auth               50 examples/auth/auth_skel.c 	(*auth_method)->auth = check_skel_security;
auth             1567 librpc/gen_ndr/ndr_netlogon.c 		NDR_CHECK(ndr_push_unique_ptr(ndr, r->auth));
auth             1585 librpc/gen_ndr/ndr_netlogon.c 		if (r->auth) {
auth             1587 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_push_array_uint8(ndr, NDR_SCALARS, r->auth, r->auth_size));
auth             1619 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_ALLOC(ndr, r->auth);
auth             1621 librpc/gen_ndr/ndr_netlogon.c 			r->auth = NULL;
auth             1644 librpc/gen_ndr/ndr_netlogon.c 		if (r->auth) {
auth             1646 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_SET_MEM_CTX(ndr, r->auth, 0);
auth             1647 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_array_size(ndr, &r->auth));
auth             1648 librpc/gen_ndr/ndr_netlogon.c 			NDR_PULL_ALLOC_N(ndr, r->auth, ndr_get_array_size(ndr, &r->auth));
auth             1649 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_pull_array_uint8(ndr, NDR_SCALARS, r->auth, ndr_get_array_size(ndr, &r->auth)));
auth             1659 librpc/gen_ndr/ndr_netlogon.c 		if (r->auth) {
auth             1660 librpc/gen_ndr/ndr_netlogon.c 			NDR_CHECK(ndr_check_array_size(ndr, (void*)&r->auth, r->auth_size));
auth             1682 librpc/gen_ndr/ndr_netlogon.c 	ndr_print_ptr(ndr, "auth", r->auth);
auth             1684 librpc/gen_ndr/ndr_netlogon.c 	if (r->auth) {
auth             1685 librpc/gen_ndr/ndr_netlogon.c 		ndr_print_array_uint8(ndr, "auth", r->auth, r->auth_size);
auth              204 librpc/gen_ndr/netlogon.h 	uint8_t *auth;/* [unique,size_is(auth_size)] */
auth               61 nsswitch/libwbclient/wbc_pam.c 	i->user_flags	= resp->data.auth.info3.user_flgs;
auth               63 nsswitch/libwbclient/wbc_pam.c 	i->account_name	= talloc_strdup(i, resp->data.auth.info3.user_name);
auth               66 nsswitch/libwbclient/wbc_pam.c 	i->full_name	= talloc_strdup(i, resp->data.auth.info3.full_name);
auth               68 nsswitch/libwbclient/wbc_pam.c 	i->domain_name	= talloc_strdup(i, resp->data.auth.info3.logon_dom);
auth               72 nsswitch/libwbclient/wbc_pam.c 	i->acct_flags	= resp->data.auth.info3.acct_flags;
auth               74 nsswitch/libwbclient/wbc_pam.c 	       resp->data.auth.user_session_key,
auth               77 nsswitch/libwbclient/wbc_pam.c 	       resp->data.auth.first_8_lm_hash,
auth               80 nsswitch/libwbclient/wbc_pam.c 	i->logon_count		= resp->data.auth.info3.logon_count;
auth               81 nsswitch/libwbclient/wbc_pam.c 	i->bad_password_count	= resp->data.auth.info3.bad_pw_count;
auth               83 nsswitch/libwbclient/wbc_pam.c 	i->logon_time		= resp->data.auth.info3.logon_time;
auth               84 nsswitch/libwbclient/wbc_pam.c 	i->logoff_time		= resp->data.auth.info3.logoff_time;
auth               85 nsswitch/libwbclient/wbc_pam.c 	i->kickoff_time		= resp->data.auth.info3.kickoff_time;
auth               86 nsswitch/libwbclient/wbc_pam.c 	i->pass_last_set_time	= resp->data.auth.info3.pass_last_set_time;
auth               87 nsswitch/libwbclient/wbc_pam.c 	i->pass_can_change_time	= resp->data.auth.info3.pass_can_change_time;
auth               88 nsswitch/libwbclient/wbc_pam.c 	i->pass_must_change_time= resp->data.auth.info3.pass_must_change_time;
auth               90 nsswitch/libwbclient/wbc_pam.c 	i->logon_server	= talloc_strdup(i, resp->data.auth.info3.logon_srv);
auth               92 nsswitch/libwbclient/wbc_pam.c 	i->logon_script	= talloc_strdup(i, resp->data.auth.info3.logon_script);
auth               94 nsswitch/libwbclient/wbc_pam.c 	i->profile_path	= talloc_strdup(i, resp->data.auth.info3.profile_path);
auth               96 nsswitch/libwbclient/wbc_pam.c 	i->home_directory= talloc_strdup(i, resp->data.auth.info3.home_dir);
auth               98 nsswitch/libwbclient/wbc_pam.c 	i->home_drive	= talloc_strdup(i, resp->data.auth.info3.dir_drive);
auth              102 nsswitch/libwbclient/wbc_pam.c 	i->num_sids 	+= resp->data.auth.info3.num_groups;
auth              103 nsswitch/libwbclient/wbc_pam.c 	i->num_sids	+= resp->data.auth.info3.num_other_sids;
auth              108 nsswitch/libwbclient/wbc_pam.c 	wbc_status = wbcStringToSid(resp->data.auth.info3.dom_sid,
auth              125 nsswitch/libwbclient/wbc_pam.c 		     resp->data.auth.info3.user_rid,
auth              129 nsswitch/libwbclient/wbc_pam.c 		     resp->data.auth.info3.group_rid,
auth              139 nsswitch/libwbclient/wbc_pam.c 	for (j=0; j < resp->data.auth.info3.num_groups; j++) {
auth              163 nsswitch/libwbclient/wbc_pam.c 	for (j=0; j < resp->data.auth.info3.num_other_sids; j++) {
auth              217 nsswitch/libwbclient/wbc_pam.c 	e->nt_status = resp->data.auth.nt_status;
auth              218 nsswitch/libwbclient/wbc_pam.c 	e->pam_error = resp->data.auth.pam_error;
auth              219 nsswitch/libwbclient/wbc_pam.c 	e->nt_string = talloc_strdup(e, resp->data.auth.nt_status_string);
auth              222 nsswitch/libwbclient/wbc_pam.c 	e->display_string = talloc_strdup(e, resp->data.auth.error_string);
auth              243 nsswitch/libwbclient/wbc_pam.c 	i->min_passwordage	= resp->data.auth.policy.min_passwordage;
auth              244 nsswitch/libwbclient/wbc_pam.c 	i->min_length_password	= resp->data.auth.policy.min_length_password;
auth              245 nsswitch/libwbclient/wbc_pam.c 	i->password_history	= resp->data.auth.policy.password_history;
auth              246 nsswitch/libwbclient/wbc_pam.c 	i->password_properties	= resp->data.auth.policy.password_properties;
auth              247 nsswitch/libwbclient/wbc_pam.c 	i->expire		= resp->data.auth.policy.expire;
auth              270 nsswitch/libwbclient/wbc_pam.c 	if (resp->data.auth.krb5ccname) {
auth              275 nsswitch/libwbclient/wbc_pam.c 					     (uint8_t *)resp->data.auth.krb5ccname,
auth              276 nsswitch/libwbclient/wbc_pam.c 					     strlen(resp->data.auth.krb5ccname)+1);
auth              280 nsswitch/libwbclient/wbc_pam.c 	if (resp->data.auth.unix_username) {
auth              285 nsswitch/libwbclient/wbc_pam.c 					     (uint8_t *)resp->data.auth.unix_username,
auth              286 nsswitch/libwbclient/wbc_pam.c 					     strlen(resp->data.auth.unix_username)+1);
auth              352 nsswitch/libwbclient/wbc_pam.c 			snprintf(request.data.auth.user,
auth              353 nsswitch/libwbclient/wbc_pam.c 				 sizeof(request.data.auth.user)-1,
auth              359 nsswitch/libwbclient/wbc_pam.c 			strncpy(request.data.auth.user,
auth              361 nsswitch/libwbclient/wbc_pam.c 				sizeof(request.data.auth.user)-1);
auth              364 nsswitch/libwbclient/wbc_pam.c 		strncpy(request.data.auth.pass,
auth              366 nsswitch/libwbclient/wbc_pam.c 			sizeof(request.data.auth.pass)-1);
auth              465 nsswitch/libwbclient/wbc_pam.c 	if (response.data.auth.nt_status != 0) {
auth              519 nsswitch/libwbclient/wbc_pam.c 	if (response.data.auth.nt_status != 0) {
auth              606 nsswitch/libwbclient/wbc_pam.c 	if (response.data.auth.nt_status != 0) {
auth              835 nsswitch/libwbclient/wbc_pam.c 	if (response.data.auth.nt_status != 0) {
auth              853 nsswitch/libwbclient/wbc_pam.c 		*reject_reason = response.data.auth.reject_reason;
auth              944 nsswitch/libwbclient/wbc_pam.c 	strncpy(request.data.auth.user,
auth              946 nsswitch/libwbclient/wbc_pam.c 		sizeof(request.data.auth.user)-1);
auth              948 nsswitch/libwbclient/wbc_pam.c 	strncpy(request.data.auth.pass,
auth              950 nsswitch/libwbclient/wbc_pam.c 		sizeof(request.data.auth.pass)-1);
auth              956 nsswitch/libwbclient/wbc_pam.c 				strncpy(request.data.auth.krb5_cc_type,
auth              958 nsswitch/libwbclient/wbc_pam.c 					sizeof(request.data.auth.krb5_cc_type) - 1);
auth              965 nsswitch/libwbclient/wbc_pam.c 				memcpy(&request.data.auth.uid,
auth              967 nsswitch/libwbclient/wbc_pam.c 					MIN(sizeof(request.data.auth.uid),
auth              988 nsswitch/libwbclient/wbc_pam.c 				strncpy(request.data.auth.require_membership_of_sid,
auth              990 nsswitch/libwbclient/wbc_pam.c 					sizeof(request.data.auth.require_membership_of_sid) - 1);
auth             1000 nsswitch/libwbclient/wbc_pam.c 	if (response.data.auth.nt_status != 0) {
auth             1195 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.user, username);
auth             1196 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.pass, p + 1);
auth             1199 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.user, username);
auth             1201 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.pass, password);
auth             1207 nsswitch/wbinfo.c 	fstrcpy(request.data.auth.krb5_cc_type, cctype);
auth             1209 nsswitch/wbinfo.c 	request.data.auth.uid = geteuid();
auth             1218 nsswitch/wbinfo.c 	if (response.data.auth.nt_status)
auth             1220 nsswitch/wbinfo.c 			 response.data.auth.nt_status_string,
auth             1221 nsswitch/wbinfo.c 			 response.data.auth.nt_status,
auth             1222 nsswitch/wbinfo.c 			 response.data.auth.error_string);
auth             1227 nsswitch/wbinfo.c 			if (response.data.auth.info3.user_flgs & NETLOGON_CACHED_ACCOUNT) {
auth             1232 nsswitch/wbinfo.c 		if (response.data.auth.krb5ccname[0] != '\0') {
auth             1233 nsswitch/wbinfo.c 			d_printf("credentials were put in: %s\n", response.data.auth.krb5ccname);
auth             1272 nsswitch/wbinfo.c 	if (response.data.auth.nt_status)
auth             1274 nsswitch/wbinfo.c 			 response.data.auth.nt_status_string,
auth             1275 nsswitch/wbinfo.c 			 response.data.auth.nt_status,
auth             1276 nsswitch/wbinfo.c 			 response.data.auth.error_string);
auth             1405 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.user, username);
auth             1406 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.pass, p + 1);
auth             1409 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.user, username);
auth             1410 nsswitch/wbinfo.c 		fstrcpy(request.data.auth.pass, getpass("Password: "));
auth             1422 nsswitch/wbinfo.c 	if (response.data.auth.nt_status)
auth             1424 nsswitch/wbinfo.c 			 response.data.auth.nt_status_string,
auth             1425 nsswitch/wbinfo.c 			 response.data.auth.nt_status,
auth             1426 nsswitch/wbinfo.c 			 response.data.auth.error_string);
auth              544 nsswitch/wbinfo4.c 			 response.data.auth.nt_status_string,
auth              545 nsswitch/wbinfo4.c 			 response.data.auth.nt_status);
auth              736 nsswitch/wbinfo4.c 		fstrcpy(request.data.auth.user, username);
auth              737 nsswitch/wbinfo4.c 		fstrcpy(request.data.auth.pass, p + 1);
auth              740 nsswitch/wbinfo4.c 		fstrcpy(request.data.auth.user, username);
auth              744 nsswitch/wbinfo4.c 	fstrcpy(request.data.auth.krb5_cc_type, cctype);
auth              746 nsswitch/wbinfo4.c 	request.data.auth.uid = geteuid();
auth              755 nsswitch/wbinfo4.c 	if (response.data.auth.nt_status)
auth              757 nsswitch/wbinfo4.c 			 response.data.auth.nt_status_string,
auth              758 nsswitch/wbinfo4.c 			 response.data.auth.nt_status,
auth              759 nsswitch/wbinfo4.c 			 response.data.auth.error_string);
auth              764 nsswitch/wbinfo4.c 			if (response.data.auth.info3.user_flgs & NETLOGON_CACHED_ACCOUNT) {
auth              769 nsswitch/wbinfo4.c 		if (response.data.auth.krb5ccname[0] != '\0') {
auth              770 nsswitch/wbinfo4.c 			d_printf("credentials were put in: %s\n", response.data.auth.krb5ccname);
auth              797 nsswitch/wbinfo4.c                 fstrcpy(request.data.auth.user, username);
auth              798 nsswitch/wbinfo4.c                 fstrcpy(request.data.auth.pass, p + 1);
auth              801 nsswitch/wbinfo4.c                 fstrcpy(request.data.auth.user, username);
auth              810 nsswitch/wbinfo4.c 	if (response.data.auth.nt_status)
auth              812 nsswitch/wbinfo4.c 			 response.data.auth.nt_status_string,
auth              813 nsswitch/wbinfo4.c 			 response.data.auth.nt_status,
auth              814 nsswitch/wbinfo4.c 			 response.data.auth.error_string);
auth              917 nsswitch/wbinfo4.c 	if (response.data.auth.nt_status)
auth              919 nsswitch/wbinfo4.c 			 response.data.auth.nt_status_string,
auth              920 nsswitch/wbinfo4.c 			 response.data.auth.nt_status,
auth              921 nsswitch/wbinfo4.c 			 response.data.auth.error_string);
auth              884 nsswitch/winbind_nss_aix.c 	STRCPY_RET(request.data.auth.user, r_user);
auth              885 nsswitch/winbind_nss_aix.c 	STRCPY_RET(request.data.auth.pass, pass);
auth              254 nsswitch/winbind_struct_protocol.h 		} auth;              /* pam_winbind auth module */
auth              451 nsswitch/winbind_struct_protocol.h 		} auth;
auth              258 source3/auth/auth.c 		result = auth_method->auth(auth_context, auth_method->private_data, mem_ctx, user_info, server_info);
auth               58 source3/auth/auth_builtin.c 	(*auth_method)->auth = check_guest_security;
auth              110 source3/auth/auth_builtin.c 	(*auth_method)->auth = check_name_to_ntstatus_security;
auth              159 source3/auth/auth_builtin.c 	(*auth_method)->auth = check_fixed_challenge_security;
auth              431 source3/auth/auth_domain.c 	(*auth_method)->auth = check_ntdomain_security;
auth              533 source3/auth/auth_domain.c 	(*auth_method)->auth = check_trustdomain_security;
auth               34 source3/auth/auth_netlogond.c 	struct cli_pipe_auth_data *auth;
auth               50 source3/auth/auth_netlogond.c 					   schannel_key, &auth);
auth               58 source3/auth/auth_netlogond.c 	status = rpc_pipe_bind(p, auth);
auth              163 source3/auth/auth_netlogond.c 	struct cli_pipe_auth_data *auth;
auth              226 source3/auth/auth_netlogond.c 	status = rpccli_anon_bind_data(p, &auth);
auth              233 source3/auth/auth_netlogond.c 	status = rpc_pipe_bind(p, auth);
auth              308 source3/auth/auth_netlogond.c 	(*auth_method)->auth = check_netlogond_security;
auth              383 source3/auth/auth_sam.c 	(*auth_method)->auth = check_sam_security;	
auth              440 source3/auth/auth_sam.c 	(*auth_method)->auth = check_samstrict_security;
auth              129 source3/auth/auth_script.c 	(*auth_method)->auth = script_check_user_credentials;
auth              461 source3/auth/auth_server.c 	(*auth_method)->auth = check_smbserver_security;
auth              138 source3/auth/auth_unix.c 	(*auth_method)->auth = check_unix_security;
auth              142 source3/auth/auth_wbc.c 	(*auth_method)->auth = check_wbc_security;
auth               97 source3/auth/auth_winbind.c 			return auth_method->auth(auth_context, auth_method->private_data, 
auth              136 source3/auth/auth_winbind.c 	(*auth_method)->auth = check_winbind_security;
auth               72 source3/include/ads.h 	} auth;
auth              109 source3/include/auth.h 	NTSTATUS (*auth)(const struct auth_context *auth_context,
auth              135 source3/include/client.h 	struct cli_pipe_auth_data *auth;
auth              224 source3/include/ntdomain.h 	struct pipe_auth_data auth;
auth             2825 source3/include/proto.h bool spnego_parse_auth(DATA_BLOB blob, DATA_BLOB *auth);
auth             2830 source3/include/proto.h 				DATA_BLOB *auth);
auth             5270 source3/include/proto.h 				     struct cli_pipe_auth_data *auth);
auth             5273 source3/include/proto.h 		       struct cli_pipe_auth_data *auth);
auth              117 source3/lib/netapi/joindomain.c 						   &pipe_cli->auth->user_session_key,
auth              243 source3/lib/netapi/joindomain.c 						   &pipe_cli->auth->user_session_key,
auth              363 source3/lib/netapi/joindomain.c 	SAFE_FREE(ads->auth.user_name);
auth              365 source3/lib/netapi/joindomain.c 		ads->auth.user_name = SMB_STRDUP(r->in.account);
auth              367 source3/lib/netapi/joindomain.c 		ads->auth.user_name = SMB_STRDUP(ctx->username);
auth              370 source3/lib/netapi/joindomain.c 	SAFE_FREE(ads->auth.password);
auth              372 source3/lib/netapi/joindomain.c 		ads->auth.password = SMB_STRDUP(r->in.password);
auth              374 source3/lib/netapi/joindomain.c 		ads->auth.password = SMB_STRDUP(ctx->password);
auth              419 source3/lib/netapi/joindomain.c 						   &pipe_cli->auth->user_session_key,
auth              461 source3/lib/netapi/joindomain.c 						   &pipe_cli->auth->user_session_key,
auth              453 source3/lib/netapi/user.c 					   &pipe_cli->auth->user_session_key,
auth             1856 source3/lib/netapi/user.c 					   &pipe_cli->auth->user_session_key,
auth              409 source3/lib/popt_common.c 	XFILE *auth;
auth              414 source3/lib/popt_common.c 	if ((auth=x_fopen(file, O_RDONLY, 0)) == NULL)
auth              421 source3/lib/popt_common.c 	while (!x_feof(auth))
auth              424 source3/lib/popt_common.c 		if (!x_fgets(buf, sizeof(buf), auth))
auth              458 source3/lib/popt_common.c 	x_fclose(auth);
auth              149 source3/libads/ads_struct.c 	ads->auth.flags = wrap_flags;
auth              170 source3/libads/ads_struct.c 		SAFE_FREE((*ads)->auth.realm);
auth              171 source3/libads/ads_struct.c 		SAFE_FREE((*ads)->auth.password);
auth              172 source3/libads/ads_struct.c 		SAFE_FREE((*ads)->auth.user_name);
auth              173 source3/libads/ads_struct.c 		SAFE_FREE((*ads)->auth.kdc_server);
auth              296 source3/libads/kerberos.c 	if (ads->auth.flags & ADS_AUTH_USER_CREDS) {
auth              297 source3/libads/kerberos.c 		account_name = ads->auth.user_name;
auth              313 source3/libads/kerberos.c 			account_name = ads->auth.user_name;
auth              317 source3/libads/kerberos.c 	if (asprintf(&s, "%s@%s", account_name, ads->auth.realm) == -1) {
auth              321 source3/libads/kerberos.c 	if (!ads->auth.password) {
auth              326 source3/libads/kerberos.c 	ret = kerberos_kinit_password_ext(s, ads->auth.password, ads->auth.time_offset,
auth              327 source3/libads/kerberos.c 			&ads->auth.tgt_expire, NULL, NULL, False, False, ads->auth.renewable, 
auth              832 source3/libads/krb5_setpw.c 	status = ads_krb5_set_password(ads->auth.kdc_server, principal, 
auth              833 source3/libads/krb5_setpw.c 				       password, ads->auth.time_offset);
auth              341 source3/libads/ldap.c 	if (!(ads->auth.flags & ADS_AUTH_NO_BIND)) {
auth              453 source3/libads/ldap.c 	ads->auth.flags = ADS_AUTH_NO_BIND;
auth              623 source3/libads/ldap.c 	if (!ads->auth.user_name) {
auth              627 source3/libads/ldap.c 		if (asprintf(&ads->auth.user_name, "%s$", global_myname() ) == -1) {
auth              629 source3/libads/ldap.c 			ads->auth.user_name = NULL;
auth              633 source3/libads/ldap.c 	if (!ads->auth.realm) {
auth              634 source3/libads/ldap.c 		ads->auth.realm = SMB_STRDUP(ads->config.realm);
auth              637 source3/libads/ldap.c 	if (!ads->auth.kdc_server) {
auth              639 source3/libads/ldap.c 		ads->auth.kdc_server = SMB_STRDUP(addr);
auth              648 source3/libads/ldap.c 			setenv(env, ads->auth.kdc_server, 1);
auth              656 source3/libads/ldap.c 	if (ads->auth.flags & ADS_AUTH_NO_BIND) {
auth              701 source3/libads/ldap.c 	if (ads->auth.flags & ADS_AUTH_ANON_BIND) {
auth              706 source3/libads/ldap.c 	if (ads->auth.flags & ADS_AUTH_SIMPLE_BIND) {
auth              707 source3/libads/ldap.c 		status = ADS_ERROR(ldap_simple_bind_s(ads->ldap.ld, ads->auth.user_name, ads->auth.password));
auth              732 source3/libads/ldap.c 	ads->auth.flags |= ADS_AUTH_USER_CREDS;
auth             2825 source3/libads/ldap.c 		ads_s->auth.flags = ADS_AUTH_ANON_BIND;
auth             2848 source3/libads/ldap.c 		ads->auth.time_offset = ads->config.current_time - time(NULL);
auth             2849 source3/libads/ldap.c 		DEBUG(4,("time offset is %d seconds\n", ads->auth.time_offset));
auth             2887 source3/libads/ldap.c 		ads_s->auth.flags = ADS_AUTH_ANON_BIND;
auth               57 source3/libads/ldap_utils.c 	if (ads->auth.flags & ADS_AUTH_ANON_BIND) {
auth               94 source3/libads/ldap_utils.c 		if (ads->auth.flags & ADS_AUTH_ANON_BIND) {
auth               55 source3/libads/ndr.c 	ndr_print_string(ndr, "realm", r->auth.realm);
auth               57 source3/libads/ndr.c 	ndr_print_string(ndr, "password", r->auth.password);
auth               61 source3/libads/ndr.c 	ndr_print_string(ndr, "user_name", r->auth.user_name);
auth               62 source3/libads/ndr.c 	ndr_print_string(ndr, "kdc_server", r->auth.kdc_server);
auth               63 source3/libads/ndr.c 	ndr_print_ads_auth_flags(ndr, "flags", r->auth.flags);
auth               64 source3/libads/ndr.c 	ndr_print_uint32(ndr, "time_offset", r->auth.time_offset);
auth               65 source3/libads/ndr.c 	ndr_print_time_t(ndr, "tgt_expire", r->auth.tgt_expire);
auth               66 source3/libads/ndr.c 	ndr_print_time_t(ndr, "tgs_expire", r->auth.tgs_expire);
auth               67 source3/libads/ndr.c 	ndr_print_time_t(ndr, "renewable", r->auth.renewable);
auth              140 source3/libads/sasl.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_username(ntlmssp_state, ads->auth.user_name))) {
auth              143 source3/libads/sasl.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_domain(ntlmssp_state, ads->auth.realm))) {
auth              146 source3/libads/sasl.c 	if (!NT_STATUS_IS_OK(nt_status = ntlmssp_set_password(ntlmssp_state, ads->auth.password))) {
auth              155 source3/libads/sasl.c 		if (ads->auth.flags & ADS_AUTH_SASL_FORCE) {
auth              466 source3/libads/sasl.c 		if (ads->auth.flags & ADS_AUTH_SASL_FORCE) {
auth              481 source3/libads/sasl.c 		if (ads->auth.flags & ADS_AUTH_SASL_FORCE) {
auth              696 source3/libads/sasl.c 	rc = spnego_gen_negTokenTarg(principal, ads->auth.time_offset, &blob, &session_key, 0,
auth              697 source3/libads/sasl.c 				     &ads->auth.tgs_expire);
auth              792 source3/libads/sasl.c 	if (!(ads->auth.flags & ADS_AUTH_DISABLE_KERBEROS) &&
auth              827 source3/libads/sasl.c 		    !(ads->auth.flags & ADS_AUTH_ALLOW_NTLMSSP)) {
auth             1099 source3/libads/sasl.c 	if (ads->auth.flags & ADS_AUTH_SASL_SEAL) {
auth             1101 source3/libads/sasl.c 	} else if (ads->auth.flags & ADS_AUTH_SASL_SIGN) {
auth               38 source3/libads/util.c 	ret = kerberos_set_password(ads->auth.kdc_server, host_principal, password, host_principal, new_password, ads->auth.time_offset);
auth              665 source3/libgpo/gpo_util.c 					ads->auth.user_name, NULL,
auth              666 source3/libgpo/gpo_util.c 					ads->auth.password,
auth              112 source3/libnet/libnet_join.c 		SAFE_FREE(my_ads->auth.user_name);
auth              113 source3/libnet/libnet_join.c 		my_ads->auth.user_name = SMB_STRDUP(user_name);
auth              117 source3/libnet/libnet_join.c 		SAFE_FREE(my_ads->auth.password);
auth              118 source3/libnet/libnet_join.c 		my_ads->auth.password = SMB_STRDUP(password);
auth               55 source3/libnet/libnet_samsync_keytab.c 	ads->auth.user_name = SMB_STRDUP(username);
auth               56 source3/libnet/libnet_samsync_keytab.c 	ads->auth.password = SMB_STRDUP(password);
auth              495 source3/libsmb/clispnego.c bool spnego_parse_auth(DATA_BLOB blob, DATA_BLOB *auth)
auth              513 source3/libsmb/clispnego.c 	*auth = data_blob_talloc(talloc_tos(),
auth              575 source3/libsmb/clispnego.c 				DATA_BLOB *auth)
auth              600 source3/libsmb/clispnego.c 	*auth = data_blob_null;
auth              609 source3/libsmb/clispnego.c 			asn1_read_OctetString(data, NULL, auth);
auth              636 source3/libsmb/clispnego.c 		data_blob_free(auth);
auth               77 source3/libsmb/namequery_dc.c 		ads->auth.flags |= ADS_AUTH_NO_BIND;
auth             3340 source3/printing/nt_printing.c 	SAFE_FREE(ads->auth.password);
auth             3341 source3/printing/nt_printing.c 	ads->auth.password = secrets_fetch_machine_password(lp_workgroup(),
auth             3382 source3/printing/nt_printing.c 	SAFE_FREE(ads->auth.password);
auth             3383 source3/printing/nt_printing.c 	ads->auth.password = secrets_fetch_machine_password(lp_workgroup(),
auth              555 source3/rpc_client/cli_pipe.c 	NTLMSSP_STATE *ntlmssp_state = cli->auth->a_u.ntlmssp_state;
auth              563 source3/rpc_client/cli_pipe.c 	if (cli->auth->auth_level == PIPE_AUTH_LEVEL_NONE
auth              564 source3/rpc_client/cli_pipe.c 	    || cli->auth->auth_level == PIPE_AUTH_LEVEL_CONNECT) {
auth              608 source3/rpc_client/cli_pipe.c 	switch (cli->auth->auth_level) {
auth              641 source3/rpc_client/cli_pipe.c 				  "auth level %d\n", cli->auth->auth_level));
auth              678 source3/rpc_client/cli_pipe.c 		cli->auth->a_u.schannel_auth;
auth              681 source3/rpc_client/cli_pipe.c 	if (cli->auth->auth_level == PIPE_AUTH_LEVEL_NONE
auth              682 source3/rpc_client/cli_pipe.c 	    || cli->auth->auth_level == PIPE_AUTH_LEVEL_CONNECT) {
auth              729 source3/rpc_client/cli_pipe.c 			cli->auth->auth_level,
auth              790 source3/rpc_client/cli_pipe.c 	switch(cli->auth->auth_type) {
auth              823 source3/rpc_client/cli_pipe.c 				  cli->auth->auth_type ));
auth             1480 source3/rpc_client/cli_pipe.c 	struct kerberos_auth_struct *a = cli->auth->a_u.kerberos_auth;
auth             1546 source3/rpc_client/cli_pipe.c 	nt_status = ntlmssp_update(cli->auth->a_u.ntlmssp_state,
auth             1592 source3/rpc_client/cli_pipe.c 	nt_status = ntlmssp_update(cli->auth->a_u.ntlmssp_state,
auth             1632 source3/rpc_client/cli_pipe.c 	if (!cli->auth->domain || !cli->auth->domain[0]) {
auth             1633 source3/rpc_client/cli_pipe.c 		cli->auth->domain = talloc_strdup(cli, lp_workgroup());
auth             1634 source3/rpc_client/cli_pipe.c 		if (cli->auth->domain == NULL) {
auth             1639 source3/rpc_client/cli_pipe.c 	init_rpc_auth_schannel_neg(&schannel_neg, cli->auth->domain,
auth             1825 source3/rpc_client/cli_pipe.c 	if (!cli->auth->a_u.ntlmssp_state) {
auth             1832 source3/rpc_client/cli_pipe.c 				cli->auth->auth_type),
auth             1833 source3/rpc_client/cli_pipe.c 			cli->auth->auth_level,
auth             1843 source3/rpc_client/cli_pipe.c 	switch (cli->auth->auth_level) {
auth             1846 source3/rpc_client/cli_pipe.c 			status = ntlmssp_seal_packet(cli->auth->a_u.ntlmssp_state,
auth             1860 source3/rpc_client/cli_pipe.c 			status = ntlmssp_sign_packet(cli->auth->a_u.ntlmssp_state,
auth             1903 source3/rpc_client/cli_pipe.c 	struct schannel_auth_struct *sas = cli->auth->a_u.schannel_auth;
auth             1913 source3/rpc_client/cli_pipe.c 			map_pipe_auth_type_to_rpc_auth_type(cli->auth->auth_type),
auth             1914 source3/rpc_client/cli_pipe.c 			cli->auth->auth_level,
auth             1923 source3/rpc_client/cli_pipe.c 	switch (cli->auth->auth_level) {
auth             1930 source3/rpc_client/cli_pipe.c 					cli->auth->auth_level,
auth             1975 source3/rpc_client/cli_pipe.c 	switch (cli->auth->auth_level) {
auth             1988 source3/rpc_client/cli_pipe.c 			switch(cli->auth->auth_type) {
auth             2188 source3/rpc_client/cli_pipe.c 	switch (state->cli->auth->auth_type) {
auth             2555 source3/rpc_client/cli_pipe.c 				     struct cli_pipe_auth_data *auth)
auth             2568 source3/rpc_client/cli_pipe.c 		(unsigned int)auth->auth_type,
auth             2569 source3/rpc_client/cli_pipe.c 		(unsigned int)auth->auth_level ));
auth             2578 source3/rpc_client/cli_pipe.c 	cli->auth = talloc_move(cli, &auth);
auth             2585 source3/rpc_client/cli_pipe.c 				     cli->auth->auth_type,
auth             2586 source3/rpc_client/cli_pipe.c 				     cli->auth->auth_level);
auth             2661 source3/rpc_client/cli_pipe.c 	switch(state->cli->auth->auth_type) {
auth             2695 source3/rpc_client/cli_pipe.c 			 (unsigned int)state->cli->auth->auth_type));
auth             2733 source3/rpc_client/cli_pipe.c 	status = ntlmssp_update(state->cli->auth->a_u.ntlmssp_state,
auth             2745 source3/rpc_client/cli_pipe.c 				       state->cli->auth->auth_type,
auth             2746 source3/rpc_client/cli_pipe.c 				       state->cli->auth->auth_level,
auth             2829 source3/rpc_client/cli_pipe.c 	status = ntlmssp_update(state->cli->auth->a_u.ntlmssp_state,
auth             2854 source3/rpc_client/cli_pipe.c 					  state->cli->auth->auth_level,
auth             2940 source3/rpc_client/cli_pipe.c 		       struct cli_pipe_auth_data *auth)
auth             2952 source3/rpc_client/cli_pipe.c 	req = rpc_pipe_bind_send(frame, ev, cli, auth);
auth             3000 source3/rpc_client/cli_pipe.c 	if ((rpc_cli->auth->auth_type == PIPE_AUTH_TYPE_NTLMSSP)
auth             3001 source3/rpc_client/cli_pipe.c 	    || (rpc_cli->auth->auth_type == PIPE_AUTH_TYPE_SPNEGO_NTLMSSP)) {
auth             3002 source3/rpc_client/cli_pipe.c 		memcpy(nt_hash, rpc_cli->auth->a_u.ntlmssp_state->nt_hash, 16);
auth             3038 source3/rpc_client/cli_pipe.c static int cli_auth_ntlmssp_data_destructor(struct cli_pipe_auth_data *auth)
auth             3040 source3/rpc_client/cli_pipe.c 	ntlmssp_end(&auth->a_u.ntlmssp_state);
auth             3153 source3/rpc_client/cli_pipe.c static int cli_auth_kerberos_data_destructor(struct kerberos_auth_struct *auth)
auth             3155 source3/rpc_client/cli_pipe.c 	data_blob_free(&auth->session_key);
auth             3290 source3/rpc_client/cli_pipe.c 	struct cli_pipe_auth_data *auth = NULL;
auth             3315 source3/rpc_client/cli_pipe.c 	status = rpccli_anon_bind_data(tmp_ctx, &auth);
auth             3320 source3/rpc_client/cli_pipe.c 	status = rpc_pipe_bind(epm_pipe, auth);
auth             3578 source3/rpc_client/cli_pipe.c 	struct cli_pipe_auth_data *auth;
auth             3608 source3/rpc_client/cli_pipe.c 	status = rpccli_anon_bind_data(result, &auth);
auth             3616 source3/rpc_client/cli_pipe.c 	status = rpc_pipe_bind(result, auth);
auth             3659 source3/rpc_client/cli_pipe.c 	struct cli_pipe_auth_data *auth;
auth             3667 source3/rpc_client/cli_pipe.c 	status = rpccli_anon_bind_data(result, &auth);
auth             3681 source3/rpc_client/cli_pipe.c 	TALLOC_FREE(auth->user_name);
auth             3682 source3/rpc_client/cli_pipe.c 	TALLOC_FREE(auth->domain);
auth             3684 source3/rpc_client/cli_pipe.c 	auth->user_name = talloc_strdup(auth, cli->user_name);
auth             3685 source3/rpc_client/cli_pipe.c 	auth->domain = talloc_strdup(auth, cli->domain);
auth             3686 source3/rpc_client/cli_pipe.c 	auth->user_session_key = data_blob_talloc(auth,
auth             3690 source3/rpc_client/cli_pipe.c 	if ((auth->user_name == NULL) || (auth->domain == NULL)) {
auth             3695 source3/rpc_client/cli_pipe.c 	status = rpc_pipe_bind(result, auth);
auth             3746 source3/rpc_client/cli_pipe.c 	struct cli_pipe_auth_data *auth;
auth             3756 source3/rpc_client/cli_pipe.c 		password, &auth);
auth             3763 source3/rpc_client/cli_pipe.c 	status = rpc_pipe_bind(result, auth);
auth             3930 source3/rpc_client/cli_pipe.c 	struct cli_pipe_auth_data *auth;
auth             3939 source3/rpc_client/cli_pipe.c 					   pdc->sess_key, &auth);
auth             3947 source3/rpc_client/cli_pipe.c 	status = rpc_pipe_bind(result, auth);
auth             4109 source3/rpc_client/cli_pipe.c 	struct cli_pipe_auth_data *auth;
auth             4118 source3/rpc_client/cli_pipe.c 					   username, password, &auth);
auth             4126 source3/rpc_client/cli_pipe.c 	status = rpc_pipe_bind(result, auth);
auth             4150 source3/rpc_client/cli_pipe.c 	if (!cli->auth) {
auth             4154 source3/rpc_client/cli_pipe.c 	switch (cli->auth->auth_type) {
auth             4157 source3/rpc_client/cli_pipe.c 				cli->auth->a_u.schannel_auth->sess_key, 16);
auth             4162 source3/rpc_client/cli_pipe.c 				cli->auth->a_u.ntlmssp_state->session_key.data,
auth             4163 source3/rpc_client/cli_pipe.c 				cli->auth->a_u.ntlmssp_state->session_key.length);
auth             4168 source3/rpc_client/cli_pipe.c 				cli->auth->a_u.kerberos_auth->session_key.data,
auth             4169 source3/rpc_client/cli_pipe.c 				cli->auth->a_u.kerberos_auth->session_key.length);
auth             4173 source3/rpc_client/cli_pipe.c 				cli->auth->user_session_key.data,
auth             4174 source3/rpc_client/cli_pipe.c 				cli->auth->user_session_key.length);
auth               49 source3/rpc_client/cli_spoolss.c 	level1.user	= cli->auth->user_name;
auth              166 source3/rpc_client/cli_spoolss.c 	level1.user		= cli->auth->user_name;
auth              269 source3/rpc_server/srv_lsa_hnd.c 		if (p->pipe_bound && (p->auth.auth_type == PIPE_AUTH_TYPE_SCHANNEL)) {
auth              945 source3/rpc_server/srv_lsa_nt.c 	if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) {
auth             1227 source3/rpc_server/srv_lsa_nt.c 	if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) {
auth              677 source3/rpc_server/srv_netlog_nt.c 	if ( (lp_server_schannel() == True) && (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) ) {
auth              798 source3/rpc_server/srv_netlog_nt.c 	if ( (lp_server_schannel() == True) && (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) ) {
auth              874 source3/rpc_server/srv_netlog_nt.c 	if ( (lp_server_schannel() == True) && (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) ) {
auth             1076 source3/rpc_server/srv_netlog_nt.c 		if ((p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL)
auth             1077 source3/rpc_server/srv_netlog_nt.c 		    || (p->auth.a_u.schannel_auth == NULL)) {
auth             1080 source3/rpc_server/srv_netlog_nt.c 		memcpy(pipe_session_key, p->auth.a_u.schannel_auth->sess_key, 16);
auth             1099 source3/rpc_server/srv_netlog_nt.c 	if (p->auth.auth_type != PIPE_AUTH_TYPE_SCHANNEL) {
auth               37 source3/rpc_server/srv_pipe.c static void free_pipe_ntlmssp_auth_data(struct pipe_auth_data *auth)
auth               39 source3/rpc_server/srv_pipe.c 	AUTH_NTLMSSP_STATE *a = auth->a_u.auth_ntlmssp_state;
auth               44 source3/rpc_server/srv_pipe.c 	auth->a_u.auth_ntlmssp_state = NULL;
auth               68 source3/rpc_server/srv_pipe.c 	AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state;
auth              192 source3/rpc_server/srv_pipe.c 	if (p->auth.auth_type == PIPE_AUTH_TYPE_NTLMSSP) {
auth              197 source3/rpc_server/srv_pipe.c 	if (p->auth.auth_level == PIPE_AUTH_LEVEL_PRIVACY) {
auth              213 source3/rpc_server/srv_pipe.c 	switch (p->auth.auth_level) {
auth              414 source3/rpc_server/srv_pipe.c 				p->auth.auth_level == PIPE_AUTH_LEVEL_PRIVACY ?
auth              425 source3/rpc_server/srv_pipe.c 		schannel_encode(p->auth.a_u.schannel_auth, 
auth              426 source3/rpc_server/srv_pipe.c 				p->auth.auth_level, SENDER_IS_ACCEPTOR, &verf,
auth              436 source3/rpc_server/srv_pipe.c 		p->auth.a_u.schannel_auth->seq_num++;
auth              575 source3/rpc_server/srv_pipe.c 	switch(p->auth.auth_level) {
auth              582 source3/rpc_server/srv_pipe.c 			switch(p->auth.auth_type) {
auth              594 source3/rpc_server/srv_pipe.c 			(unsigned int)p->auth.auth_level,
auth              595 source3/rpc_server/srv_pipe.c 			(unsigned int)p->auth.auth_type));
auth              610 source3/rpc_server/srv_pipe.c 	AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state;
auth              634 source3/rpc_server/srv_pipe.c 	if (p->auth.auth_level == PIPE_AUTH_LEVEL_INTEGRITY) {
auth              642 source3/rpc_server/srv_pipe.c 	if (p->auth.auth_level == PIPE_AUTH_LEVEL_PRIVACY) {
auth              769 source3/rpc_server/srv_pipe.c 	free_pipe_ntlmssp_auth_data(&p->auth);
auth              770 source3/rpc_server/srv_pipe.c 	p->auth.a_u.auth_ntlmssp_state = NULL;
auth              824 source3/rpc_server/srv_pipe.c 	if (p->auth.auth_data_free_func) {
auth              825 source3/rpc_server/srv_pipe.c 		(*p->auth.auth_data_free_func)(&p->auth);
auth              827 source3/rpc_server/srv_pipe.c 	p->auth.auth_level = PIPE_AUTH_LEVEL_NONE;
auth              828 source3/rpc_server/srv_pipe.c 	p->auth.auth_type = PIPE_AUTH_TYPE_NONE;
auth             1150 source3/rpc_server/srv_pipe.c 	if (p->auth.auth_type == PIPE_AUTH_TYPE_SPNEGO_NTLMSSP && p->auth.a_u.auth_ntlmssp_state) {
auth             1152 source3/rpc_server/srv_pipe.c 		free_pipe_ntlmssp_auth_data(&p->auth);
auth             1200 source3/rpc_server/srv_pipe.c 	p->auth.a_u.auth_ntlmssp_state = a;
auth             1201 source3/rpc_server/srv_pipe.c 	p->auth.auth_data_free_func = &free_pipe_ntlmssp_auth_data;
auth             1202 source3/rpc_server/srv_pipe.c 	p->auth.auth_type = PIPE_AUTH_TYPE_SPNEGO_NTLMSSP;
auth             1219 source3/rpc_server/srv_pipe.c 	p->auth.a_u.auth_ntlmssp_state = NULL;
auth             1236 source3/rpc_server/srv_pipe.c 	AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state;
auth             1247 source3/rpc_server/srv_pipe.c 	if (p->auth.auth_type != PIPE_AUTH_TYPE_SPNEGO_NTLMSSP || !a) {
auth             1312 source3/rpc_server/srv_pipe.c 	free_pipe_ntlmssp_auth_data(&p->auth);
auth             1313 source3/rpc_server/srv_pipe.c 	p->auth.a_u.auth_ntlmssp_state = NULL;
auth             1353 source3/rpc_server/srv_pipe.c 	p->auth.a_u.schannel_auth = talloc(p, struct schannel_auth_struct);
auth             1354 source3/rpc_server/srv_pipe.c 	if (!p->auth.a_u.schannel_auth) {
auth             1359 source3/rpc_server/srv_pipe.c 	memset(p->auth.a_u.schannel_auth->sess_key, 0, sizeof(p->auth.a_u.schannel_auth->sess_key));
auth             1360 source3/rpc_server/srv_pipe.c 	memcpy(p->auth.a_u.schannel_auth->sess_key, pdcinfo->sess_key,
auth             1365 source3/rpc_server/srv_pipe.c 	p->auth.a_u.schannel_auth->seq_num = 0;
auth             1419 source3/rpc_server/srv_pipe.c 	p->auth.auth_data_free_func = NULL;
auth             1420 source3/rpc_server/srv_pipe.c 	p->auth.auth_type = PIPE_AUTH_TYPE_SCHANNEL;
auth             1486 source3/rpc_server/srv_pipe.c 	p->auth.a_u.auth_ntlmssp_state = a;
auth             1487 source3/rpc_server/srv_pipe.c 	p->auth.auth_data_free_func = &free_pipe_ntlmssp_auth_data;
auth             1488 source3/rpc_server/srv_pipe.c 	p->auth.auth_type = PIPE_AUTH_TYPE_NTLMSSP;
auth             1503 source3/rpc_server/srv_pipe.c 	free_pipe_ntlmssp_auth_data(&p->auth);
auth             1504 source3/rpc_server/srv_pipe.c 	p->auth.a_u.auth_ntlmssp_state = NULL;
auth             1649 source3/rpc_server/srv_pipe.c 				p->auth.auth_level = PIPE_AUTH_LEVEL_INTEGRITY;
auth             1652 source3/rpc_server/srv_pipe.c 				p->auth.auth_level = PIPE_AUTH_LEVEL_PRIVACY;
auth             1688 source3/rpc_server/srv_pipe.c 			p->auth.auth_type = PIPE_AUTH_TYPE_NONE;
auth             1690 source3/rpc_server/srv_pipe.c 			p->auth.auth_level = PIPE_AUTH_LEVEL_NONE;
auth             1996 source3/rpc_server/srv_pipe.c 	AUTH_NTLMSSP_STATE *a = p->auth.a_u.auth_ntlmssp_state;
auth             2005 source3/rpc_server/srv_pipe.c 	if (p->auth.auth_level == PIPE_AUTH_LEVEL_NONE || p->auth.auth_level == PIPE_AUTH_LEVEL_CONNECT) {
auth             2053 source3/rpc_server/srv_pipe.c 	switch (p->auth.auth_level) {
auth             2165 source3/rpc_server/srv_pipe.c 	if (!schannel_decode(p->auth.a_u.schannel_auth,
auth             2166 source3/rpc_server/srv_pipe.c 			   p->auth.auth_level,
auth             2185 source3/rpc_server/srv_pipe.c 	p->auth.a_u.schannel_auth->seq_num++;
auth             2251 source3/rpc_server/srv_pipe.c 			((p->auth.auth_type == PIPE_AUTH_TYPE_NTLMSSP) ||
auth             2252 source3/rpc_server/srv_pipe.c 			 (p->auth.auth_type == PIPE_AUTH_TYPE_SPNEGO_NTLMSSP))) {
auth              386 source3/rpc_server/srv_pipe_hnd.c 	switch(p->auth.auth_type) {
auth              412 source3/rpc_server/srv_pipe_hnd.c 			DEBUG(0,("process_request_pdu: unknown auth type %u set.\n", (unsigned int)p->auth.auth_type ));
auth              918 source3/rpc_server/srv_pipe_hnd.c 	if (p->auth.auth_data_free_func) {
auth              919 source3/rpc_server/srv_pipe_hnd.c 		(*p->auth.auth_data_free_func)(&p->auth);
auth             2837 source3/rpc_server/srv_samr_nt.c 	if (p->auth.auth_type != PIPE_AUTH_TYPE_NTLMSSP || p->auth.auth_type != PIPE_AUTH_TYPE_SPNEGO_NTLMSSP) {
auth             2841 source3/rpc_server/srv_samr_nt.c 	if (p->auth.auth_level != PIPE_AUTH_LEVEL_PRIVACY) {
auth              341 source3/rpcclient/rpcclient.c 			if ((tmp_set->rpc_pipe->auth->auth_type
auth              343 source3/rpcclient/rpcclient.c 			    || (tmp_set->rpc_pipe->auth->auth_level
auth              552 source3/smbd/seal.c 	DATA_BLOB auth = data_blob_null;
auth              565 source3/smbd/seal.c 	if (!spnego_parse_auth(blob, &auth)) {
auth              570 source3/smbd/seal.c 	status = auth_ntlmssp_update(ec->auth_ntlmssp_state, auth, &auth_reply);
auth              571 source3/smbd/seal.c 	data_blob_free(&auth);
auth              848 source3/smbd/sesssetup.c 	DATA_BLOB auth = data_blob_null;
auth              853 source3/smbd/sesssetup.c 	if (!spnego_parse_auth(blob1, &auth)) {
auth              865 source3/smbd/sesssetup.c 	if (auth.data[0] == ASN1_APPLICATION(0)) {
auth              869 source3/smbd/sesssetup.c 		status = parse_spnego_mechanisms(auth, &secblob, &kerb_mech);
auth              887 source3/smbd/sesssetup.c 			data_blob_free(&auth);
auth              926 source3/smbd/sesssetup.c 					auth, &auth_reply);
auth              928 source3/smbd/sesssetup.c 	data_blob_free(&auth);
auth              194 source3/utils/net_ads.c 	d_printf("KDC server: %s\n", ads->auth.kdc_server );
auth              195 source3/utils/net_ads.c 	d_printf("Server time offset: %d\n", ads->auth.time_offset );
auth              253 source3/utils/net_ads.c 		SAFE_FREE(ads->auth.password);
auth              254 source3/utils/net_ads.c 		ads->auth.password = smb_xstrdup(c->opt_password);
auth              257 source3/utils/net_ads.c 	ads->auth.flags |= auth_flags;
auth              258 source3/utils/net_ads.c 	SAFE_FREE(ads->auth.user_name);
auth              259 source3/utils/net_ads.c 	ads->auth.user_name = smb_xstrdup(c->opt_user_name);
auth              266 source3/utils/net_ads.c        if ((cp = strchr_m(ads->auth.user_name, '@'))!=0) {
auth              268 source3/utils/net_ads.c 		SAFE_FREE(ads->auth.realm);
auth              269 source3/utils/net_ads.c 		ads->auth.realm = smb_xstrdup(cp);
auth              270 source3/utils/net_ads.c 		strupper_m(ads->auth.realm);
auth              342 source3/utils/net_ads.c 	ads->auth.flags |= ADS_AUTH_NO_BIND;
auth              491 source3/utils/net_ads.c 	status = ads_krb5_set_password(ads->auth.kdc_server, upn, argv[1],
auth              492 source3/utils/net_ads.c 				       ads->auth.time_offset);
auth             1319 source3/utils/net_ads.c 			if (asprintf( &ads_dns->auth.user_name, "%s$", global_myname()) == -1) {
auth             1322 source3/utils/net_ads.c 			ads_dns->auth.password = secrets_fetch_machine_password(
auth             1324 source3/utils/net_ads.c 			ads_dns->auth.realm = SMB_STRDUP( r->out.dns_domain_name );
auth             1325 source3/utils/net_ads.c 			strupper_m(ads_dns->auth.realm );
auth             1878 source3/utils/net_ads.c 	ret = kerberos_set_password(ads->auth.kdc_server, auth_principal,
auth             1879 source3/utils/net_ads.c 				auth_password, user, new_password, ads->auth.time_offset);
auth             1063 source3/utils/net_rpc_printer.c 					 pipe_hnd->auth->user_name,
auth             1250 source3/utils/net_rpc_printer.c 			PRINTER_ALL_ACCESS, pipe_hnd->auth->user_name, &hnd))
auth             1853 source3/utils/net_rpc_printer.c 						 pipe_hnd->auth->user_name,
auth              299 source3/utils/ntlm_auth.c 	fstrcpy(request.data.auth.user, user);
auth              300 source3/utils/ntlm_auth.c 	fstrcpy(request.data.auth.pass, pass);
auth              302 source3/utils/ntlm_auth.c 		strlcpy(request.data.auth.require_membership_of_sid,
auth              304 source3/utils/ntlm_auth.c 			sizeof(request.data.auth.require_membership_of_sid));
auth              312 source3/utils/ntlm_auth.c 		if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
auth              317 source3/utils/ntlm_auth.c 			 response.data.auth.nt_status_string,
auth              318 source3/utils/ntlm_auth.c 			 response.data.auth.error_string,
auth              319 source3/utils/ntlm_auth.c 			 response.data.auth.nt_status);
auth              321 source3/utils/ntlm_auth.c 		if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
auth              326 source3/utils/ntlm_auth.c 			  response.data.auth.nt_status_string,
auth              327 source3/utils/ntlm_auth.c 			  response.data.auth.error_string,
auth              328 source3/utils/ntlm_auth.c 			  response.data.auth.nt_status));
auth              405 source3/utils/ntlm_auth.c 	if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) {
auth              413 source3/utils/ntlm_auth.c 	nt_status = (NT_STATUS(response.data.auth.nt_status));
auth              416 source3/utils/ntlm_auth.c 			*error_string = smb_xstrdup(response.data.auth.error_string);
auth              422 source3/utils/ntlm_auth.c 		memcpy(lm_key, response.data.auth.first_8_lm_hash, 
auth              423 source3/utils/ntlm_auth.c 		       sizeof(response.data.auth.first_8_lm_hash));
auth              426 source3/utils/ntlm_auth.c 		memcpy(user_session_key, response.data.auth.user_session_key, 
auth              427 source3/utils/ntlm_auth.c 			sizeof(response.data.auth.user_session_key));
auth              431 source3/utils/ntlm_auth.c 		*unix_name = SMB_STRDUP(response.data.auth.unix_username);
auth              499 source3/utils/ntlm_auth.c 	if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0))
auth              508 source3/utils/ntlm_auth.c 	nt_status = (NT_STATUS(response.data.auth.nt_status));
auth              512 source3/utils/ntlm_auth.c 			*error_string = smb_xstrdup(response.data.auth.error_string);
auth               82 source3/winbindd/idmap_ad.c 		expire = MIN(ads->auth.tgt_expire, ads->auth.tgs_expire);
auth              131 source3/winbindd/idmap_ad.c 	SAFE_FREE(ads->auth.password);
auth              132 source3/winbindd/idmap_ad.c 	ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
auth              134 source3/winbindd/idmap_ad.c 	SAFE_FREE(ads->auth.realm);
auth              135 source3/winbindd/idmap_ad.c 	ads->auth.realm = SMB_STRDUP(lp_realm());
auth              116 source3/winbindd/idmap_adex/gc_util.c 	ads->auth.flags = ADS_AUTH_NO_BIND;
auth               81 source3/winbindd/idmap_adex/idmap_adex.c 	ads->auth.password =
auth               83 source3/winbindd/idmap_adex/idmap_adex.c 	ads->auth.realm = SMB_STRDUP(lp_realm());
auth              276 source3/winbindd/idmap_adex/likewise_cell.c 	ads->auth.password =
auth              278 source3/winbindd/idmap_adex/likewise_cell.c 	ads->auth.realm = SMB_STRDUP(lp_realm());
auth               55 source3/winbindd/winbindd_ads.c 		expire = MIN(ads->auth.tgt_expire, ads->auth.tgs_expire);
auth               83 source3/winbindd/winbindd_ads.c 	SAFE_FREE(ads->auth.password);
auth               84 source3/winbindd/winbindd_ads.c 	SAFE_FREE(ads->auth.realm);
auth               90 source3/winbindd/winbindd_ads.c 		if ( !pdb_get_trusteddom_pw( domain->name, &ads->auth.password, &sid, &last_set_time ) ) {
auth               94 source3/winbindd/winbindd_ads.c 		ads->auth.realm = SMB_STRDUP( ads->server.realm );
auth               95 source3/winbindd/winbindd_ads.c 		strupper_m( ads->auth.realm );
auth              100 source3/winbindd/winbindd_ads.c 		ads->auth.password = secrets_fetch_machine_password(lp_workgroup(), NULL, NULL);
auth              109 source3/winbindd/winbindd_ads.c 			ads->auth.realm = SMB_STRDUP( our_domain->alt_name );
auth              110 source3/winbindd/winbindd_ads.c 			strupper_m( ads->auth.realm );
auth              113 source3/winbindd/winbindd_ads.c 			ads->auth.realm = SMB_STRDUP( lp_realm() );
auth              116 source3/winbindd/winbindd_ads.c 	ads->auth.renewable = WINBINDD_PAM_AUTH_KRB5_RENEW_TIME;
auth              194 source3/winbindd/winbindd_ccache_access.c 	DATA_BLOB initial, challenge, auth;
auth              262 source3/winbindd/winbindd_ccache_access.c 						initial, challenge, &auth);
auth              272 source3/winbindd/winbindd_ccache_access.c 	state->response.extra_data.data = smb_xmemdup(auth.data, auth.length);
auth              277 source3/winbindd/winbindd_ccache_access.c 	state->response.length += auth.length;
auth              278 source3/winbindd/winbindd_ccache_access.c 	state->response.data.ccache_ntlm_auth.auth_blob_len = auth.length;
auth              280 source3/winbindd/winbindd_ccache_access.c 	data_blob_free(&auth);
auth             1101 source3/winbindd/winbindd_cm.c 		ads->auth.flags |= ADS_AUTH_NO_BIND;
auth             2203 source3/winbindd/winbindd_cm.c 	    conn->lsa_pipe_tcp->auth->auth_level == PIPE_AUTH_LEVEL_PRIVACY &&
auth               92 source3/winbindd/winbindd_misc.c 						state->response.data.auth.nt_status_string));
auth               40 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.logon_time =
auth               42 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.logoff_time =
auth               44 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.kickoff_time =
auth               46 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.pass_last_set_time =
auth               48 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.pass_can_change_time =
auth               50 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.pass_must_change_time =
auth               53 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.logon_count = info3->base.logon_count;
auth               54 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.bad_pw_count = info3->base.bad_password_count;
auth               56 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.user_rid = info3->base.rid;
auth               57 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.group_rid = info3->base.primary_gid;
auth               58 source3/winbindd/winbindd_pam.c 	sid_to_fstring(state->response.data.auth.info3.dom_sid, info3->base.domain_sid);
auth               60 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.num_groups = info3->base.groups.count;
auth               61 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.user_flgs = info3->base.user_flags;
auth               63 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.acct_flags = info3->base.acct_flags;
auth               64 source3/winbindd/winbindd_pam.c 	state->response.data.auth.info3.num_other_sids = info3->sidcount;
auth               66 source3/winbindd/winbindd_pam.c 	fstrcpy(state->response.data.auth.info3.user_name,
auth               68 source3/winbindd/winbindd_pam.c 	fstrcpy(state->response.data.auth.info3.full_name,
auth               70 source3/winbindd/winbindd_pam.c 	fstrcpy(state->response.data.auth.info3.logon_script,
auth               72 source3/winbindd/winbindd_pam.c 	fstrcpy(state->response.data.auth.info3.profile_path,
auth               74 source3/winbindd/winbindd_pam.c 	fstrcpy(state->response.data.auth.info3.home_dir,
auth               76 source3/winbindd/winbindd_pam.c 	fstrcpy(state->response.data.auth.info3.dir_drive,
auth               79 source3/winbindd/winbindd_pam.c 	fstrcpy(state->response.data.auth.info3.logon_srv,
auth               81 source3/winbindd/winbindd_pam.c 	fstrcpy(state->response.data.auth.info3.logon_dom,
auth              178 source3/winbindd/winbindd_pam.c 	fill_domain_username(state->response.data.auth.unix_username,
auth              182 source3/winbindd/winbindd_pam.c 		state->response.data.auth.unix_username));
auth              387 source3/winbindd/winbindd_pam.c 	r->data.auth.policy.min_length_password =
auth              389 source3/winbindd/winbindd_pam.c 	r->data.auth.policy.password_history =
auth              391 source3/winbindd/winbindd_pam.c 	r->data.auth.policy.password_properties =
auth              393 source3/winbindd/winbindd_pam.c 	r->data.auth.policy.expire	=
auth              395 source3/winbindd/winbindd_pam.c 	r->data.auth.policy.min_passwordage =
auth              519 source3/winbindd/winbindd_pam.c 	const char *type = state->request.data.auth.krb5_cc_type;
auth              521 source3/winbindd/winbindd_pam.c 	state->response.data.auth.krb5ccname[0] = '\0';
auth              534 source3/winbindd/winbindd_pam.c 	fstrcpy(state->response.data.auth.krb5ccname, cc);
auth              543 source3/winbindd/winbindd_pam.c 	uid = state->request.data.auth.uid;
auth              589 source3/winbindd/winbindd_pam.c 				  state->request.data.auth.krb5_cc_type,
auth              590 source3/winbindd/winbindd_pam.c 				  state->request.data.auth.uid,
auth              602 source3/winbindd/winbindd_pam.c 		time_offset = ads->auth.time_offset;
auth              609 source3/winbindd/winbindd_pam.c 	parse_domain_user(state->request.data.auth.user, name_domain, name_user);
auth              636 source3/winbindd/winbindd_pam.c 						state->request.data.auth.pass,
auth              668 source3/winbindd/winbindd_pam.c 					    state->request.data.auth.user,
auth              709 source3/winbindd/winbindd_pam.c 	if (!NT_STATUS_IS_OK(remove_ccache(state->request.data.auth.user))) {
auth              712 source3/winbindd/winbindd_pam.c 			state->request.data.auth.user));
auth              754 source3/winbindd/winbindd_pam.c 		memcpy(state->response.data.auth.user_session_key,
auth              756 source3/winbindd/winbindd_pam.c 		       sizeof(state->response.data.auth.user_session_key)
auth              761 source3/winbindd/winbindd_pam.c 		memcpy(state->response.data.auth.first_8_lm_hash,
auth              763 source3/winbindd/winbindd_pam.c 		       sizeof(state->response.data.auth.first_8_lm_hash)
auth              819 source3/winbindd/winbindd_pam.c 	state->request.data.auth.user
auth              820 source3/winbindd/winbindd_pam.c 		[sizeof(state->request.data.auth.user)-1]='\0';
auth              823 source3/winbindd/winbindd_pam.c 	state->request.data.auth.pass
auth              824 source3/winbindd/winbindd_pam.c 		[sizeof(state->request.data.auth.pass)-1]='\0';
auth              827 source3/winbindd/winbindd_pam.c 		  state->request.data.auth.user));
auth              837 source3/winbindd/winbindd_pam.c 					       state->request.data.auth.user,
auth              847 source3/winbindd/winbindd_pam.c 		fstrcpy(mapped_user, state->request.data.auth.user);
auth              868 source3/winbindd/winbindd_pam.c 		  state->request.data.auth.user,
auth              869 source3/winbindd/winbindd_pam.c 		  state->response.data.auth.nt_status_string,
auth              870 source3/winbindd/winbindd_pam.c 		  state->response.data.auth.pam_error));
auth              901 source3/winbindd/winbindd_pam.c 	parse_domain_user(state->request.data.auth.user, name_domain, name_user);
auth              931 source3/winbindd/winbindd_pam.c 	E_md4hash(state->request.data.auth.pass, new_nt_pass);
auth             1020 source3/winbindd/winbindd_pam.c 						state->request.data.auth.krb5_cc_type,
auth             1021 source3/winbindd/winbindd_pam.c 						state->request.data.auth.uid,
auth             1047 source3/winbindd/winbindd_pam.c 							    state->request.data.auth.user,
auth             1072 source3/winbindd/winbindd_pam.c 							state->request.data.auth.user,
auth             1073 source3/winbindd/winbindd_pam.c 							state->request.data.auth.pass,
auth             1120 source3/winbindd/winbindd_pam.c 						state->request.data.auth.user,
auth             1144 source3/winbindd/winbindd_pam.c 	parse_domain_user(state->request.data.auth.user, name_domain, name_user);
auth             1151 source3/winbindd/winbindd_pam.c 				  state->request.data.auth.user, name_domain, name_user, name_domain));
auth             1166 source3/winbindd/winbindd_pam.c 				  state->request.data.auth.user, name_domain, name_user, name_domain));
auth             1227 source3/winbindd/winbindd_pam.c 	parse_domain_user(state->request.data.auth.user, name_domain, name_user);
auth             1247 source3/winbindd/winbindd_pam.c 				      state->request.data.auth.pass,
auth             1268 source3/winbindd/winbindd_pam.c 		    && SMBencrypt(state->request.data.auth.pass,
auth             1277 source3/winbindd/winbindd_pam.c 		SMBNTencrypt(state->request.data.auth.pass,
auth             1291 source3/winbindd/winbindd_pam.c 				  state->request.data.auth.user, name_domain, name_user, name_domain));
auth             1471 source3/winbindd/winbindd_pam.c 	state->request.data.auth.user[sizeof(state->request.data.auth.user)-1]='\0';
auth             1474 source3/winbindd/winbindd_pam.c 	state->request.data.auth.pass[sizeof(state->request.data.auth.pass)-1]='\0';
auth             1477 source3/winbindd/winbindd_pam.c 		  state->request.data.auth.user));
auth             1487 source3/winbindd/winbindd_pam.c 					       state->request.data.auth.user,
auth             1496 source3/winbindd/winbindd_pam.c 		mapped_user = state->request.data.auth.user;
auth             1501 source3/winbindd/winbindd_pam.c 	if ( mapped_user != state->request.data.auth.user ) {
auth             1503 source3/winbindd/winbindd_pam.c 		safe_strcpy( state->request.data.auth.user, domain_user,
auth             1504 source3/winbindd/winbindd_pam.c 			     sizeof(state->request.data.auth.user)-1 );
auth             1650 source3/winbindd/winbindd_pam.c 					state->request.data.auth.require_membership_of_sid))) {
auth             1652 source3/winbindd/winbindd_pam.c 				  state->request.data.auth.user,
auth             1653 source3/winbindd/winbindd_pam.c 				  state->request.data.auth.require_membership_of_sid));
auth             1665 source3/winbindd/winbindd_pam.c 			result = winbindd_add_memory_creds(state->request.data.auth.user,
auth             1667 source3/winbindd/winbindd_pam.c 							state->request.data.auth.pass);
auth             1677 source3/winbindd/winbindd_pam.c 						      state->request.data.auth.user,
auth             1678 source3/winbindd/winbindd_pam.c 						      state->request.data.auth.pass,
auth             1683 source3/winbindd/winbindd_pam.c 					winbindd_delete_memory_creds(state->request.data.auth.user);
auth             1728 source3/winbindd/winbindd_pam.c 	      state->request.data.auth.user,
auth             1729 source3/winbindd/winbindd_pam.c 	      state->response.data.auth.nt_status_string,
auth             1730 source3/winbindd/winbindd_pam.c 	      state->response.data.auth.pam_error));
auth             1765 source3/winbindd/winbindd_pam.c 		fstrcpy(state->response.data.auth.error_string, error_string);
auth             1802 source3/winbindd/winbindd_pam.c 		  state->response.data.auth.nt_status_string,
auth             1803 source3/winbindd/winbindd_pam.c 		  state->response.data.auth.pam_error));
auth             2008 source3/winbindd/winbindd_pam.c 	       state->response.data.auth.nt_status_string,
auth             2009 source3/winbindd/winbindd_pam.c 	       state->response.data.auth.pam_error));
auth             2048 source3/winbindd/winbindd_pam.c 			  state->request.data.auth.user,
auth             2049 source3/winbindd/winbindd_pam.c 			  state->response.data.auth.nt_status_string,
auth             2050 source3/winbindd/winbindd_pam.c 			  state->response.data.auth.pam_error));
auth             2081 source3/winbindd/winbindd_pam.c 		  state->request.data.auth.user));
auth             2093 source3/winbindd/winbindd_pam.c 	state->response.data.auth.reject_reason = Undefined;
auth             2117 source3/winbindd/winbindd_pam.c 		state->response.data.auth.reject_reason =
auth             2216 source3/winbindd/winbindd_pam.c 	       state->response.data.auth.nt_status_string,
auth             2217 source3/winbindd/winbindd_pam.c 	       state->response.data.auth.pam_error));
auth             2281 source3/winbindd/winbindd_pam.c 		  state->response.data.auth.nt_status_string,
auth             2282 source3/winbindd/winbindd_pam.c 		  state->response.data.auth.pam_error));
auth             2386 source3/winbindd/winbindd_pam.c 		  state->response.data.auth.nt_status_string,
auth             2387 source3/winbindd/winbindd_pam.c 		  state->response.data.auth.pam_error));
auth             2495 source3/winbindd/winbindd_pam.c 	       state->response.data.auth.nt_status_string,
auth             2496 source3/winbindd/winbindd_pam.c 	       state->response.data.auth.pam_error));
auth             1691 source3/winbindd/winbindd_util.c 	resp->data.auth.nt_status = NT_STATUS_V(result);
auth             1692 source3/winbindd/winbindd_util.c 	fstrcpy(resp->data.auth.nt_status_string, nt_errstr(result));
auth             1695 source3/winbindd/winbindd_util.c 	if (*resp->data.auth.error_string == '\0')
auth             1696 source3/winbindd/winbindd_util.c 		fstrcpy(resp->data.auth.error_string,
auth             1698 source3/winbindd/winbindd_util.c 	resp->data.auth.pam_error = nt_status_to_pam(result);
auth              121 source4/auth/ntlm/auth_winbind.c 	nt_status = NT_STATUS(response.data.auth.nt_status);
auth              613 source4/client/smbmount.c 	FILE *auth;
auth              618 source4/client/smbmount.c 	if ((auth=sys_fopen(filename, "r")) == NULL)
auth              625 source4/client/smbmount.c 	while (!feof(auth))
auth              628 source4/client/smbmount.c 		if (!fgets (buf, sizeof(buf), auth))
auth              663 source4/client/smbmount.c 	fclose(auth);
auth              346 source4/heimdal/kdc/kerberos4.c 	krb5_data auth;
auth              355 source4/heimdal/kdc/kerberos4.c 	krb5_data_zero(&auth);
auth              409 source4/heimdal/kdc/kerberos4.c 	auth.data = buf;
auth              410 source4/heimdal/kdc/kerberos4.c 	auth.length = pos;
auth              417 source4/heimdal/kdc/kerberos4.c 	ret = _krb5_krb_rd_req(context, &auth, "krbtgt", realm,
auth              940 source4/heimdal/kdc/krb5tgs.c     krb5_authenticator auth;
auth              947 source4/heimdal/kdc/krb5tgs.c     krb5_auth_con_getauthenticator(context, ac, &auth);
auth              948 source4/heimdal/kdc/krb5tgs.c     if(auth->cksum == NULL){
auth              959 source4/heimdal/kdc/krb5tgs.c !krb5_checksum_is_keyed(context, auth->cksum->cksumtype)
auth              962 source4/heimdal/kdc/krb5tgs.c  !krb5_checksum_is_collision_proof(context, auth->cksum->cksumtype)) {
auth              964 source4/heimdal/kdc/krb5tgs.c 		auth->cksum->cksumtype);
auth              995 source4/heimdal/kdc/krb5tgs.c 			       auth->cksum);
auth             1004 source4/heimdal/kdc/krb5tgs.c     free_Authenticator(auth);
auth             1005 source4/heimdal/kdc/krb5tgs.c     free(auth);
auth             1174 source4/heimdal/kdc/krb5tgs.c 	krb5_authenticator auth;
auth             1176 source4/heimdal/kdc/krb5tgs.c 	ret = krb5_auth_con_getauthenticator(context, ac, &auth);
auth             1180 source4/heimdal/kdc/krb5tgs.c 		krb5_free_authenticator(context, &auth);
auth             1184 source4/heimdal/kdc/krb5tgs.c 	    **csec  = auth->ctime;
auth             1187 source4/heimdal/kdc/krb5tgs.c 		krb5_free_authenticator(context, &auth);
auth             1191 source4/heimdal/kdc/krb5tgs.c 	    **cusec  = auth->cusec;
auth             1192 source4/heimdal/kdc/krb5tgs.c 	    krb5_free_authenticator(context, &auth);
auth              112 source4/heimdal/lib/krb5/build_auth.c     Authenticator *auth;
auth              119 source4/heimdal/lib/krb5/build_auth.c     auth = calloc(1, sizeof(*auth));
auth              120 source4/heimdal/lib/krb5/build_auth.c     if (auth == NULL) {
auth              125 source4/heimdal/lib/krb5/build_auth.c     auth->authenticator_vno = 5;
auth              126 source4/heimdal/lib/krb5/build_auth.c     copy_Realm(&cred->client->realm, &auth->crealm);
auth              127 source4/heimdal/lib/krb5/build_auth.c     copy_PrincipalName(&cred->client->name, &auth->cname);
auth              129 source4/heimdal/lib/krb5/build_auth.c     krb5_us_timeofday (context, &auth->ctime, &auth->cusec);
auth              131 source4/heimdal/lib/krb5/build_auth.c     ret = krb5_auth_con_getlocalsubkey(context, auth_context, &auth->subkey);
auth              140 source4/heimdal/lib/krb5/build_auth.c 	ALLOC(auth->seq_number, 1);
auth              141 source4/heimdal/lib/krb5/build_auth.c 	if(auth->seq_number == NULL) {
auth              145 source4/heimdal/lib/krb5/build_auth.c 	*auth->seq_number = auth_context->local_seqnumber;
auth              147 source4/heimdal/lib/krb5/build_auth.c 	auth->seq_number = NULL;
auth              148 source4/heimdal/lib/krb5/build_auth.c     auth->authorization_data = NULL;
auth              149 source4/heimdal/lib/krb5/build_auth.c     auth->cksum = cksum;
auth              156 source4/heimdal/lib/krb5/build_auth.c 	ret = make_etypelist(context, &auth->authorization_data);
auth              163 source4/heimdal/lib/krb5/build_auth.c     auth_context->authenticator->ctime = auth->ctime;
auth              164 source4/heimdal/lib/krb5/build_auth.c     auth_context->authenticator->cusec = auth->cusec;
auth              166 source4/heimdal/lib/krb5/build_auth.c     ASN1_MALLOC_ENCODE(Authenticator, buf, buf_size, auth, &len, ret);
auth              189 source4/heimdal/lib/krb5/build_auth.c 	*auth_result = auth;
auth              192 source4/heimdal/lib/krb5/build_auth.c 	auth->cksum = NULL;
auth              193 source4/heimdal/lib/krb5/build_auth.c 	free_Authenticator (auth);
auth              194 source4/heimdal/lib/krb5/build_auth.c 	free (auth);
auth              198 source4/heimdal/lib/krb5/build_auth.c     free_Authenticator (auth);
auth              199 source4/heimdal/lib/krb5/build_auth.c     free (auth);
auth              443 source4/heimdal/lib/krb5/get_cred.c 	self.auth = estrdup("Kerberos");
auth              447 source4/heimdal/lib/krb5/get_cred.c 	    free(self.auth);
auth              453 source4/heimdal/lib/krb5/get_cred.c 	    free(self.auth);
auth              468 source4/heimdal/lib/krb5/get_cred.c 	    free(self.auth);
auth              473 source4/heimdal/lib/krb5/get_cred.c 	free(self.auth);
auth               72 source4/heimdal/lib/krb5/misc.c     size = strlen(self->auth);
auth               73 source4/heimdal/lib/krb5/misc.c     ssize = krb5_storage_write(sp, self->auth, size);
auth              181 source4/heimdal/lib/krb5/replay.c checksum_authenticator(Authenticator *auth, void *data)
auth              187 source4/heimdal/lib/krb5/replay.c     MD5_Update (&md5, auth->crealm, strlen(auth->crealm));
auth              188 source4/heimdal/lib/krb5/replay.c     for(i = 0; i < auth->cname.name_string.len; i++)
auth              189 source4/heimdal/lib/krb5/replay.c 	MD5_Update(&md5, auth->cname.name_string.val[i],
auth              190 source4/heimdal/lib/krb5/replay.c 		   strlen(auth->cname.name_string.val[i]));
auth              191 source4/heimdal/lib/krb5/replay.c     MD5_Update (&md5, &auth->ctime, sizeof(auth->ctime));
auth              192 source4/heimdal/lib/krb5/replay.c     MD5_Update (&md5, &auth->cusec, sizeof(auth->cusec));
auth              724 source4/heimdal/lib/krb5/store.c krb5_store_authdata(krb5_storage *sp, krb5_authdata auth)
auth              728 source4/heimdal/lib/krb5/store.c     ret = krb5_store_int32(sp, auth.len);
auth              730 source4/heimdal/lib/krb5/store.c     for(i = 0; i < auth.len; i++){
auth              731 source4/heimdal/lib/krb5/store.c 	ret = krb5_store_int16(sp, auth.val[i].ad_type);
auth              733 source4/heimdal/lib/krb5/store.c 	ret = krb5_store_data(sp, auth.val[i].ad_data);
auth              740 source4/heimdal/lib/krb5/store.c krb5_ret_authdata(krb5_storage *sp, krb5_authdata *auth)
auth              748 source4/heimdal/lib/krb5/store.c     ALLOC_SEQ(auth, tmp);
auth              749 source4/heimdal/lib/krb5/store.c     if (auth->val == NULL && tmp != 0)
auth              754 source4/heimdal/lib/krb5/store.c 	auth->val[i].ad_type = tmp2;
auth              755 source4/heimdal/lib/krb5/store.c 	ret = krb5_ret_data(sp, &auth->val[i].ad_data);
auth              220 source4/librpc/rpc/dcerpc.c 	struct dcerpc_auth auth;
auth              271 source4/librpc/rpc/dcerpc.c 	ndr_err = ndr_pull_dcerpc_auth(ndr, NDR_SCALARS|NDR_BUFFERS, &auth);
auth              285 source4/librpc/rpc/dcerpc.c 					      raw_packet->length - auth.credentials.length,
auth              286 source4/librpc/rpc/dcerpc.c 					      &auth.credentials);
auth              298 source4/librpc/rpc/dcerpc.c 					     raw_packet->length - auth.credentials.length,
auth              299 source4/librpc/rpc/dcerpc.c 					     &auth.credentials);
auth              313 source4/librpc/rpc/dcerpc.c 	if (pkt->u.response.stub_and_verifier.length < auth.auth_pad_length) {
auth              316 source4/librpc/rpc/dcerpc.c 	pkt->u.response.stub_and_verifier.length -= auth.auth_pad_length;
auth               43 source4/rpc_server/dcesrv_auth.c 	struct dcesrv_auth *auth = &dce_conn->auth_state;
auth               85 source4/rpc_server/dcesrv_auth.c 					   &auth->gensec_security);
auth               87 source4/rpc_server/dcesrv_auth.c 	status = gensec_start_mech_by_authtype(auth->gensec_security, auth->auth_info->auth_type, 
auth               88 source4/rpc_server/dcesrv_auth.c 					       auth->auth_info->auth_level);
auth               92 source4/rpc_server/dcesrv_auth.c 			  (int)auth->auth_info->auth_type,
auth               93 source4/rpc_server/dcesrv_auth.c 			  (int)auth->auth_info->auth_level,
auth               99 source4/rpc_server/dcesrv_auth.c 		gensec_want_feature(auth->gensec_security, GENSEC_FEATURE_SIGN_PKT_HEADER);
auth              290 source4/rpc_server/dcesrv_auth.c 	struct dcerpc_auth auth;
auth              348 source4/rpc_server/dcesrv_auth.c 	ndr_err = ndr_pull_dcerpc_auth(ndr, NDR_SCALARS|NDR_BUFFERS, &auth);
auth              362 source4/rpc_server/dcesrv_auth.c 					      full_packet->length-auth.credentials.length,
auth              363 source4/rpc_server/dcesrv_auth.c 					      &auth.credentials);
auth              375 source4/rpc_server/dcesrv_auth.c 					     full_packet->length-auth.credentials.length,
auth              376 source4/rpc_server/dcesrv_auth.c 					     &auth.credentials);
auth              390 source4/rpc_server/dcesrv_auth.c 	if (pkt->u.request.stub_and_verifier.length < auth.auth_pad_length) {
auth              394 source4/rpc_server/dcesrv_auth.c 	pkt->u.request.stub_and_verifier.length -= auth.auth_pad_length;
auth              588 source4/torture/rpc/netlogon.c 	struct netr_Authenticator auth, auth2;
auth              639 source4/torture/rpc/netlogon.c 	r.in.credential = &auth;
auth              650 source4/torture/rpc/netlogon.c 		creds_client_authenticator(creds, &auth);
auth               57 source4/torture/rpc/remote_pac.c 	struct netr_Authenticator auth, auth2;
auth              171 source4/torture/rpc/remote_pac.c 	creds_client_authenticator(creds, &auth);
auth              172 source4/torture/rpc/remote_pac.c 	r.in.credential = &auth;
auth              193 source4/torture/rpc/remote_pac.c 	creds_client_authenticator(creds, &auth);
auth              194 source4/torture/rpc/remote_pac.c 	r.in.credential = &auth;
auth              215 source4/torture/rpc/remote_pac.c 	creds_client_authenticator(creds, &auth);
auth              216 source4/torture/rpc/remote_pac.c 	r.in.credential = &auth;
auth              262 source4/torture/rpc/remote_pac.c 	creds_client_authenticator(creds, &auth);
auth              263 source4/torture/rpc/remote_pac.c 	r.in.credential = &auth;
auth              309 source4/torture/rpc/remote_pac.c 	creds_client_authenticator(creds, &auth);
auth              310 source4/torture/rpc/remote_pac.c 	r.in.credential = &auth;
auth               65 source4/torture/rpc/samlogon.c 	struct netr_Authenticator auth, auth2;
auth              156 source4/torture/rpc/samlogon.c 		creds_client_authenticator(samlogon_state->creds, &samlogon_state->auth);
auth              214 source4/torture/rpc/samlogon.c 		creds_client_authenticator(samlogon_state->creds, &samlogon_state->auth);
auth             1361 source4/torture/rpc/samlogon.c 	samlogon_state.r_flags.in.credential = &samlogon_state.auth;
auth             1379 source4/torture/rpc/samlogon.c 	samlogon_state.r.in.credential = &samlogon_state.auth;
auth             2684 source4/torture/rpc/samr.c 	struct netr_Authenticator auth, auth2;
auth             2737 source4/torture/rpc/samr.c 	r.in.credential = &auth;
auth             2747 source4/torture/rpc/samr.c 	creds_client_authenticator(creds, &auth);
auth               59 source4/torture/rpc/samsync.c 	struct netr_Authenticator auth, auth2;
auth               95 source4/torture/rpc/samsync.c 	r.in.credential = &auth;
auth              103 source4/torture/rpc/samsync.c 	creds_client_authenticator(creds, &auth);
auth              231 source4/torture/winbind/struct_based.c 			       strlen(rep.data.auth.nt_status_string)>0,
auth              235 source4/torture/winbind/struct_based.c 				nt_errstr(NT_STATUS(rep.data.auth.nt_status)),
auth              236 source4/torture/winbind/struct_based.c 				rep.data.auth.nt_status_string,
auth              237 source4/torture/winbind/struct_based.c 				rep.data.auth.error_string,
auth              238 source4/torture/winbind/struct_based.c 				rep.data.auth.pam_error);
auth              243 source4/torture/winbind/struct_based.c 				   NT_STATUS(rep.data.auth.nt_status),
auth              247 source4/torture/winbind/struct_based.c 				 rep.data.auth.nt_status_string,
auth              252 source4/torture/winbind/struct_based.c 				 rep.data.auth.error_string,
auth              257 source4/torture/winbind/struct_based.c 				 rep.data.auth.pam_error,
auth               51 source4/winbind/wb_samba3_cmd.c 	WBSRV_SAMBA3_SET_STRING(resp->data.auth.nt_status_string,
auth               53 source4/winbind/wb_samba3_cmd.c 	WBSRV_SAMBA3_SET_STRING(resp->data.auth.error_string,
auth               56 source4/winbind/wb_samba3_cmd.c 	resp->data.auth.pam_error = nt_status_to_pam(status);
auth               57 source4/winbind/wb_samba3_cmd.c 	resp->data.auth.nt_status = NT_STATUS_V(status);
auth              536 source4/winbind/wb_samba3_cmd.c 		memcpy(s3call->response.data.auth.user_session_key, 
auth              538 source4/winbind/wb_samba3_cmd.c 		       sizeof(s3call->response.data.auth.user_session_key));
auth              547 source4/winbind/wb_samba3_cmd.c 		memcpy(s3call->response.data.auth.first_8_lm_hash, 
auth              549 source4/winbind/wb_samba3_cmd.c 		       sizeof(s3call->response.data.auth.first_8_lm_hash));
auth              579 source4/winbind/wb_samba3_cmd.c 				 s3call->request.data.auth.user,
auth              592 source4/winbind/wb_samba3_cmd.c 	cli_credentials_set_password(credentials, s3call->request.data.auth.pass, CRED_SPECIFIED);