password 278 drivers/firewire/sbp2.c struct sbp2_pointer password; password 516 drivers/input/mouse/elan_i2c_i2c.c u16 password; password 566 drivers/input/mouse/elan_i2c_i2c.c password = le16_to_cpup((__le16 *)val); password 567 drivers/input/mouse/elan_i2c_i2c.c if (password != ETP_I2C_IAP_PASSWORD) { password 568 drivers/input/mouse/elan_i2c_i2c.c dev_err(dev, "wrong iap password: 0x%X\n", password); password 351 drivers/input/mouse/elan_i2c_smbus.c u16 password; password 394 drivers/input/mouse/elan_i2c_smbus.c password = be16_to_cpup((__be16 *)val); password 395 drivers/input/mouse/elan_i2c_smbus.c if (password != ETP_SMBUS_IAP_PASSWORD) { password 396 drivers/input/mouse/elan_i2c_smbus.c dev_err(dev, "wrong iap password = 0x%X\n", password); password 1217 drivers/net/ethernet/via/via-velocity.h u8 password[6]; password 2857 drivers/scsi/libiscsi.c kfree(session->password); password 3275 drivers/scsi/libiscsi.c return iscsi_switch_str_param(&session->password, buf); password 3381 drivers/scsi/libiscsi.c len = sprintf(buf, "%s\n", session->password); password 85 drivers/scsi/qla4xxx/ql4_glbl.h char *password, int bidi, uint16_t *chap_index); password 86 drivers/scsi/qla4xxx/ql4_glbl.h int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, password 170 drivers/scsi/qla4xxx/ql4_glbl.h char *password, uint16_t idx); password 269 drivers/scsi/qla4xxx/ql4_glbl.h char *password, uint16_t chap_index); password 1575 drivers/scsi/qla4xxx/ql4_mbx.c int qla4xxx_get_chap(struct scsi_qla_host *ha, char *username, char *password, password 1616 drivers/scsi/qla4xxx/ql4_mbx.c strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); password 1637 drivers/scsi/qla4xxx/ql4_mbx.c int qla4xxx_set_chap(struct scsi_qla_host *ha, char *username, char *password, password 1657 drivers/scsi/qla4xxx/ql4_mbx.c chap_table->secret_len = strlen(password); password 1658 drivers/scsi/qla4xxx/ql4_mbx.c strncpy(chap_table->secret, password, MAX_CHAP_SECRET_LEN - 1); password 1694 drivers/scsi/qla4xxx/ql4_mbx.c char *password, uint16_t chap_index) password 1706 drivers/scsi/qla4xxx/ql4_mbx.c if (!username || !password) { password 1737 drivers/scsi/qla4xxx/ql4_mbx.c strlcpy(password, chap_table->secret, MAX_CHAP_SECRET_LEN); password 1761 drivers/scsi/qla4xxx/ql4_mbx.c char *password, int bidi, uint16_t *chap_index) password 1780 drivers/scsi/qla4xxx/ql4_mbx.c if (!username || !password) { password 1801 drivers/scsi/qla4xxx/ql4_mbx.c if (!strncmp(chap_table->secret, password, password 1815 drivers/scsi/qla4xxx/ql4_mbx.c rval = qla4xxx_set_chap(ha, username, password, password 2073 drivers/scsi/qla4xxx/ql4_mbx.c if (sess->username != NULL && sess->password != NULL) { password 2074 drivers/scsi/qla4xxx/ql4_mbx.c if (strlen(sess->username) && strlen(sess->password)) { password 2078 drivers/scsi/qla4xxx/ql4_mbx.c sess->password, password 772 drivers/scsi/qla4xxx/ql4_os.c strlcpy(chap_rec->password, chap_table->secret, password 957 drivers/scsi/qla4xxx/ql4_os.c size = min_t(size_t, sizeof(chap_rec.password), password 959 drivers/scsi/qla4xxx/ql4_os.c memcpy(chap_rec.password, param_info->value, size); password 1016 drivers/scsi/qla4xxx/ql4_os.c rc = qla4xxx_set_chap(ha, chap_rec.username, chap_rec.password, password 2848 drivers/scsi/qla4xxx/ql4_os.c sess->password, password 2864 drivers/scsi/qla4xxx/ql4_os.c !sess->username && !sess->password) { password 6005 drivers/scsi/qla4xxx/ql4_os.c char *password) password 6036 drivers/scsi/qla4xxx/ql4_os.c strlcpy(password, chap_table->secret, QL4_CHAP_MAX_SECRET_LEN); password 873 drivers/scsi/scsi_transport_iscsi.c iscsi_flashnode_sess_attr(fnode, password, ISCSI_FLASHNODE_PASSWORD); password 3987 drivers/scsi/scsi_transport_iscsi.c iscsi_session_attr(password, ISCSI_PARAM_PASSWORD, 1); password 260 drivers/target/iscsi/iscsi_target_auth.c ret = crypto_shash_update(desc, (char *)&auth->password, password 261 drivers/target/iscsi/iscsi_target_auth.c strlen(auth->password)); password 398 drivers/target/iscsi/iscsi_target_configfs.c DEF_NACL_AUTH_STR(password, NAF_PASSWORD_SET); password 857 drivers/target/iscsi/iscsi_target_configfs.c DEF_TPG_AUTH_STR(password, NAF_PASSWORD_SET); password 1242 drivers/target/iscsi/iscsi_target_configfs.c DEF_DISC_AUTH_STR(password, NAF_PASSWORD_SET); password 281 fs/cifs/cifsencrypt.c rc = SMBNTencrypt(ses->password, ses->server->cryptkey, password 289 fs/cifs/cifsencrypt.c rc = E_md4hash(ses->password, temp_key, nls_cp); password 305 fs/cifs/cifsencrypt.c int calc_lanman_hash(const char *password, const char *cryptkey, bool encrypt, password 312 fs/cifs/cifsencrypt.c if (password) { password 314 fs/cifs/cifsencrypt.c if (!password[len]) password 317 fs/cifs/cifsencrypt.c memcpy(password_with_pad, password, len); password 512 fs/cifs/cifsencrypt.c E_md4hash(ses->password, nt_hash, nls_cp); password 531 fs/cifs/cifsglob.h char *password; password 979 fs/cifs/cifsglob.h char *password; password 1040 fs/cifs/cifsglob.h char *password; /* for share-level security */ password 487 fs/cifs/cifsproto.h extern int calc_lanman_hash(const char *password, const char *cryptkey, password 2204 fs/cifs/connect.c kzfree(vol->password); password 2205 fs/cifs/connect.c vol->password = NULL; password 2242 fs/cifs/connect.c kzfree(vol->password); password 2245 fs/cifs/connect.c vol->password = kzalloc(temp_len+1, GFP_KERNEL); password 2246 fs/cifs/connect.c if (vol->password == NULL) { password 2252 fs/cifs/connect.c vol->password[j] = value[i]; password 2258 fs/cifs/connect.c vol->password[j] = '\0'; password 2918 fs/cifs/connect.c ses->password != NULL && password 2919 fs/cifs/connect.c strncmp(ses->password, password 2920 fs/cifs/connect.c vol->password ? vol->password : "", password 3179 fs/cifs/connect.c vol->password = kstrndup(delim, len, GFP_KERNEL); password 3180 fs/cifs/connect.c if (!vol->password) { password 3203 fs/cifs/connect.c kzfree(vol->password); password 3204 fs/cifs/connect.c vol->password = NULL; password 3297 fs/cifs/connect.c if (volume_info->password) { password 3298 fs/cifs/connect.c ses->password = kstrdup(volume_info->password, GFP_KERNEL); password 3299 fs/cifs/connect.c if (!ses->password) password 3482 fs/cifs/connect.c if (volume_info->password) { password 3483 fs/cifs/connect.c tcon->password = kstrdup(volume_info->password, GFP_KERNEL); password 3484 fs/cifs/connect.c if (!tcon->password) { password 4208 fs/cifs/connect.c kzfree(volume_info->password); password 5046 fs/cifs/connect.c calc_lanman_hash(tcon->password, ses->server->cryptkey, password 5052 fs/cifs/connect.c rc = SMBNTencrypt(tcon->password, ses->server->cryptkey, password 5321 fs/cifs/connect.c kzfree(vol_info->password); password 1092 fs/cifs/dfs_cache.c if (vol->password) { password 1093 fs/cifs/dfs_cache.c new->password = kstrndup(vol->password, strlen(vol->password), password 1095 fs/cifs/dfs_cache.c if (!new->password) password 1133 fs/cifs/dfs_cache.c kzfree(new->password); password 102 fs/cifs/misc.c kzfree(buf_to_free->password); password 147 fs/cifs/misc.c kzfree(buf_to_free->password); password 724 fs/cifs/sess.c rc = calc_lanman_hash(ses->password, ses->server->cryptkey, password 29 fs/ecryptfs/debug.c ecryptfs_to_hex(salt, auth_tok->token.password.salt, password 33 fs/ecryptfs/debug.c if (auth_tok->token.password.flags & password 37 fs/ecryptfs/debug.c memcpy(sig, auth_tok->token.password.signature, password 760 fs/ecryptfs/keystore.c (u8 *)s->auth_tok->token.password.session_key_encryption_key, password 761 fs/ecryptfs/keystore.c s->auth_tok->token.password.session_key_encryption_key_bytes, password 815 fs/ecryptfs/keystore.c s->auth_tok->token.password.session_key_encryption_key, password 823 fs/ecryptfs/keystore.c s->auth_tok->token.password.session_key_encryption_key, password 1031 fs/ecryptfs/keystore.c s->auth_tok->token.password.session_key_encryption_key, password 1039 fs/ecryptfs/keystore.c s->auth_tok->token.password.session_key_encryption_key, password 1104 fs/ecryptfs/keystore.c (*sig) = auth_tok->token.password.signature; password 1463 fs/ecryptfs/keystore.c memcpy((*new_auth_tok)->token.password.salt, password 1467 fs/ecryptfs/keystore.c (*new_auth_tok)->token.password.hash_iterations = password 1483 fs/ecryptfs/keystore.c (*new_auth_tok)->token.password.hash_algo = 0x01; /* MD5 */ password 1658 fs/ecryptfs/keystore.c auth_tok->token.password.session_key_encryption_key_bytes); password 1660 fs/ecryptfs/keystore.c auth_tok->token.password.session_key_encryption_key, password 1661 fs/ecryptfs/keystore.c auth_tok->token.password.session_key_encryption_key_bytes); password 1707 fs/ecryptfs/keystore.c tfm, auth_tok->token.password.session_key_encryption_key, password 1818 fs/ecryptfs/keystore.c ecryptfs_to_hex(new_auth_tok->token.password.signature, password 1820 fs/ecryptfs/keystore.c new_auth_tok->token.password.signature[ password 1906 fs/ecryptfs/keystore.c memcpy(&(candidate_auth_tok->token.password), password 1907 fs/ecryptfs/keystore.c &(matching_auth_tok->token.password), password 2194 fs/ecryptfs/keystore.c ecryptfs_from_hex(key_rec->sig, auth_tok->token.password.signature, password 2239 fs/ecryptfs/keystore.c if (auth_tok->token.password.flags & password 2243 fs/ecryptfs/keystore.c auth_tok->token.password. password 2246 fs/ecryptfs/keystore.c auth_tok->token.password.session_key_encryption_key, password 2365 fs/ecryptfs/keystore.c memcpy(&dest[(*packet_size)], auth_tok->token.password.salt, password 101 include/linux/ecryptfs.h struct ecryptfs_password password; password 841 include/scsi/iscsi_if.h uint8_t password[ISCSI_CHAP_AUTH_SECRET_MAX_LEN]; password 297 include/scsi/libiscsi.h char *password; password 363 include/scsi/scsi_transport_iscsi.h char *password; password 750 include/target/iscsi/iscsi_target_core.h char password[MAX_PASS_LEN]; password 21 security/keys/encrypted-keys/ecryptfs_format.c return auth_tok->token.password.session_key_encryption_key; password 57 security/keys/encrypted-keys/ecryptfs_format.c strncpy((char *)auth_tok->token.password.signature, key_desc, password 59 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->token.password.session_key_encryption_key_bytes = password 67 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->token.password.flags |= password 73 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->token.password.hash_algo = PGP_DIGEST_ALGO_SHA512; password 74 security/keys/encrypted-keys/ecryptfs_format.c auth_tok->token.password.flags &= ~(ECRYPTFS_PERSISTENT_PASSWORD); password 96 sound/isa/opti9xx/miro.c unsigned char password; password 795 sound/isa/opti9xx/miro.c chip->password = 0xe3; password 799 sound/isa/opti9xx/miro.c chip->password = 0xe5; password 817 sound/isa/opti9xx/miro.c outb(chip->password, chip->mc_base + chip->pwd_reg); password 823 sound/isa/opti9xx/miro.c outb(chip->password, chip->mc_base + chip->pwd_reg); password 847 sound/isa/opti9xx/miro.c outb(chip->password, chip->mc_base + chip->pwd_reg); password 853 sound/isa/opti9xx/miro.c outb(chip->password, chip->mc_base + chip->pwd_reg); password 119 sound/isa/opti9xx/opti92x-ad1848.c unsigned char password; password 204 sound/isa/opti9xx/opti92x-ad1848.c chip->password = (hardware == OPTi9XX_HW_82C928) ? 0xe2 : 0xe3; password 210 sound/isa/opti9xx/opti92x-ad1848.c chip->password = 0xe5; password 221 sound/isa/opti9xx/opti92x-ad1848.c chip->password = 0xe4; password 240 sound/isa/opti9xx/opti92x-ad1848.c outb(chip->password, chip->mc_base + chip->pwd_reg); password 248 sound/isa/opti9xx/opti92x-ad1848.c outb(chip->password, chip->mc_base + chip->pwd_reg); password 264 sound/isa/opti9xx/opti92x-ad1848.c outb(chip->password, chip->mc_base + chip->pwd_reg); password 283 sound/isa/opti9xx/opti92x-ad1848.c outb(chip->password, chip->mc_base + chip->pwd_reg); password 291 sound/isa/opti9xx/opti92x-ad1848.c outb(chip->password, chip->mc_base + chip->pwd_reg); password 307 sound/isa/opti9xx/opti92x-ad1848.c outb(chip->password, chip->mc_base + chip->pwd_reg); password 684 sound/isa/opti9xx/opti92x-ad1848.c outb(chip->password, chip->mc_base + chip->pwd_reg); password 77 tools/testing/selftests/net/nettest.c const char *password; password 203 tools/testing/selftests/net/nettest.c static int tcp_md5sig(int sd, void *addr, socklen_t alen, const char *password) password 206 tools/testing/selftests/net/nettest.c int keylen = password ? strlen(password) : 0; password 214 tools/testing/selftests/net/nettest.c memcpy(md5sig.tcpm_key, password, keylen); password 257 tools/testing/selftests/net/nettest.c if (tcp_md5sig(sd, addr, alen, args->password)) password 1195 tools/testing/selftests/net/nettest.c if (args->password && tcp_md5_remote(lsd, args)) { password 1316 tools/testing/selftests/net/nettest.c if (args->password && tcp_md5sig(sd, addr, alen, args->password)) password 1643 tools/testing/selftests/net/nettest.c args.password = optarg; password 1708 tools/testing/selftests/net/nettest.c if (args.password &&