystore.c 		tfm, auth_tok->token.password.session_key_encryption_key,
password         1818 fs/ecryptfs/keystore.c 			ecryptfs_to_hex(new_auth_tok->token.password.signature,
password         1820 fs/ecryptfs/keystore.c 			new_auth_tok->token.password.signature[
password         1906 fs/ecryptfs/keystore.c 		memcpy(&(candidate_auth_tok->token.password),
password         1907 fs/ecryptfs/keystore.c 		       &(matching_auth_tok->token.password),
password         2194 fs/ecryptfs/keystore.c 	ecryptfs_from_hex(key_rec->sig, auth_tok->token.password.signature,
password         2239 fs/ecryptfs/keystore.c 	if (auth_tok->token.password.flags &
password         2243 fs/ecryptfs/keystore.c 				auth_tok->token.password.
password         2246 fs/ecryptfs/keystore.c 		       auth_tok->token.password.session_key_encryption_key,
password         2365 fs/ecryptfs/keystore.c 	memcpy(&dest[(*packet_size)], auth_tok->token.password.salt,
password          101 include/linux/ecryptfs.h 		struct ecryptfs_password password;
password          841 include/scsi/iscsi_if.h 	uint8_t password[ISCSI_CHAP_AUTH_SECRET_MAX_LEN];
password          297 include/scsi/libiscsi.h 	char			*password;
password          363 include/scsi/scsi_transport_iscsi.h 	char			*password;
password          750 include/target/iscsi/iscsi_target_core.h 	char			password[MAX_PASS_LEN];
password           21 security/keys/encrypted-keys/ecryptfs_format.c 	return auth_tok->token.password.session_key_encryption_key;
password           57 security/keys/encrypted-keys/ecryptfs_format.c 	strncpy((char *)auth_tok->token.password.signature, key_desc,
password           59 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->token.password.session_key_encryption_key_bytes =
password           67 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->token.password.flags |=
password           73 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512;
password           74 security/keys/encrypted-keys/ecryptfs_format.c 	auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD);
password           96 sound/isa/opti9xx/miro.c 	unsigned char password;
password          795 sound/isa/opti9xx/miro.c 		chip->password = 0xe3;
password          799 sound/isa/opti9xx/miro.c 		chip->password = 0xe5;
password          817 sound/isa/opti9xx/miro.c 	outb(chip->password, chip->mc_base + chip->pwd_reg);
password          823 sound/isa/opti9xx/miro.c 			outb(chip->password, chip->mc_base + chip->pwd_reg);
password          847 sound/isa/opti9xx/miro.c 	outb(chip->password, chip->mc_base + chip->pwd_reg);
password          853 sound/isa/opti9xx/miro.c 			outb(chip->password, chip->mc_base + chip->pwd_reg);
password          119 sound/isa/opti9xx/opti92x-ad1848.c 	unsigned char password;
password          204 sound/isa/opti9xx/opti92x-ad1848.c 		chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3;
password          210 sound/isa/opti9xx/opti92x-ad1848.c 		chip->password = 0xe5;
password          221 sound/isa/opti9xx/opti92x-ad1848.c 		chip->password = 0xe4;
password          240 sound/isa/opti9xx/opti92x-ad1848.c 	outb(chip->password, chip->mc_base + chip->pwd_reg);
password          248 sound/isa/opti9xx/opti92x-ad1848.c 			outb(chip->password, chip->mc_base + chip->pwd_reg);
password          264 sound/isa/opti9xx/opti92x-ad1848.c 		outb(chip->password, chip->mc_base + chip->pwd_reg);
password          283 sound/isa/opti9xx/opti92x-ad1848.c 	outb(chip->password, chip->mc_base + chip->pwd_reg);
password          291 sound/isa/opti9xx/opti92x-ad1848.c 			outb(chip->password, chip->mc_base + chip->pwd_reg);
password          307 sound/isa/opti9xx/opti92x-ad1848.c 		outb(chip->password, chip->mc_base + chip->pwd_reg);
password          684 sound/isa/opti9xx/opti92x-ad1848.c 	outb(chip->password, chip->mc_base + chip->pwd_reg);
password           77 tools/testing/selftests/net/nettest.c 	const char *password;
password          203 tools/testing/selftests/net/nettest.c static int tcp_md5sig(int sd, void *addr, socklen_t alen, const char *password)
password          206 tools/testing/selftests/net/nettest.c 	int keylen = password ? strlen(password) : 0;
password          214 tools/testing/selftests/net/nettest.c 		memcpy(md5sig.tcpm_key, password, keylen);
password          257 tools/testing/selftests/net/nettest.c 	if (tcp_md5sig(sd, addr, alen, args->password))
password         1195 tools/testing/selftests/net/nettest.c 	if (args->password && tcp_md5_remote(lsd, args)) {
password         1316 tools/testing/selftests/net/nettest.c 	if (args->password && tcp_md5sig(sd, addr, alen, args->password))
password         1643 tools/testing/selftests/net/nettest.c 			args.password = optarg;
password         1708 tools/testing/selftests/net/nettest.c 	if (args.password &&